Fact-checked by Grok 2 weeks ago
References
-
[1]
SECRECY Definition & Meaning - Merriam-Webster1. The condition of being hidden or concealed. 2. The habit or practice of keeping secrets or maintaining privacy or concealment.
-
[2]
Openness versus Secrecy in Scientific Research Abstract - PMC - NIHSecrecy is important in military research to promote national security and achieve tactical and strategic advantages. Research that is funded by the military or ...
-
[3]
Top secret: Integrating 20 years of research on secrecy - ScienceDirectThe purpose of this review is to inform managers about the potential benefits and risks of secrecy, as well as about the conditions and situations where secrecy ...
-
[4]
Perceived advantages and disadvantages of secrets disclosureWe predicted that secrecy would be positively correlated with perceiving disadvantages and negatively correlated with perceiving advantages of secrets ...
-
[5]
[PDF] What are the psychological effects of keeping secrets?Dec 16, 2024 · Studies have shown that individuals who voluntarily keep a secret experience less stress than those who feel that their secrecy is coerced or ...
-
[6]
[PDF] Secrecy and Society - SJSU ScholarWorksNov 1, 2016 · 1 Since the conclusion of World War II, secrecy, for example, as the intentional or unintentional concealment of information (Simmel 1950, 330), ...<|separator|>
-
[7]
(PDF) Privacy and Secrecy - ResearchGateNov 26, 2021 · Secrecy has been defined as the intentional concealment of information from others.
-
[8]
[PDF] Being Curious with Secrecy - SJSU ScholarWorksAug 10, 2023 · This understanding of secrecy as secret-keeping, as aligned with. Sissela Bok's (1982) definition of secrecy as “information intentionally.
-
[9]
[PDF] The Experience of Secrecy - Columbia UniversityMay 8, 2017 · In the current work, we define secrecy as an intention to conceal information from one or more individuals. Importantly, and mark- ing a ...
-
[10]
Privacy - Stanford Encyclopedia of PhilosophyMay 14, 2002 · Privacy has no single definition, but is related to the distinction between private and public spheres, and is shaped by technology and social ...
-
[11]
[PDF] Confidentiality and Common Sense: Insights from PhilosophyAug 15, 2016 · Part of the Law and Philosophy Commons, Legal Ethics and Professional Responsibility ... scope of confidentiality, gleaned from many ...
-
[12]
Sage Reference - Encyclopedia of Deception - Bok, SisselaBok evaluates lies as morally wrong, whereas secrets are morally neutral. This means that while every lie requires justification, every secret ...
-
[13]
The New Psychology of Secrecy - Michael L. Slepian, 2024Mar 21, 2024 · Keeping a secret means escaping punishment for any wrongdoing, and secrecy also deprives oneself of instrumental support, and thus simply ...
-
[14]
Secrecy at Work: Introduction | Stanford University PressIn this meaning, secrecy is to exclude, segregate, and distinguish—that is, to create a boundary between the known and the unknown. But this reflects only the ...
-
[15]
Liberty, Secrecy, and the Right of Assessment | Law and PhilosophyMay 10, 2024 · Secrecy precludes the very conditions on which the enjoyment of rights is guaranteed and exposes citizens to the arbitrariness of the government ...
-
[16]
Why states have no right to privacy, but may be entitled to secrecyJun 7, 2018 · States lack privacy against citizens due to accountability, but may have secrecy against other states, as they are not accountable to them.
-
[17]
Secrecy - Etymology, Origin & Meaningsecrecy(n.) ... "state of being concealed; secretive habits, want of openness," 1570s, a variant of secretee, "quality of being secret" (early 15c.), from Middle ...Missing: definition | Show results with:definition
-
[18]
secrecy, n. meanings, etymology and more | Oxford English DictionaryThere are six meanings listed in OED's entry for the noun secrecy, three of which are labelled obsolete. See 'Meaning & use' for definitions, usage, and ...
-
[19]
secrecy - Wiktionary, the free dictionaryEtymology. Alteration (on model of primacy, etc) of Late Middle English secretee, from Old French secré.
