Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Secrecy

From Wikipedia, the free encyclopedia
(Redirected fromSecrets)
Practice of hiding information to certain individual or group for personal or interpersonal reason
For other uses, seeSecrecy (disambiguation).
Several terms redirect here. For other uses, seeCovert (disambiguation),Secret (disambiguation), andSecrets (disambiguation).
"Clandestinity" redirects here. Not to be confused withClandestinity (Catholic canon law). For other uses, seeClandestine.
U.S. soldier at camp duringWorld War II
Loose lips might sink ships, World War II slogan

Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.

Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy.

First secret confidence to Venus,François Jouffroy

Secrecy by government entities is often decried as excessive or in promotion of poor operation[by whom?]; excessive revelation of information on individuals can conflict with virtues ofprivacy andconfidentiality. It is often contrasted withsocial transparency.

A Secret from on High (Secret d'en haut),Hippolyte Moulin (Hypolite Moulin), 1879
Aburn bag andsecurity classification stickers on alaptop, betweenU.S.PresidentBarack Obama andVice PresidentJoe Biden, May 1, 2011

Secrecy can exist in a number of different ways: encoding orencryption (where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as throughgovernment security classification)[citation needed] andobfuscation, where secrets are hidden in plain sight behind complex idiosyncratic language (jargon) orsteganography.

Another classification proposed byClaude Shannon in 1948 reads that there are three systems of secrecy within communication:[1]

  1. Concealment systems, including such methods as invisible ink, concealing a message in a harmless text in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the enemy.
  2. Privacy systems, for example,voice inversion, is a special equipment required to recover the message.
  3. "True" secrecy systems where the meaning of the message is concealed by the cypher, code, etc. Although, its existence is not hidden. The enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal.

Sociology

[edit]
Main article:Sociological aspects of secrecy

Animals conceal the location of theirden ornest frompredators. Squirrels bury nuts, hiding them, and they try to remember their locations later.[2]

Humans attempt to consciously conceal aspects of themselves from others due toshame, or fromfear of violence, rejection, harassment, loss ofacceptance, or loss ofemployment. Humans may also attempt to conceal aspects of their ownself which they are not capable of incorporating psychologically into theirconscious being.Families sometimes maintain "family secrets", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to familyhonor. The information may even be something as trivial as arecipe.[citation needed]

The Secret (Das Geheimnis) byMoritz Stifter, 1885

Secrets are sometimes kept to provide the pleasure of surprise. This includes keeping secret about asurprise party, not tellingspoilers of a story, and avoidingexposure of a magic trick.[citation needed]

Keeping one'sstrategysecret – is important in many aspects ofgame theory.[citation needed]

Inanthropology secret sharing is one way for people to establish traditional relations with other people.[3] A commonly used[citation needed] narrative that describes this kind of behavior isJoseph Conrad's short story "The Secret Sharer".[citation needed]

Government

[edit]

Governments often attempt to conceal information from other governments and the public. These state secrets can includeweapon designs, military plans,diplomaticnegotiation tactics, and secrets obtained illicitly from others ("intelligence"). Most nations have some form ofOfficial Secrets Act (theEspionage Act in the U.S.) and classify material according to the level of protection needed (hence the term "classified information"). An individual needs asecurity clearance for access and other protection methods, such as keeping documents in asafe, are stipulated.[4]

Few people dispute the desirability of keepingCritical Nuclear Weapon Design Information secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S.Freedom of Information Act andsunshine laws. Government officials sometimesleak information they are supposed to keep secret. (For a recent (2005) example, seePlame affair.)[5]

Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.[citation needed]

Corporations

[edit]

Organizations, ranging from multi-national for profitcorporations to nonprofitcharities, keep secrets forcompetitive advantage, to meet legal requirements, or, in some cases, to conceal nefarious behavior.[citation needed]New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected bytrade secret laws.

Research on corporate secrecy has studied the factors supporting secret organizations.[6] In particular, scholars in economics and management have paid attention to the way firms participating in cartels work together to maintain secrecy and conceal their activities from antitrust authorities.[7] The diversity of the participants (in terms of age and size of the firms) influences their ability to coordinate to avoid being detected.

Thepatent system encourages inventors to publish information in exchange for a limited timemonopoly on its use, though patent applications are initially secret.Secret societies use secrecy as a way to attract members by creating a sense of importance.[citation needed]

Shell companies may be used to launder money from criminal activity, to finance terrorism, or to evade taxes. Registers ofbeneficial ownership aim at fighting corporate secrecy in that sense.[8]

Other lawsrequire organizations to keep certain information secret, such asmedical records (HIPAA in the U.S.), orfinancial reports that are under preparation (to limitinsider trading). Europe has particularly strict laws aboutdatabase privacy.[9]

Computing

[edit]
Das Geheimnis (The Secret) (Le secret),Felix Nussbaum
See also:Full disclosure (computer security),Kerckhoffs' principle, andsecurity through obscurity

