Download Free A State Of Secrecy Book in PDF and EPUB Free Download. You can read online A State Of Secrecy and write the review.

Secret police agencies such as the East German Ministry for State Security kept enormous quantities of secrets about their own citizens, relying heavily on human modes of data collection in the form of informants. To date little is known about the complicated and conflicted lives of informers, who often lived in a perpetual state of secrecy. This is the first study of its kind to explore this secret surveillance society, its arcane rituals, and the secret lives it fostered. Through a series of interlocking, in-depth case studies of informers in literature and the arts, A State of Secrecy seeks answers to the question of how the collusion of the East German intelligentsia with the Stasi was possible and sustainable. It draws on extensive original archive research conducted in the BStU (Stasi Records Agency), as well as eyewitness testimony, literature, and film, and uses a broad array of methods from biography, sociology, cultural studies, and literary history to political science and surveillance and intelligence studies. In teasing out the various kinds of entanglements of intellectuals with power during the Cold War, Lewis presents a microhistory of the covert activities of those writers who colluded with the secret police.
In State Secrecy and Security: Refiguring the Covert Imaginary, William Walters calls for secrecy to be given a more central place in critical security studies and elevated to become a core concept when theorising power in liberal democracies. Through investigations into such themes as the mobility of cryptographic secrets, the power of public inquiries, the connection between secrecy and place-making, and the aesthetics of secrecy within immigration enforcement, Walters challenges commonplace understandings of the covert and develops new concepts, methods and themes for secrecy and security research. Walters identifies the covert imaginary as both a limit on our ability to think politics differently and a ground to develop a richer understanding of power. State Secrecy and Security offers readers a set of thinking tools to better understand the strange powers that hiding, revealing, lying, confessing, professing ignorance and many other operations of secrecy put in motion. It will be a valuable resource for scholars and students of security, secrecy and politics more broadly.
There is a hidden country within the United States. It was formed from the astonishing number of secrets held by the government and the growing ranks of secret-keepers given charge over them. The government secrecy industry speaks in a private language of codes and acronyms, and follows an arcane set of rules and customs designed to perpetuate itself, repel penetration, and deflect oversight. It justifies itself with the assertion that the American values worth preserving are often best sustained by subterfuge and deception. Deep State, written by two of the country's most respected national security journalists, disassembles the secrecy apparatus of the United States and examines real-world trends that ought to trouble everyone from the most aggressive hawk to the fiercest civil libertarian. The book: - Provides the fullest account to date of the National Security Agency’s controversial surveillance program first spun up in the dark days after 9/11. - Examines President Obama's attempt to reconcile his instincts as a liberal with the realities of executive power, and his use of the state secrets doctrine. - Exposes how the public’s ubiquitous access to information has been the secrecy industry's toughest opponent to date, and provides a full account of how WikiLeaks and other “sunlight” organizations are changing the government's approach to handling sensitive information, for better and worse. - Explains how the increased exposure of secrets affects everything from Congressional budgets to Area 51, from SEAL Team Six and Delta Force to the FBI, CIA, and NSA. - Assesses whether the formal and informal mechanisms put in place to protect citizens from abuses by the American deep state work, and how they might be reformed.
Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, Rahul Sagar argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously--that is, to "leak" information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, Sagar writes, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism.
New essays exploring the tension between the versions of the past in secret police files and the subjects' own personal memories-and creative workings-through-of events.
Fascinating account of the British state's post-war obsession with secrecy and the ways it prevented secret activities from becoming public.
Traces the development of secrecy as a government policy over the twentieth century and its adverse effects on Cold War policy making
For the first time available in English, a selection of some of Inger Christensen's most insightful essays and poetic prose pieces
"Nuclear weapons, since their conception, have been the subject of secrecy. In the months after the dropping of the atomic bombs on Hiroshima and Nagasaki, the American scientific establishment, the American government, and the American public all wrestled with what was called the "problem of secrecy," wondering not only whether secrecy was appropriate and effective as a means of controlling this new technology but also whether it was compatible with the country's core values. Out of a messy context of propaganda, confusion, spy scares, and the grave counsel of competing groups of scientists, what historian Alex Wellerstein calls a "new regime of secrecy" was put into place. It was unlike any other previous or since. Nuclear secrets were given their own unique legal designation in American law ("restricted data"), one that operates differently than all other forms of national security classification and exists to this day. Drawing on massive amounts of declassified files, including records released by the government for the first time at the author's request, Restricted Data is a narrative account of nuclear secrecy and the tensions and uncertainty that built as the Cold War continued. In the US, both science and democracy are pitted against nuclear secrecy, and this makes its history uniquely compelling and timely"--
This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.