SUB Hamburg B/91905 GOVERNMENT SECRECY. Classic and Contemporary Readings EDITED BY SUSAN L. MARET AND JAN GOLDMAN

Similar documents
HTS XXX Sample Syllabus for a new graduate course on Science, Technology and Security Professor Kristie Macrakis Fall 2011

Table of Contents. Part I Introduction to the Topic. Part II History of Intelligence

COLOSSUS HOW THE CORPORATION CHANGED AMERICA R O A D W A Y B O O K S / N E W Y O R K

SPACE ENGINEERING, ARCHAEOLOGY AND HERITAGE

InfoCulture: Theory and Methods in the History and Sociology of Information Technology

FALL 2018 NEW ENGLAND ARCHIVISTS MEETING FRIDAY, OCTOBER 26, 2018 JOHN F. KENNEDY PRESIDENTIAL LIBRARY & MUSEUM, BOSTON, MA

Interdisciplinary Economics

The Information Age. Science, Technology, and Society STSC-160 Professor Nathan L. Ensmenger

The Best Lawyers in America 2009

SOCI 425 Industrial Sociology I

Christopher Newport Henrico County Public Schools Division of Instruction Social Studies: SOL VS.3a. Special Thanks To Troy Pearson Illustrator

Using the Records of the National Archives and Records Administration (NARA)

Thomas Jefferson High School for Science and Technology INTRODUCTION TO SCIENCE POLICY Program of Studies

The Poisonwood Bible. Congolese and American Historical Allusions

The Information Age. STSC 160 Fall 2007

DILEMMAS OF URBAN ECONOMIC DEVELOPMENT

John F. Kennedy and the New Frontier

Baugh Family Genealogy

Sheriff Derby served three terms as Sheriff. He had served previously as a deputy sheriff and as chief of the Rainier Police Department.

CONTENTS. Introduction In Memoriam Remembrances... 17

Studies in Economic Ethics and Philosophy

Contents SECTION ONE: Introduction: Players and Paradigms

Descendants of Joseph Nejedlo. Generation No. 1. Generation No ii. Frank Nejedlo, born January 20, 1872; died Unknown.

Robert D. Luskin. Washington, D.C. Practice Areas. Admissions. Education. Partner, Litigation Department

Living Throug The Space Race (Living Through The Cold War) By Bill McConnell

Other Approaches to Civil-Military Integration: The Chinese and Japanese Arms Industries. March OTA-BP-ISS-143 GPO stock #

Loyola University Chicago ~ University Archives

Edward Patterson Ted Riley ( )

In Memoriam Roll Call of the Fallen Class of 1973

HANDBOOK OF CAPTURE-RECAPTURE ANALYSIS

THE INNER VISION. Liberty and Literature. Edited by Edward B. McLean

s & 70s. Earth s"crust" 3-40 miles thick rock "mantel" 1800 miles thick interface ~ Mohorovici c discontinuity Ë Origin of Mohole:

Fundamentals of Kalxnan Filtering: A Practical Approach

CONSTITUTIONAL RIGHTS FOUNDATION Board Committees 2013

the Anglo-Persian Oil Company 1912 (the Turkish Petroleum Company) Foreign Office Agreement 50 beneficiary interest Calouste

SHAKESPEARE. Critical Interpretations of Shakespeare's Plays and Poetry SECOND EDITION: VOLUME 1 THOMSON GALE

The Washington Embassy

GANESH SITARAMAN EDUCATION ACADEMIC APPOINTMENTS PROFESSIONAL EXPERIENCE. Vanderbilt Law School st Ave S, Nashville, TN 37203

DAVIS WRIGHT TREMAINE LLP

Association of Government Accountants Boston Chapter Annual History Report

KENNETH E. BENTSEN, JR. President and CEO SIFMA

AIG Fall 2014 Training Event AGENDA October 20 th to 24 th, 2014 Page 1 of 6. Wednesday, October 22, 2014 Salons 4-8

Hastings Public School s Key Concepts and Essentials

Flight From Dallas: New Evidence Of CIA Involvement In The Murder Of President John F. Kennedy By James P. Johnston

Short Works in American Literature

C Missouri Extension Homemakers Association, Inc., Mural Documentation Project, linear feet

The Dark Side of Data The NSA ThinThread Tale

Making Things Better: Competing in Manufacturing. February OTA-ITE-443 NTIS order #PB

5. Why does the government need this information?

Warren Commission. Alphabetical Listing of People Who Had Personal Contact With L.H. Oswald and Who Provided Information