Preservation of secrets is one of the goals ofinformation security. Techniques used includephysical security andcryptography. The latter depends on the secrecy ofcryptographic keys. Many believe that security technology can be more effective if it itself is not kept secret.[10]

Information hiding is a design principle in muchsoftware engineering. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.[citation needed]

Military

[edit]
A Stolen Interview,Edmund Blair Leighton
See also:Military intelligence andBorn secret

Military secrecy is the concealing of information about martial affairs that is purposely not made available to the general public and hence to any enemy, in order to gain an advantage or to not reveal a weakness, to avoidembarrassment, or to help inpropaganda efforts. Most military secrets are tactical in nature, such as the strengths and weaknesses ofweapon systems,tactics, training methods, plans, and the number and location of specific weapons. Some secrets involve information in broader areas, such as secure communications,cryptography, intelligence operations, and cooperation with third parties.[11]

US Government rights in regard to military secrecy were uphold in thelandmark legal case ofUnited States v. Reynolds, decided by theSupreme Court in 1953.[12]

Views

[edit]

Excessive secrecy is often cited[13] as a source of much human conflict. One may have tolie in order to hold a secret, which might lead topsychological repercussions.[original research?] The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question.[improper synthesis?]

Nearly 2500 years ago,Sophocles[who?] wrote: 'Do nothing secretly; for Time sees and hears all things, and discloses all.'.[citation needed]Gautama Siddhartha said: "Three things cannot long stay hidden: thesun, themoon and thetruth.".

See also

[edit]

References

[edit]
  1. ^Shannon, C.E. (1946–1948)."Communication Theory of Secrecy Systems"(PDF): 1.{{cite journal}}:Cite journal requires|journal= (help)
  2. ^November 2018, Emma Bryce-Live Science Contributor 17 (17 November 2018)."How Do Squirrels Remember Where They Buried Their Nuts?".livescience.com. Retrieved2020-06-03.{{cite web}}:|first= has generic name (help)CS1 maint: numeric names: authors list (link)
  3. ^Manderson, Lenore; Davis, Mark; Colwell, Chip; Ahlin, Tanja (December 2015). "On Secrecy, Disclosure, the Public, and the Private in Anthropology: An Introduction to Supplement 12".Current Anthropology.56 (S12):S183 –S190.doi:10.1086/683302.ISSN 0011-3204.S2CID 147148098.
  4. ^Government of Canada, Public Services and Procurement Canada (2017-12-12)."Chapter 5: Handling and safeguarding of classified and protected information and assets – Industrial Security Manual – Security requirements for contracting with the Government of Canada – Canada.ca".www.tpsgc-pwgsc.gc.ca. Retrieved2020-06-03.
  5. ^"- THE FREEDOM OF INFORMATION ACT: ENSURING TRANSPARENCY AND ACCOUNTABILITY IN THE DIGITAL AGE".www.govinfo.gov. Retrieved2020-06-03.
  6. ^Baker, Wayne E.; Faulkner, Robert R. (1993). "The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry".American Sociological Review.58 (6):837–860.doi:10.2307/2095954.ISSN 0003-1224.JSTOR 2095954.
  7. ^Faulkner, Robert R.; Cheney, Eric R.; Fisher, Gene A.; Baker, Wayne E. (2003). "Crime by Committee: Conspirators and Company Men in the Illegal Electrical Industry Cartel, 1954–1959".Criminology.41 (2):511–554.doi:10.1111/j.1745-9125.2003.tb00996.x.ISSN 1745-9125.
  8. ^"How Anonymous Shell Companies Finance Insurgents, Criminals, and Dictators".Council on Foreign Relations. Retrieved2020-06-03.
  9. ^"Data protection in the EU".European Commission - European Commission. Retrieved2020-06-03.
  10. ^Read "Computers at Risk: Safe Computing in the Information Age" at NAP.edu. 1991.doi:10.17226/1581.ISBN 978-0-309-04388-5.
  11. ^"Digital Open Source Intelligence and International Security: A Primer".edam.org.tr. 17 July 2018. Retrieved2020-06-03.
  12. ^US Supreme Court,United States v. Reynolds, 345 U.S. 1 (1953), decided 8 March 1953, accessed 5 April 2023
  13. ^Lightfoot, Geoffrey; Wisniewski, Tomasz Piotr (2014)."Information asymmetry and power in a surveillance society"(PDF).Information and Organization.24 (4):214–235.doi:10.1016/j.infoandorg.2014.09.001.
Also available as:Taylor, Henry (1836), "On secrecy", inTaylor, Henry (ed.),The statesman, London: Longman, Rees, Orme, Brown, Green, & Longman, pp. 128–131,OCLC 4790233.Preview.

Further reading

[edit]
  • Seth Stephens-Davidowitz (2018).Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are. Dey Street Books.ISBN 978-0062390868.

External links

[edit]
Wikimedia Commons has media related toSecrecy.
Wikiquote has quotations related toSecrets.
Wikiquote has quotations related toSecrecy.
Look upsecret orcovert in Wiktionary, the free dictionary.
National
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Secrecy&oldid=1269307744"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp