Penalties for Unauthorized Disclosure of National Security-Related Secrets: Comparative Law and Practice
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Section 29 of the Internal Security Act
UCLA National Black Law Journal Title Detention and Torture without Trial: Section 29 of the Internal Security Act Permalink https://escholarship.org/uc/item/9n14b6wb Journal National Black Law Journal, 10(2) ISSN 0896-0194 Author Cassim, Mohamed Yusuf Publication Date 1987 Peer reviewed eScholarship.org Powered by the California Digital Library University of California COMMENT Detention and Torture Without Trial: Section 29 of the Internal Security Act Mohamed Yusuf Cassim* INTRODUCTION South Africa is a relatively sophisticated, fast developing young state, fac- ing the twin problems of a modem industrial revolution, and of the search for a just and practical modus vivendi for the various groups of people who make up her population. These problems are sharpened and complicated by the fact that virtually the entire world has become concerned about what happens in Southern Africa. The general thrust of world opinion has become increasingly critical of the policies presently pursued by the South African government and impatient for the changes which it sees as imperative and inevitable. The pace of change in the world, especially in the "dark continent" of Africa, has so quickened over the past few decades that, while at one level white South Af- rica appeared to have time on her side, it is now clear that under prevailing circumstances time is a precious and rapidly diminishing commodity. More- over, in this day, the problems of South Africa are unique. There is no easy answer for the South African situation-no ready blue print for success. No country in contemporary history has been confronted with quite the same situ- ation. -
When a Temporary State of Emergency Becomes Permanent France As a Case Study AUTHOR Jane Kilpatrick
NOVEMBER 2020 When a Temporary State of Emergency becomes Permanent France as a Case Study AUTHOR Jane Kilpatrick EDITORS Waqas Tufail, Niamh Ní Bhriain DESIGN Karen Paalman COVER PHOTO Wesley Marçal on Unsplash Published by Transnational Institute - www.tni.org Amsterdam, November 2020 Disclaimer: The content of this report represents the views of the Transnational Institute and the named authors and is their sole responsibility. The European Commission does not accept any responsibility for use that may be made of the information it contains. Contents of the report may be quoted or reproduced for non-commercial purposes, provided that the source of information is properly cited. TNI would appreciate receiving a copy or link of the text in which this document is used or cited. Please note that for some images the copyright may lie elsewhere and copyright conditions of those images are those pertaining to the copyright terms of the original source. https://www.tni.org/copyright Table of Contents Introduction 4 States of emergency 5 How is this provided for by law? 5 Which rights are absolute and cannot be derogated from? 5 Process: what steps need to be put in place when derogating from IHRL? 6 States of emergency in practice 6 Permanent States of Emergency and counter-terrorism 7 France 8 Before the November 2015 State of Emergency 8 Legislative changes in France 9 Impacts on fundamental rights 11 Freedom of movement, freedom of expression and freedom of assembly 12 The behaviour of police 14 Issues of necessity, proportionality, and -
The Public Life of Secrets: Deception, Disclosure, and Discursive Framing in the Policy Process
STXXXX10.1177/0735275115587388Sociological TheoryBail 587388research-article2015 Original Article Sociological Theory 2015, Vol. 33(2) 97 –124 The Public Life of Secrets: © American Sociological Association 2015 DOI: 10.1177/0735275115587388 Deception, Disclosure, and stx.sagepub.com Discursive Framing in the Policy Process Christopher A. Bail1 Abstract While secrecy enables policy makers to escape public scrutiny, leaks of classified information reveal the social construction of reality by the state. I develop a theory that explains how leaks shape the discursive frames states create to communicate the causes of social problems to the public and corresponding solutions to redress them. Synthesizing cultural sociology, symbolic interactionism, and ethnomethodology, I argue that leaks enable non– state actors to amplify contradictions between the public and secret behavior of the state. States respond by “ad hoc–ing” new frames that normalize their secret transgressions as logical extensions of other policy agendas. While these syncretic responses resolve contradictions exposed by leaks, they gradually detach discursive frames from reality and therefore increase states’ need for secrecy—as well as the probability of future leaks—in turn. I illustrate this downward spiral of deception and disclosure via a case study of the British government’s discourse about terrorism between 2000 and 2008. Keywords cultural sociology, political sociology, secrecy, symbolic interactionism, comparative- historical sociology “For in the order of things it is found that one never seeks to avoid one inconvenience without running into another.” —Machiavelli (The Prince, chapter 21) A vast literature explains how policy makers shape public understandings of social problems in order to accomplish their agenda (e.g., Alexander and Smith 1993; Berezin 1997; Jacobs and Sobieraj 2007; Reed 2013; Skrentny 2004; Somers and Block 2005; Spillman 1997; Steensland 2007; Wagner-Pacifici 1994). -
