Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
2,089
result(s) for
"Security classification (Government documents)"
Sort by:
DO YOU HAVE TO KEEP THE GOVERNMENT'S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD
2015
Now you see it. Now you don't.
This is not a magician's incantation. It is a description of retroactive classification, a little-known provision of U.S. national security law that allows the government to declassify a document, release it to the public, and then declare it classified later on. Retroactive classification means the government could hand you a document today and prosecute you tomorrow for not giving it back. Retroactive classification can even reach documents that are available in public libraries, on the Internet, or elsewhere in the public domain.
Journal Article
The switch
\"A simple mix up throws one innocent man into the crosshairs of sinister government secrets and ruthless political ambitions\"--Provided by publisher. Michael Tanner is on his way home from a business trip when he accidentally picks up the wrong MacBook in an airport security line. Home in Boston, he discovers that the owner is a US senator and that the laptop contains top secret files. When Senator Susan Robbins realizes she's come back with the wrong laptop, she calls her young chief of staff, Will Abbott, in a panic. Both know that the senator broke the law by uploading classified documents onto her personal computer. Abbott turns to a \"fixer\" to retrieve the laptop before a bigger security breach is revealed.
Documenting Classification Systems: A Case Study and Considerations
2023
There is little literature on documenting the correct application of classification systems. This paper seeks to remedy this gap by describing how Northeastern Illinois University created documentation for their implementation of system that describes Illinois State publications. We recommend creating documentation that is flexible, accessible, and user-oriented. Flexible documentation not only facilitates changes to the documentation, it also allows librarians to take advantage of other uses of this documentation. In our case, the process of documentation produced a near complete listing of Illinois publications and provided the basis for a structural history of Illinois government. Documentation of classification systems not only improves library work, but also assists in preserving artifacts of library history.
Journal Article
The declassification engine : what history reveals about America's top secrets
\"Historian Matthew Connelly analyzes the millions of state documents both accessible to the public and still under review to unearth not only what the government does not want us to know, but what it says about the very authority we bequeath to our leaders. By culling this research and studying a series of pivotal moments in recent history from Pearl Harbor to drone strikes, Connelly sheds light on the drivers of state secrecy (especially consolidating power or hiding incompetence) and how the classification of documents has become untenable. What results is a study of power: of the greed that develops out of its possession, of the negligence that it protects, and of what we lose as citizens when it remains unchecked\"-- Provided by the publisher.
A Review of the Department of Energy Classification
by
Commission on Geosciences, Environment and Resources
,
Council, National Research
,
Studies, Division on Earth and Life
in
Dept. of Energy
,
Security classification (Government documents)
,
United States
2000,1995
With the end of the Cold War, the Department of Energy is engaged in a review of its policies regarding the classification of information. In 1994, the Secretary of Energy requested the assistance of the National Research Council in an effort to \"lift the veil of Cold War secrecy.\" This book recommends fundamental principles to guide declassification policy. It also offers specific suggestions of ways to improve public access while protecting truly sensitive information.
SECRECY SURROGATES
2020
Debates about how best to check executive branch abuses of secrecy focus on three sets of actors that have access to classified information and that traditionally have served—in one way or another—as our surrogates: congressional committees, federal courts, and leakers or whistleblowers. These actors provide only limited checks on the Executive's misuse of secrecy, however. Most legal scholarship bemoans their flaws but concludes that the status quo is the best that we can do. This Article challenges this account, arguing that there is a different set of actors—a set of unsung \"secrecy surrogates\"—that can provide additional checks on the quality and legality of the Executive's classified operations in the cyber, election, and counter-terrorism settings.
Technology companies, states and localities, and foreign allies have become an integral part of U.S. national security operations and enjoy some critical advantages over our traditional surrogates. These actors possess expertise about—and in some cases control—national security-related targets, making them essential partners for the Executive. Further, these surrogates have incentives to check the Executive in ways that advance the public law values of accuracy, accountability, and legality. Finally, unlike leakers, these unsung secrecy surrogates can challenge the Executive without revealing government secrets. These surrogates can only check government abuses of secrecy as long as the Executive requires their cooperation, but they have begun to supplement our traditional surrogates in important ways.
This Article maps the growing role of these unsung secrecy surrogates, argues that they are well-situated to address some persistent secrecy problems, and proposes ways to preserve and enhance the surrogates' position in the secrecy ecosystem in the future.
Journal Article