-
[20]
Secret - Etymology, Origin & MeaningOriginating from Latin secretum and secretus, "secret" means hidden, concealed, or set apart; it also denotes secrecy or something kept from knowledge.
- [21]
-
[22]
secret, adj. & n. meanings, etymology and moreThe earliest known use of the word secret is in the Middle English period (1150—1500). OED's earliest evidence for secret is from 1378, in Rolls of Parliament.
-
[23]
Secretive - Etymology, Origin & MeaningOriginating from Middle English secretife (mid-15c.) and formed from secret + -ive, the word means inclined to secrecy, tending to keep secret.
-
[24]
Mystery Cults in the Greek and Roman WorldOct 1, 2013 · A pendant to the official cults of the Greeks and Romans, mystery cults served more personal, individualistic attitudes toward death and the afterlife.
-
[25]
Expedition Magazine | Secrets of Ancient MagicIn ancient Egypt, Mesopotamia, Greece, and Rome, practitioners of magic exploited symbolic words, images, and rituals to achieve desired outcomes through ...
-
[26]
Espionage in Ancient Civilizations - Spotter UpNov 4, 2023 · Early Egyptian pharaohs employed agents of espionage to ferret out disloyal subjects and to locate tribes that could be conquered and enslaved.
-
[27]
Espionage and Intelligence, Early Historical FoundationsEspionage began in ancient Mesopotamia, with early examples in Egypt and Greece. Greeks used deception, and Romans developed a large empire with extensive ...Espionage And Intelligence... · Espionage In The Ancient... · The Birth Of Modern...
-
[28]
Hellenistic and Medieval Alchemy | Encyclopedia.comAlchemy is described here as a facet of the ancient mystery religions, and this description centers on its style and manifestations in the Hellenistic period.
-
[29]
Alchemy: Europe and the Middle East | Encyclopedia.com... mystery cults, and craft recipes for making cosmetics, beer, precious stones, and gold. Because the few extant texts from this period were written in Greek ...Alchemy: Europe And The... · Theoretical Foundations In... · Medieval Arabic AlchemyMissing: pre- | Show results with:pre-<|separator|>
-
[30]
The Evolution of the U.S. Intelligence Community-An Historical ...In November of 1775, the Continental Congress created the Committee of Secret Correspondence to gather foreign intelligence from people in England, Ireland, ...
-
[31]
NoneNothing is retrieved...<|separator|>
-
[32]
Faq#7: What was the Congress of Vienna? - The Napoleon SeriesSix secret articles stipulated that a congress would be held in Vienna to decide the fate of the recovered territories.
-
[33]
Security Classification of Information, volume 1 (Quist), Chapter TwoThis chapter reviews classification in the United States preceding WWII (before EOs dealing with classification of information and before the Atomic Energy Act) ...Missing: institutionalization | Show results with:institutionalization
-
[34]
Defence of the Realm Act (DORA) - Domestic impact of World War OneCensorship of newspapers and correspondence to and from the trenches was introduced to maintain morale and keep troop movements secret. · Striking was outlawed ...
-
[35]
Security and the Manhattan ProjectFirst efforts to establish security in atomic matters had occurred in 1939, when refugee physicists in the United States attempted to institute a voluntary ...
-
[36]
10 Fascinating CIA MissionsWe secretly plucked a soviet submarine off of the ocean floor, used a fake movie production company to rescue six American diplomats trapped in Iran, and dug a ...
-
[37]
[PDF] Espionage after the Cold War - Tau Beta PiThe answer is that the Soviet intelligence services successfully stole virtu- ally all the West's military and defense technology secrets, thereby saving the ...
-
[38]
Secrets From the CIA Spy Manual of Trickery and DeceptionAmong the many tricks the CIA had at its disposal during the Cold War was a top-secret manual of deception written by magician John Mulholland, ...Cia Trickery And Deception · Sleight Of Hand · Tip 3, Cia Manual
-
[39]
Cold War Close-up: KGB Spy Tools - Richard Nixon FoundationAug 18, 2022 · Advances in technology expanded beyond centuries old spying techniques, such as the use of coded messages, double agents, and invisible ink to ...