Public Law and Civil Liberties ISBN 978-1-137-54503-9.Indd
Copyrighted material – 9781137545039 Contents Preface . v Magna Carta (1215) . 1 The Bill of Rights (1688) . 2 The Act of Settlement (1700) . 5 Union with Scotland Act 1706 . 6 Official Secrets Act 1911 . 7 Parliament Acts 1911 and 1949 . 8 Official Secrets Act 1920 . 10 The Statute of Westminster 1931 . 11 Public Order Act 1936 . 12 Statutory Instruments Act 1946 . 13 Crown Proceedings Act 1947 . 14 Life Peerages Act 1958 . 16 Obscene Publications Act 1959 . 17 Parliamentary Commissioner Act 1967 . 19 European Communities Act 1972 . 24 Local Government Act 1972 . 26 Local Government Act 1974 . 30 House of Commons Disqualification Act 1975 . 36 Ministerial and Other Salaries Act 1975 . 38 Highways Act 1980 . 39 Senior Courts Act 1981 . 39 Police and Criminal Evidence Act 1984 . 45 Public Order Act 1986 . 82 Official Secrets Act 1989 . 90 Security Service Act 1989 . 96 Intelligence Services Act 1994 . 97 Criminal Justice and Public Order Act 1994 . 100 Police Act 1996 . 104 Police Act 1997 . 106 Human Rights Act 1998 . 110 Scotland Act 1998 . 116 Northern Ireland Act 1998 . 121 House of Lords Act 1999 . 126 Freedom of Information Act 2000 . 126 Terrorism Act 2000 . 141 Criminal Justice and Police Act 2001 . 152 Anti-terrorism, Crime and Security Act 2001 . 158 Police Reform Act 2002 . 159 Constitutional Reform Act 2005 . 179 Serious Organised Crime and Police Act 2005 . 187 Equality Act 2006 . 193 Terrorism Act 2006 . 196 Government of Wales Act 2006 . 204 Serious Crime Act 2007 . 209 UK Borders Act 2007 . 212 Parliamentary Standards Act 2009 . 213 Constitutional Reform and Governance Act 2010 . 218 European Union Act 2011 . -
Writing About Espionage Secrets
Secrecy and Society ISSN: 2377-6188 Volume 2 Number 1 Secrecy and Intelligence Article 7 September 2018 Writing About Espionage Secrets Kristie Macrakis Georgia Tech, Atlanta, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the History of Science, Technology, and Medicine Commons, and the Other History Commons Recommended Citation Macrakis, Kristie. 2018. "Writing About Espionage Secrets." Secrecy and Society 2(1). https://doi.org/10.31979/2377-6188.2018.020107 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss1/7 This Special Issue Article is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Writing About Espionage Secrets Abstract This article describes the author’s experiences researching three books on espionage history in three different countries and on three different topics. The article describes the foreign intelligence arm of the Ministry for State Security; a global history of secret writing from ancient to modern times; and finally, my current project on U.S. intelligence and technology from the Cold War to the War on Terror. The article also discusses the tensions between national security and openness and reflects on the results of this research and its implications for history and for national security. Keywords Central Intelligence Agency, CIA, -
National Security Secrecy: How the Limits Change
Steven Aftergood National Security Secrecy: How the Limits Change as a nation, we seem to be of two minds about secrecy. we know that government secrecy is incompatible with democratic decision-making in obvious ways. By definition, secrecy limits access to official information, thereby impeding public participation in the deliberative process and inhibiting or preventing the accountability of government officials for their actions. Yet there is a near universal consensus that some measure of secrecy is justified and necessary to protect authorized national security activities, such as intelligence gathering and military operations, to permit confidential deliberations in the course of policy development, to secure personal privacy, and for other reasons. Reconciling these conflicting interests is an ongoing challenge. A stable secrecy policy is hard to achieve since the proper boundaries of offi- cial secrecy cannot be clearly articulated in the abstract and tend to shift over time. In practice, decisions to restrict information seem to depend on prevailing security considerations (secrecy is more pronounced in time of war), official predispositions (some political leaders favor secrecy more than others), and public attitudes and expectations. In recent years, a large and growing number of public interest organizations and professional societies have turned their attention to government secrecy, identifying it as an obstacle to achieving their own objectives. In fact, there are at least two entire coalitions of organiza- tions devoted to combating secrecy: Openthegovernment.org and the Research for this paper was supported by grants from the Foundation to Promote Open Society, the HKH Foundation, the CS Fund, the Stewart R. Mott Foundation, and the Rockefeller Family Fund. -
Security, Law Enforcement and Criminal Justice: a Future Partnership Paper
