Secret Pass, Nevada
   HOME

TheInfoList



OR:

Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret. Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy. Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
and confidentiality. It is often contrasted with social transparency. Secrecy can exist in a number of different ways: encoding or encryption (where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as through government security classification) and
obfuscation Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent u ...
, where secrets are hidden in plain sight behind complex idiosyncratic language ( jargon) or steganography. Another classification proposed by Claude Shannon in 1948 reads there are three systems of secrecy within communication: # concealment systems, including such methods as invisible ink, concealing a message in an innocent text, or in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the enemy # privacy systems, for example, voice inversion, in which special equipment is required to recover the message # "true" secrecy systems where the meaning of the message is concealed by the cypher, code, etc., although its existence is not hidden, and the enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal


Sociology

Animals conceal the location of their
den Den may refer to: * Den (room), a small room in a house * Maternity den, a lair where an animal gives birth Media and entertainment * ''Den'' (album), 2012, by Kreidler * Den (''Battle Angel Alita''), a character in the ''Battle Angel Alita' ...
or nest from
predators Predation is a biological interaction where one organism, the predator, kills and eats another organism, its prey. It is one of a family of common feeding behaviours that includes parasitism and micropredation (which usually do not kill the ...
. Squirrels bury nuts, hiding them, and they try to remember their locations later. Humans attempt to consciously conceal aspects of themselves from others due to shame, or from fear of violence, rejection, harassment, loss of
acceptance Acceptance in human psychology is a person's assent to the reality of a situation, recognizing a process or condition (often a negative or uncomfortable situation) without attempting to change it or protest it. The concept is close in meaning to ...
, or loss of
employment Employment is a relationship between two parties regulating the provision of paid labour services. Usually based on a contract, one party, the employer, which might be a corporation, a not-for-profit organization, a co-operative, or any othe ...
. Humans may also attempt to conceal aspects of their own self which they are not capable of incorporating psychologically into their conscious being. Families sometimes maintain " family secrets", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family honor. The information may even be something as trivial as a
recipe A recipe is a set of instructions that describes how to prepare or make something, especially a dish of prepared food. A sub-recipe or subrecipe is a recipe for an ingredient that will be called for in the instructions for the main recipe. His ...
. Secrets are sometimes kept to provide the pleasure of surprise. This includes keeping secret about a
surprise party A party is a gathering of people who have been invited by a host for the purposes of socializing, conversation, recreation, or as part of a festival or other commemoration or celebration of a special occasion. A party will often feature ...
, not telling
spoiler Spoiler is a security vulnerability on modern computer central processing units that use speculative execution. It exploits side-effects of speculative execution to improve the efficiency of Rowhammer and other related memory and cache attacks. Ac ...
s of a story, and avoiding exposure of a magic trick. Keeping one's
strategy Strategy (from Greek στρατηγία ''stratēgia'', "art of troop leader; office of general, command, generalship") is a general plan to achieve one or more long-term or overall goals under conditions of uncertainty. In the sense of the "art ...
secret is important in many aspects of
game theory Game theory is the study of mathematical models of strategic interactions among rational agents. Myerson, Roger B. (1991). ''Game Theory: Analysis of Conflict,'' Harvard University Press, p.&nbs1 Chapter-preview links, ppvii–xi It has appli ...
. In anthropology secret sharing is one way for people to establish traditional relations with other people. A commonly used narrative that describes this kind of behavior is
Joseph Conrad Joseph Conrad (born Józef Teodor Konrad Korzeniowski, ; 3 December 1857 – 3 August 1924) was a Poles in the United Kingdom#19th century, Polish-British novelist and short story writer. He is regarded as one of the greatest writers in t ...
's short story "
The Secret Sharer "The Secret Sharer" is a short story by Polish-British author Joseph Conrad, originally written in 1909 and first published in two parts in the August and September 1910 editions of '' Harper's Magazine''. It was later included in the short st ...
".


Government

Governments often attempt to conceal information from other governments and the public. These state secrets can include weapon designs, military plans,
diplomatic Diplomatics (in American English, and in most anglophone countries), or diplomatic (in British English), is a scholarly discipline centred on the critical analysis of documents: especially, historical documents. It focuses on the conventions, p ...
negotiation tactics, and secrets obtained illicitly from others (" intelligence"). Most nations have some form of
Official Secrets Act An Official Secrets Act (OSA) is legislation that provides for the protection of state secrets and official information, mainly related to national security but in unrevised form (based on the UK Official Secrets Act 1911) can include all infor ...
(the Espionage Act in the U.S.) and classify material according to the level of protection needed (hence the term " classified information"). An individual needs
security clearance
for access and other protection methods, such as keeping documents in a
safe A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and ...
, are stipulated. Few people dispute the desirability of keeping Critical Nuclear Weapon Design Information secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S.
Freedom of Information Act Freedom of Information Act may refer to the following legislations in different jurisdictions which mandate the national government to disclose certain data to the general public upon request: * Freedom of Information Act 1982, the Australian act * ...
and
sunshine law Freedom of information laws allow access by the general public to data held by national governments and, where applicable, by state and local governments. The emergence of freedom of information legislation was a response to increasing dissatisfa ...
s. Government officials sometimes leak information they are supposed to keep secret. (''For a recent (2005) example, see Plame affair.'') Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.


Corporations

Organizations, ranging from multi-national for profit corporations to nonprofit
charities A charitable organization or charity is an organization whose primary objectives are philanthropy and social well-being (e.g. educational, religious or other activities serving the public interest or common good). The legal definition of a cha ...
, keep secrets fo
competitive advantage
to meet legal requirements, or, in some cases, to conceal nefarious behavior. New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by trade secret laws. Research on corporate secrecy has studied the factors supporting secret organizations. In particular, scholars in economics and management have paid attention to the way firms participating in cartels work together to maintain secrecy and conceal their activities from antitrust authorities. The diversity of the participants (in terms of age and size of the firms) influences their ability to coordinate to avoid being detected. The patent system encourages inventors to publish information in exchange for a limited time monopoly on its use, though patent applications are initially secret. Secret societies use secrecy as a way to attract members by creating a sense of importance.
Shell companies A shell corporation is a company or corporation that exists only on paper and has no office and no employees, but may have a bank account or may hold passive investments or be the registered owner of assets, such as intellectual property, or s ...
may be used to launder money from criminal activity, to finance terrorism, or to evade taxes. Registers of beneficial ownership aim at fighting corporate secrecy in that sense. Other laws ''require'' organizations to keep certain information secret, such as
medical record The terms medical record, health record and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and care across time within one particular health care provider's jurisdic ...
s (
HIPAA The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Kennedy– Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 19 ...
in the U.S.), or
financial report Financial statements (or financial reports) are formal records of the financial activities and position of a business, person, or other entity. Relevant financial information is presented in a structured manner and in a form which is easy to un ...
s that are under preparation (to limit
insider trading Insider trading is the trading of a public company's stock or other securities (such as bonds or stock options) based on material, nonpublic information about the company. In various countries, some kinds of trading based on insider information ...
). Europe has particularly strict laws about database privacy. In many countries,
neoliberal Neoliberalism (also neo-liberalism) is a term used to signify the late 20th century political reappearance of 19th-century ideas associated with free-market capitalism after it fell into decline following the Second World War. A prominent fa ...
reforms of government have included expanding the outsourcing of government tasks and functions to private businesses with the aim of improving efficiency and effectiveness in government administration. However, among the criticisms of these reforms is the claim that the pervasive use of
Commercial-in-confidence
(or secrecy) clauses in contracts between government and private providers further limits public accountability of governments and prevents proper public scrutiny of the performance and probity of the private companies. Concerns have been raised that 'commercial-in-confidence' is open to abuse because it can be deliberately used to hide corporate or government maladministration and even corruption.


Computing

Preservation of secrets is one of the goals of information security. Techniques used include physical security and cryptography. The latter depends on the secrecy o
cryptographic keys
Many believe that security technology can be more effective if it itself is not kept secret.
Information hiding
is a design principle in much software engineering. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.