Grand Commandery of Knights Templar of Arizona Committees for

COMMITTEES AND PROGRAMS

Reykjavik Revisited Conference Participants

Successful Science Communication

APPLICATION FOR APPROVAL OF A IENG EMPLOYER-MANAGED FURTHER LEARNING PROGRAMME

SOC 376 Wars on Science: AIDS, Autism, and Other Controversies

Fusion Fiasco. Steven B. Krivit EXPLORATIONS IN NUCLEAR RESEARCH, VOL. 2. Edited by Michael J. Ravnitzky

Descendants of Walter and Martha Cox Griffith

Clare Palmer, 2006, p.1

Communication and Media Studies (COMS)

Editorial Preface ix EDITORIAL PREFACE. Andrew D. Bailey, Jr. Audrey A. Gramling Sridhar Ramamoorti

THE GEORGE LUTZAI COLLECTION. 14 Manuscript Boxes. Processed: May, 1967 Accession Number 19 By: PCG

1987 PROOF SET 1988 PROOF SET 1988 PROOF SET 1987 MINT SET 1980 MINT SET 1985 MINT SET 1987 MINT SET 1993 MINT SET 1992 MINT SET 1990 MINT SET 1991

Policy, Politics, and Science in the White House: Conversations with Presidential Science Advisors. Bobbie Klein

FLOREX 2012 PALMARES

JFK And LBJ;: The Influence Of Personality Upon Politics By Tom Wicker

Series 13: Scrapbooks Series, , bulk volumes and 9 rolls of microfilm.

CHOLERA FIELD CHURCHYARD RECORD OF DETAILS ON HEADSTONES

Internet, Human Rights and privacy

Villanova University School of Law Commencement Program - Class of 1965

Chapter 1 The Military Operational Environment... 3

If our speech. A compelling and troubling work. Elizabeth Fox-Genovese author of Feminism Without Illusions

Steven P. Andreasen Bruce G. Blair Matthew Bunn Sidney D. Drell

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Cost Analysis and Estimating

2017 Trainer/Second Licensees Name Sex Age DateOfBirth Phone

PHIL 183: Philosophy of Technology

Organizational Crisis Management

Information Sociology

PROJECT-DRIVEN TECHNOLOGY STRATEGY: KNOWLEDGE <=> TECHNOLOGY

CWA Containing Nuclear Power Overview

HERBERT A. FIERST PAPERS,

Lee Harvey Oswald at Age 62

The Critical Response to Arthur Miller

X On record with the USOE.

"America's Royal Family" Joseph P. Kennedy married Rose

Physicists predict a nuclear arms race,

Mark Coeckelbergh (University of Twente, NL) FREEDOM, SECURITY, PRIVACY OR HOW TO LIVE WITH NEW INFORMATION AND COMMUNICATION TECHNOLOGIES

Report to Congress regarding the Terrorism Information Awareness Program

Status of Financial Regulatory Leadership Changes

Impact of Mass Media. Ray Eldon Hiebert. Carol Reuss University of North Carolina at Chapel Hill CURRENT ISSUES. Third Edition.

CONTENTS FOREWORD... VII ACKNOWLEDGMENTS... IX CONTENTS... XI LIST OF FIGURES... XVII LIST OF TABLES... XIX LIST OF ABBREVIATIONS...

Executive Summary of Climate Change BENGALI. Reconsidered

First Generation. Second Generation

JAMES A. SCHMITZ, JR. Curriculum Vitae December, 2012

PUBLICATIONS Books: (2018) Why Paramilitary Operations Fail, New York: Palgrave Macmillan (forthcoming).

Postdisciplinary Studies in Discourse

Financial and Monetary History of the United States Economics 344:01 Fall 2007

Born: August 4, 1961 Hawaii Lives in Chicago, Illinois Has served 1 years in office and has 2 years left

Political Science 101: Global Nuclear Politics

Transcription:

SUB Hamburg B/91905 GOVERNMENT SECRECY Classic and Contemporary Readings EDITED BY SUSAN L. MARET AND JAN GOLDMAN U N L I M I T E D A Member of the Greenwood Publishing Group Westport, Connecticut London

Foreword by Steven Aftergood Acknowledgments Introduction: Overview and Organization of Government Secrecy: Classic and Contemporary Readings by xiii xv xvii Chapter 1: Perspectives on Secrecy Introduction 3 Lisa Blank Letter to Edward Carrington (1787) 6 Thomas Jefferson The Sociology of Secrecy and of Secret Societies (1906) 8 Georg Simmel Bureaucracy: Characteristics and the Power Position of Bureaucracy (1920) 44 Max Weber Publicity, Privacy, and Secrecy: Their Equilibrium and Its Disruption (1956) 50 Edward Shils Two Schools for Secrecy: Defining Secrecy from the Works of Max Weber, Georg Simmel, Edward Shils, and Sissela Bok (2008) 59 Lisa Blank

Administrative Secrecy: A Congressional Dilemma (1960) 69 Francis E. Rourke Nature and Function of Secrecy and Propaganda (1972) 85 CarlJ. Friedrich Overview: Protecting Secrets and Reducing Secrecy (1997) 97 Chapter 2: A Short History of Government Secrecy Introduction 117 The Framing of the Constitution (1981) 121 Daniel N. Hoffman Building Our Own "Iron Curtain": The Emergence of Secrecy in American Government (2005) 146 Timothy L. Ericson The Experience of the First World War (1997) 177 Ending the Cold War at Home (1990-1991) 211 Morton H. Halperin and Jeanne M. Woods Government Secrecy: Policy Depths and Dimensions (2003) 222 Harold C. Relyea The Problem of Secrecy and the Solution of the JFK Act (1998) 246 Assassination Records Review Board Presidential Papers in Crisis: Some Thoughts on Lies, Secrets, and Silence (1996) 260 Blanche Wiesen Cook Secrecy, Archives, and the Public Interest (1977) 269 Howard Zinn Chapter 3: Secrecy as Regulation Introduction 281 Secrecy as Regulation (1997) 287

ix Government Secrecy and Knowledge Production: A Survey of Some General Issues (1999) 296 Steven Aftergood Secret Sessions of Congress: A Brief Historical Overview (2007) 305 Mildred Amer The Dysfunctions of Military Secrecy (1963) 311 Lewis A. Coser The Early Years of the Freedom of Information Act 1955 to 1974 322 Sam Archibald Science and the National Security State (1993) 333 Herbert N. Foerstel The H-Bomb Secret: To Know How Is to Ask Why (1979) 346 Howard Morland Secrecy and International Relations (1995) 360 David N. Gibbs In Camera Review of Classified Environmental Impact Statements: A Threatened Opportunity? (1996) 381 William R. Mendelsohn Chapter 4: Organizational Aspects of Secrecy Introduction 399 Secrecy in American Bureaucracy (1957) 404 Francis E. Rourke The CIA and Secrecy (1998) 421 James X. Dempsey Dissent and the State: Unleashing the FBI, 1917-1985 (1990) 439 Athan G. Theoharis Congressional Oversight of NSA: A Brief Review (2001) 449 Richard A. Best Jr. The Securocrats' Revenge (1999) 457 Steven Aftergood and Tom Blanton Structural Secrecy (1997) 460 Diane Vaughan

Chapter 5: Necessary Secrets: Alternative Views on the Need for Secrets and Secret Keeping Introduction 471 Jan Goldman Intelligence Secrecy and Security in a Free Society (1976) 477 William E. Colby Rethinking Classification: Better Protection and Greater Openness (1997) 487 Sharing Secrets with Lawmakers: Congress as a User of Intelligence (1998) 518 L. Britt Snider Secret Intelligence, Covert Action, and Clandestine Diplomacy (2004) 546 Len Scott Openness and the CIA (2000) 563 Warren F. Kimball Democratic Secrecy (1999) 570 Dennis F. Thompson Civil Liberties vs. Intelligence Collection: The Secret Foreign Intelligence Surveillance Act Court Speaks in Public (2003) 582 Lee S. Strickland Chapter 6: Secrecy Post-9/11 and the Uncertain Future of Information Introduction 595 National Security and Open Government in the United States: Beyond the Balancing Test (2003) 600 Thomas S. Blanton Attempts to Obtain Administration Memorandums (2004) 627 Senator Patrick Leahy (D-Vermont) State Secrets and Executive Power (2005) 632 William G. Weaver and Robert M. Pallitto Social Theory Meets Social Policy: Culture, Identity, and Public Information Policy after September 11 (2006) 657 Peter M. Shane

xi Secrecy as Mystification of Power: Meaning and Ethics in the Security State (2006) 674 Paul Gowder Executive Summary, Secrecy Report Card (2008) 695 OpentheGovernment. org On Liberty, the Right to Know, and Public Discourse: The Role of Transparency in Public Life (1999) 697 Joseph E. Stiglitz Appendix A: Major Reviews of the U.S. Secrecy System 719 Appendix B: Laws That Restrict Public Access to Federal Records 723 Appendix C: Errata to "The H-Bomb Secret" by Howard Morland 745 Sources 747 Glossary 751 Further Reading 763 About the Contributors 773 Index 779 About the Editors 795