Security, law enforcement and criminal justice A FUTURE PARTNERSHIP PAPER The United Kingdom wants to build a new, deep and special partnership with the European Union. This paper is part of a series setting out key issues which form part of the Government’s vision for that partnership, and which will explore how the UK and the EU, working together, can make this a reality. Each paper will reflect the engagement the Government has sought from external parties with expertise in these policy areas, and will draw on the very extensive work undertaken across Government since last year’s referendum. Taken together, these papers are an essential step towards building a new partnership to promote our shared interests and values. 1 Security, law enforcement and criminal justice: a future partnership paper Executive Summary 1. The UK and the EU face a range of shared threats to the security of their citizens and way of life. The UK and the EU have a shared interest in a secure neighbourhood and in the security of friends and allies around the world. This paper is part of a series being published that sets out key issues that form part of the Government’s vision for the UK’s future partnership with the EU. A paper was published on 12 September that focused on foreign policy, defence and security, and development. This paper builds on that, focusing on security, law enforcement and criminal justice. In order to tackle the threats faced, and work towards common objectives, it is vital that the UK and the EU maintain and strengthen their close collaboration in these areas after the UK’s withdrawal from the EU. -
INTERVENTION of STATE SOVEREIGNTY THROUGH RELEASING STATE SECRECY by WIKILEAKS Engla Puspita Haria, S.H.,M.H
INTERVENTION OF STATE SOVEREIGNTY THROUGH RELEASING STATE SECRECY BY WIKILEAKS Engla Puspita Haria, S.H.,M.H. ABSTRACT The increasing number of disclosure of state secrecy in this age create by Wikileaks make the impact for state sovereignty such as stability of state, disturb the relationship between the state, dysfunction of government and political and economic instance. This number happened because of some factors:1) insufficiency of sophisticated technological support provided by related state, advancement and introducing new technology, collision between staff members. corruptions, and international criminal syndicated:2)the inconstancy law regulated the criminal act about secrecy state;3)technological advances while the human resources that are not reliable. But in other hand, people have right to know and it remarkable in Declaration of Human Right article 19 But there is no regulation at national and international level for Wikileaks. In this research, the study will investigate two problems: 1) what the impact for state sovereignty because of disclosure state secrecy; and 2) what is the legal action to protect state secrecy and study will find the problem of this research and create some offered solution and use the ultimate value in of all part the research with use the existence of legal theory, legal practice, norm or regulations, legal fact and indicated the conflict either. So this research will use normative type of research. In fact, in this research, study has analyze the case of Wikileaks and found that wikileaks already disclosure the data that very important for state sovereignty. Most of their documents are from the people who steal from diplomatic cable of state. -
TRAFFICKING in PERSONS 2020 COUNTRY PROFILE North Africa and the Middle East Table of Contents − Algeria −
GLOBAL REPORT ON TRAFFICKING IN PERSONS 2020 COUNTRY PROFILE North Africa and the Middle East Table of Contents − Algeria − ...................................................................................................................................................... 3 − Bahrain − .................................................................................................................................................... 5 − Egypt − ........................................................................................................................................................ 8 − Iraq − ........................................................................................................................................................ 11 − Israel − ...................................................................................................................................................... 14 − Jordan − .................................................................................................................................................... 17 − The Kingdom of Saudi Arabia − ................................................................................................................ 18 − Kuwait − .................................................................................................................................................... 20 − Lebanon − ................................................................................................................................................ -
Slavery and Exploitation of Syrian Refugees in Lebanon
Struggling to survive: Slavery and exploitation of Syrian refugees in Lebanon 1 The Freedom Fund plays a critical role to [Slavery] is happening identify and invest in the most effective everywhere... front line efforts to end slavery and human Lebanese municipality official trafficking, bringing together a wide range of partners committed to this cause. Commissioned by the Freedom Fund, this report examines the manifestations I know a 12 year old girl of slavery and human trafficking among who has packed her toys Syrian refugees in Lebanon. It draws on in a bag because she has interviews with Syrian refugees in Lebanon, to work. She doesn’t want representatives from Lebanese and people in the camp to see international NGOs, Syrian organisations, UN bodies and Lebanese government her play with her toys and officials. The study, which was conducted think she is young and during January and February 2016, unfit to work. also reviews other recent research and Lebanese municipality official vulnerability assessments. 2 Contents 2 4 5 Executive summary Recommendations Syrian refugees in Lebanon: the growing risk of slavery and trafficking 7 10 12 Child labour Child marriage Sexual exploitation 14 16 21 Forced labour Factors contributing to Conclusion slavery and trafficking of Syrian refugees Acknowledgement We are grateful and humbled by the time and willingness that women, men and children showed in accepting to share their experience with us. We would also like to thank individuals and organisations working on the Syrian refugees crisis for taking time from their busy schedules to share their knowledge and analysis. Dr Katharine Jones Senior Research Fellow, Centre for Trust, Peace and Social Relations, Coventry University Contact: [email protected] Leena Ksaifi Independent Consultant and Director of The George Ksaifi Organization Contact: [email protected] Cover image © Tabitha Ross 1 Executive Summary Since it began in 2011, the conflict in Syria has crisis that has unfolded over the past five years. -
Title 9 Internal Security Division
1970 TITLE 9 INTERNAL SECURITYManual DIVISION Attorneys' S. U. TITLE 9 INTERNAL SECURITY DIVISION CONTENTS Page Criminal Section ...........................•.•.•............•.•• 1 Procedure ..........•............................••..•.• 1 Investigation ......................•...........•••.• 1 Referral procedures ..........•..••..•...........••.• 2 Authorizing prosecution ..................•.........• 2 Fugitives ...........................•......•.......• 2 Statute of limitations ........................••••.•. 19703 Method of commencing action........................ 4 Publicity ................................•.••.....•• 4 Witnesses ......................................•... 4 Rule 20 transfers ...........•........•.............. 5 Pleas •......•...............•..•...............••.•• 5 Dismissals ...........................•.............• 5 Motions ...............................••.........•• 5 General ...........................•..•.•....... 5 Production of documents .............•.......•••• 6 Immunity...........................................Manual 7 Violations of specific criminal statutes..................... 9 Atomic Energy Act of 1954.......................... 9 Contempt of Congress ..........................•...• 10 Espionage .........................................• 12 False statements.................................... 14 Foreign assets control legislation ..................... 15 Labor-Management Reporting and Disclosure Act of 1959. 15 Neutrality laws ...........................••.......• 16 Perjury ........................•........•.........• -
Understanding Self-Deception Through Theory, Evidence and Application
Secrecy and Society ISSN: 2377-6188 Volume 2 Number 2 Teaching Secrecy Article 2 January 2021 Keeping Secrets from Ourselves: Understanding Self-deception Through Theory, Evidence and Application Mathew J. Creighton University College Dublin, Ireland, [email protected] Follow this and additional works at: https://scholarworks.sjsu.edu/secrecyandsociety Part of the Other Sociology Commons Recommended Citation Creighton, Mathew J.. 2021. "Keeping Secrets from Ourselves: Understanding Self- deception Through Theory, Evidence and Application." Secrecy and Society 2(2). https://doi.org/10.31979/2377-6188.2021.020202 https://scholarworks.sjsu.edu/ secrecyandsociety/vol2/iss2/2 This Special Issue Article is brought to you for free and open access by the School of Information at SJSU ScholarWorks. It has been accepted for inclusion in Secrecy and Society by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License. Keeping Secrets from Ourselves: Understanding Self-deception Through Theory, Evidence and Application Abstract Self-deception is a difficult concept to share with students. Although few students find it implausible that they are capable of keeping secrets from themselves, the social theory, application, and practical demonstration of self-deception is far from straightforward. This work offers a three-step approach to teach a theoretically-grounded, evidence-based, and application-reinforced understanding of self-deception. Rooted in work on identity by Mead (1934), the approach outlined here engages with interdisciplinary case studies derived from social psychology (Greenwald, McGhee and Schwartz 1998) and behavioral economics (Ariely 2012).