Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
2,089 result(s) for "Security classification (Government documents)"
Sort by:
DO YOU HAVE TO KEEP THE GOVERNMENT'S SECRETS? RETROACTIVELY CLASSIFIED DOCUMENTS, THE FIRST AMENDMENT, AND THE POWER TO MAKE SECRETS OUT OF THE PUBLIC RECORD
Now you see it. Now you don't. This is not a magician's incantation. It is a description of retroactive classification, a little-known provision of U.S. national security law that allows the government to declassify a document, release it to the public, and then declare it classified later on. Retroactive classification means the government could hand you a document today and prosecute you tomorrow for not giving it back. Retroactive classification can even reach documents that are available in public libraries, on the Internet, or elsewhere in the public domain.
The switch
\"A simple mix up throws one innocent man into the crosshairs of sinister government secrets and ruthless political ambitions\"--Provided by publisher. Michael Tanner is on his way home from a business trip when he accidentally picks up the wrong MacBook in an airport security line. Home in Boston, he discovers that the owner is a US senator and that the laptop contains top secret files. When Senator Susan Robbins realizes she's come back with the wrong laptop, she calls her young chief of staff, Will Abbott, in a panic. Both know that the senator broke the law by uploading classified documents onto her personal computer. Abbott turns to a \"fixer\" to retrieve the laptop before a bigger security breach is revealed.
Documenting Classification Systems: A Case Study and Considerations
There is little literature on documenting the correct application of classification systems. This paper seeks to remedy this gap by describing how Northeastern Illinois University created documentation for their implementation of system that describes Illinois State publications. We recommend creating documentation that is flexible, accessible, and user-oriented. Flexible documentation not only facilitates changes to the documentation, it also allows librarians to take advantage of other uses of this documentation. In our case, the process of documentation produced a near complete listing of Illinois publications and provided the basis for a structural history of Illinois government. Documentation of classification systems not only improves library work, but also assists in preserving artifacts of library history.
The declassification engine : what history reveals about America's top secrets
\"Historian Matthew Connelly analyzes the millions of state documents both accessible to the public and still under review to unearth not only what the government does not want us to know, but what it says about the very authority we bequeath to our leaders. By culling this research and studying a series of pivotal moments in recent history from Pearl Harbor to drone strikes, Connelly sheds light on the drivers of state secrecy (especially consolidating power or hiding incompetence) and how the classification of documents has become untenable. What results is a study of power: of the greed that develops out of its possession, of the negligence that it protects, and of what we lose as citizens when it remains unchecked\"-- Provided by the publisher.
A Review of the Department of Energy Classification
With the end of the Cold War, the Department of Energy is engaged in a review of its policies regarding the classification of information. In 1994, the Secretary of Energy requested the assistance of the National Research Council in an effort to \"lift the veil of Cold War secrecy.\" This book recommends fundamental principles to guide declassification policy. It also offers specific suggestions of ways to improve public access while protecting truly sensitive information.
SECRECY SURROGATES
Debates about how best to check executive branch abuses of secrecy focus on three sets of actors that have access to classified information and that traditionally have served—in one way or another—as our surrogates: congressional committees, federal courts, and leakers or whistleblowers. These actors provide only limited checks on the Executive's misuse of secrecy, however. Most legal scholarship bemoans their flaws but concludes that the status quo is the best that we can do. This Article challenges this account, arguing that there is a different set of actors—a set of unsung \"secrecy surrogates\"—that can provide additional checks on the quality and legality of the Executive's classified operations in the cyber, election, and counter-terrorism settings. Technology companies, states and localities, and foreign allies have become an integral part of U.S. national security operations and enjoy some critical advantages over our traditional surrogates. These actors possess expertise about—and in some cases control—national security-related targets, making them essential partners for the Executive. Further, these surrogates have incentives to check the Executive in ways that advance the public law values of accuracy, accountability, and legality. Finally, unlike leakers, these unsung secrecy surrogates can challenge the Executive without revealing government secrets. These surrogates can only check government abuses of secrecy as long as the Executive requires their cooperation, but they have begun to supplement our traditional surrogates in important ways. This Article maps the growing role of these unsung secrecy surrogates, argues that they are well-situated to address some persistent secrecy problems, and proposes ways to preserve and enhance the surrogates' position in the secrecy ecosystem in the future.