Military

Military secrecy is the concealing of information about martial affairs that is purposely not made available to the general public and hence to any enemy, in order to gain an advantage or to not reveal a weakness, to avoid embarrassment, or to help in
propaganda Propaganda is communication that is primarily used to influence or persuade an audience to further an agenda, which may not be objective and may be selectively presenting facts to encourage a particular synthesis or perception, or using loaded ...
efforts. Most military secrets are tactical in nature, such as the strengths and weaknesses of weapon systems, tactics, training methods, plans, and the number and location of specific weapons. Some secrets involve information in broader areas, such as secure communications, cryptography, intelligence operations, and cooperation with third parties.


Views

Excessive secrecy is often citedLightfoot, Geoffrey, and Tomasz Piotr Wisniewski. "Information asymmetry and power in a surveillance society." Information and Organization 24.4 (2014): 214-235. as a source of much human conflict. One may have to
lie A lie is an assertion that is believed to be false, typically used with the purpose of deceiving or misleading someone. The practice of communicating lies is called lying. A person who communicates a lie may be termed a liar. Lies can be inter ...
in order to hold a secret, which might lead to
psychological Psychology is the scientific study of mind and behavior. Psychology includes the study of conscious and unconscious phenomena, including feelings and thoughts. It is an academic discipline of immense scope, crossing the boundaries between t ...
repercussions. The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question. Nearly 2500 years ago, Sophocles wrote, "Do nothing secretly; for Time sees and hears all things, and discloses all."
Gautama Siddhartha Siddhartha Gautama, most commonly referred to as the Buddha, was a wandering ascetic and religious teacher who lived in South Asia during the 6th or 5th century BCE and founded Buddhism. According to Buddhist tradition, he was born in Lu ...
, the Buddha, once said "Three things cannot long stay hidden: the sun, the moon and the truth".


See also

*
Ambiguity Ambiguity is the type of meaning in which a phrase, statement or resolution is not explicitly defined, making several interpretations plausible. A common aspect of ambiguity is uncertainty. It is thus an attribute of any idea or statement ...
* Banking secrecy * Classified information * Concealment device * Confidentiality *
Conspiracy theory A conspiracy theory is an explanation for an event or situation that invokes a conspiracy by sinister and powerful groups, often political in motivation, when other explanations are more probable.Additional sources: * * * * The term has a nega ...
*
Covert operation A covert operation is a military operation intended to conceal the identity of (or allow plausible deniability by) the party that instigated the operation. Covert operations should not be confused with clandestine operations, which are performe ...
* Cover-up *
Deception Deception or falsehood is an act or statement that misleads, hides the truth, or promotes a belief, concept, or idea that is not true. It is often done for personal gain or advantage. Deception can involve dissimulation, propaganda and sleight o ...
* Don't ask, don't tell * Espionage * Freedom of information legislation *
Media transparency Media transparency (or transparent media), also referred to as Media Opacity, is a concept that explores how and why information subsidies are being produced, distributed and handled by media professionals, including journalists, editors, public r ...
* Need to know * Open secret *
Secrecy (sociology) The sociological aspects of secrecy were first studied by Georg Simmel in the early-1900s. Simmel describes secrecy as the ability or habit of keeping secrets. He defines the secret as the ultimate sociological form for the regulation of the flow ...
* Secret passage * Secret sharing * Self-concealment *
Somebody Else's Problem "Somebody else's problem" or "someone else's problem" is an issue which is dismissed by a person on the grounds that they consider somebody else to be responsible for it, or that it is " out of scope" in a particular context. Examples A 1976 ed ...
*
Smuggling Smuggling is the illegal transportation of objects, substances, information or people, such as out of a house or buildings, into a prison, or across an international border, in violation of applicable laws or other regulations. There are various ...
*
State Secrets Privilege The state secrets privilege is an evidentiary rule created by United States legal precedent. Application of the privilege results in exclusion of evidence from a legal case based solely on affidavits submitted by the government stating that court ...
* '' Sub rosa'' * WikiLeaks


References

* * * * * * * * * * * * * * ::Also available as:
Preview.


Further reading

*


External links


An Open Source Collection of Readings on Secrecy

Secrecy News
from the
Federation of American Scientists The Federation of American Scientists (FAS) is an American nonprofit global policy think tank with the stated intent of using science and scientific analysis to attempt to make the world more secure. FAS was founded in 1946 by scientists who wo ...
{{Authority control Classified information