-
[40]
U-2 Incident | Summary, Significance, Cold War, & Facts - BritannicaSep 20, 2025 · In 1962 the Soviet Union began to secretly install missiles in Cuba to launch attacks on U.S. cities. The confrontation that followed, known as ...
-
[41]
The Cuban Missile Crisis, October 1962 - Office of the HistorianThe Cuban Missile Crisis of October 1962 was a direct and dangerous confrontation between the United States and the Soviet Union during the Cold War.
-
[42]
How the Death of a U.S. Air Force Pilot Prevented a Nuclear WarOct 26, 2012 · On October 27, 1962, U-2 pilot Rudolf Anderson Jr. was shot down during the Cuban Missile Crisis. His death may have saved the lives of millions.
-
[43]
Operation HORIZON: A KGB Counterintelligence Operation against ...Jun 30, 2021 · Details of Operation HORIZON, a significant espionage operation carried out by the KGB against the West in 1967 and 1968, are revealed in a series of documents.
-
[44]
Secrecy & Government Bulletin -- Issue 48Two new exemptions from 25 year automatic declassification were added for information that would impair the government's ability to protect the President and ...
-
[45]
Declassification in Reverse: The Pentagon and the U.S. Intelligence ...Feb 21, 2006 · Under a secret government reclassification program, thousands of declassified documents have been removed from files at the National Archives ...
-
[46]
government secrecy after the cold war -- hon. lee h. hamiltonThe Cold War produced an extraordinary amount of secrecy in our government--perhaps too much. The Cold War has ended, though, and our security situation has ...
-
[47]
[PDF] Secrecy in U.S. National Security - RANDA significant failing of the secrecy paradigm is its inabil- ity to protect classified information. As damaging as the more than 200 Cold War and post–Cold War ...<|separator|>
-
[48]
Secrecy Prevails as Declassification SlowsNov 19, 2019 · A stinging new report details problems and potential solutions in getting the history of US foreign relations to the public.
-
[49]
Rolling Back the Post-9/11 Surveillance StateAug 25, 2021 · After 9/11, the legal protections against suspicionless surveillance were swiftly and systematically cast aside.
-
[50]
From Threat to Risk: Changing Rationales and Practices of SecrecyJul 7, 2021 · This article explores how risk rationales alter the conceptualization national security secrecy and the potential problems arising from such a shift.Risk-Security Rationales · Analytical Approach · Empirical Section
-
[51]
Overclassification overkill: The US government is drowning in a sea ...Mar 2, 2023 · About 50 million more threats every year. That's the estimated number of records annually classified as confidential, secret or top secret by ...
-
[52]
[PDF] Secrecy versus transparency in the US national security surveillance ...The secrecy of national security surveillance was again at the center of US political debate after the terrorist attack of 9/ 11, when Congress implemented.
-
[53]
SRU professor discusses consequences of WikiLeaks 10 years after ...Feb 18, 2020 · "WikiLeaks really brought to light a greater need for more thorough background checks. Practices have changed because the stealing of ...
-
[54]
Edward Snowden: the whistleblower behind the NSA surveillance ...Jun 9, 2013 · The 29-year-old source behind the biggest intelligence leak in the NSA's history explains his motives, his uncertain future and why he never intended on hiding ...
-
[55]
The Snowden Affair - The National Security ArchiveSep 4, 2013 · The Snowden leaks have generated broad public debate over issues of security, privacy, and legality inherent in the NSA's surveillance of communications by ...
-
[56]
Public Split over Impact of NSA Leak, But Most Want Snowden ...Jun 17, 2013 · Today, about as many say the leak about the NSA surveillance program serves the public interest (49%) as harms it (44%). In terms of the impact ...Missing: practices | Show results with:practices
-
[57]
Biden's 9/11 declassification order renews debate over secrecy vs ...Sep 29, 2021 · President Joe Biden has directed that all classified 9/11 documents be reviewed to see what can be released to the public.Missing: post- | Show results with:post-
-
[58]
The Vital Role of End-to-End Encryption | ACLUOct 20, 2023 · End-to-end encryption is the best protection, offering individuals the assurance that their personal data are shielded from prying eyes.
-
[59]
Survey of Chinese Espionage in the United States Since 2000 - CSISThis updated survey is based on publicly available information and lists 224 reported instances of Chinese espionage directed at the United States since 2000.
-
[60]
Spyware and surveillance: Threats to privacy and human rights ...Sep 16, 2022 · The report details how surveillance tools such as the “Pegasus” software can turn most smartphones into “24-hour surveillance devices”.
-
[61]
I. Overview: Protecting Secrets and Reducing SecrecyThe Commissioners all agree with the need to change the system in place today for protecting government secrets in response to the dramatic transformations.Commission Purposes And... · Secrecy Issues Not Addressed... · Recommendation
-
[62]
Executive Order 12968, Access to Classified InformationThe unauthorized disclosure of information classified in the national interest can cause irreparable damage to the national security and loss of human life.
-
[63]
The Blessings of Secrecy### Summary of Justifications for Secrecy in International Relations and National Security
-
[64]
Secrecy in the Liberal Order - Henry A. Kissinger Center for Global ...While secrecy creates inducements for states to cooperate, it also gives states special tools against their rivals. During the Cold War, the United States ...
-
[65]
From secrecy to transparency: Reason of state and democracyFrom Machiavelli and Guicciardini to Gracián and Richelieu, secrecy is a defining element in the politics of reasons of state, in the art of simulation and ...
- [66]
- [67]
- [68]
-
[69]
Indiscriminate mass surveillance and the public sphereMar 16, 2016 · Habermas describes the public sphere as a collection of practices that regulate themselves on the basis of norms that aim at generating ...
-
[70]
The U.S. has an overclassification problem, says one former special ...Jan 17, 2023 · The US government classifies some 50 million documents every year, but doesn't declassify documents at nearly that rate.Missing: statistics | Show results with:statistics
-
[71]
The Original Sin Is We Classify Too Much | Brennan Center for JusticeJan 26, 2023 · Insiders have estimated that anywhere between 50 and 90 percent of classified documents could safely be made public. With 50 million ...Missing: statistics | Show results with:statistics
-
[72]
Whistle Blowing in the Public Sector - Santa Clara UniversityWhistle blowers in the public sector often face the unique problem that their disclosure may constitute a crime. This can create an ethical dilemma when the ...
-
[73]
Ethics, Secrecy, and Whistleblowing - Taking ResponsibilityMore specifically, our research suggests that a strong ethical climate may hinder the members of the Church's whistleblowing behavior when the observed ...Missing: dilemmas | Show results with:dilemmas
-
[74]
How Financial Secrecy Undermines DemocracyThe state of the public realm shows that capitalism with a secrecy system has become increasingly hard for a democratic polity to hold accountable.
-
[75]
Secrecy is a Cancer on Our Democracy | ACLUJun 6, 2014 · Secrecy powers are inherently dangerous in a democracy, and need to be very tightly confined to those specific circumstances where the national ...
-
[76]
The Dangers of National Security Secrecy to our Democracy | ACSDec 4, 2017 · The grab for executive power, coupled with the fear of another large-scale attack, justified the layers of secrecy surrounding national ...
-
[77]
When keeping secrets could brighten your dayNov 13, 2023 · Researchers conducted five experiments with more than 2,500 participants to understand what motivates people to keep positive secrets, and how ...
-
[78]
I'm Michael Slepian, the world's expert on the psychology of secrets ...Jul 11, 2022 · People who are better at keeping secrets tend to be more conscientious, more careful, in general. People who are less good at keeping secrets ...<|separator|>
-
[79]
Associations Between Secret-Keeping and Quality of Life in Older ...The aim of this study was to investigate the effects of keeping secrets on quality of life in older adults. Secrecy prevalence rates range from 30% for ...
-
[80]
The Costs of the Secrets We KeepMar 22, 2024 · But keeping secrets can lead to feelings of shame, isolation, uncertainty, and inauthenticity, which can generate anxiety and loneliness, ...
- [81]
-
[82]
Secrets at work - ScienceDirect.comKeeping organizational secrets creates social divides between those who are required to keep the secret and those who are not allowed to know it.
-
[83]
It takes two (or more): The social nature of secrets - PubMedSecrets serve a variety of social functions, including (1) changing or maintaining one's reputation, (2) conveying social utility, and (3) establishing ...
-
[84]
The Sociology of Secrecy and of Secret SocietiesThe Sociology of Secrecy and of Secret Societies. Georg Simmel. Georg Simmel ... literature, Journal of Research in Special Educational Needs 18, no.22 ...Missing: papers | Show results with:papers
-
[85]
Executive Order 13526- Classified National Security InformationDec 29, 2009 · This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information ...
-
[86]
The Protection of Classified Information: The Legal FrameworkFeb 2, 2023 · This report provides an overview of the relationship between executive and legislative authority over national security information.
-
[87]
Mesmerizing Missions: 7 Epic Spy Operations - SpyscapeFrom the CIA's top-secret hunt for Osama bin Laden to Mossad's kidnapping of Nazi war criminal Adolf Eichmann, spies have changed the course of history.
-
[88]
The biggest intelligence leaks in US history - BBCApr 14, 2023 · The release of the Pentagon Papers is perhaps the most famous and impactful leak of classified documents in US history. In 1971, Daniel Ellsberg ...
-
[89]
The Enduring Consequences of Intelligence Leaks - The Cipher BriefThe CIA's former Deputy Director for CounterIntelligence Mark Kelton shares his own insights on the consequences of intelligence leaks.
-
[90]
18 U.S. Code § 798 - Disclosure of classified informationThe term “classified information” means information which, at the time of a violation of this section, is, for reasons of national security, specifically ...
-
[91]
Transparency & Oversight - Brennan Center for JusticeWithout transparency, there can be no accountability for government abuses and no way to ensure that our government's actions reflect the will of the people.Missing: debates | Show results with:debates
-
[92]
Secrecy and National Security - Hoover InstitutionThe real growth of secrecy in government began around the turn of the twentieth century. As more immigrants from eastern and southern Europe began to arrive ...
-
[93]
Kissinger's Secret Trip to China - The National Security ArchiveMao Zedong's and Zhou's interest in receiving a visit from Nixon laid the way for Kissinger's secret trip in July 1971 and the beginning of the U.S.-China ...
-
[94]
The Secret History of Dayton: U.S. Diplomacy and the Bosnia Peace ...The Secret History of Dayton: US Diplomacy and the Bosnia Peace Process 1995 recounts the behind-the-scenes negotiations and strategies employed by American ...
-
[95]
How Government Classification Works and Why It MattersThe federal government has a fairly simple process for classifying documents. The originator of a document, usually a foreign policy or national security staff ...Missing: justifications | Show results with:justifications
-
[96]
The State Secrets Privilege: National Security Information in Civil ...Apr 28, 2022 · The government invoked the state secrets privilege and sought to prevent the disclosure or introduction of, among other things, information ...
-
[97]
[PDF] An Assessment of Back Channel Diplomacy: Negotiations Between ...A landmark case of contemporary back channel diplomacy will be analyzed: the negotiations between the Palestinians and Israel that took place from 1991-1993.
- [98]
-
[99]
WikiLeaks, and the Past and Present of American Foreign RelationsJul 3, 2011 · The most notorious leak in U.S. history came in the early 1970s, when Daniel Ellsberg—a Princeton-educated analyst who worked for Secretary of ...
-
[100]
Classification and Consequences: Secrecy Should be Justified, not ...Apr 16, 2010 · The incentives remain skewed toward secrecy. Officials risk little when they classify documents. Some do so to avoid embarrassment. The Bush ...
-
[101]
Freedom of Information Act: Frequently Asked Questions (FAQ)The Freedom of Information Act (FOIA) allows the public to request access to federal agency records, and agencies must disclose unless exemptions apply. It ...Missing: interactions | Show results with:interactions
-
[102]
Freedom of Information Act Handbook - National Security AgencyBecause of the sensitivity of NSA's functions and activities, the most often cited exemptions are (b)(1) (national security information) and (b)(3) (exemption ...Nsa And The Foia · To Submit An Foia Request · To Submit A Privacy Act...<|separator|>
-
[103]
The Freedom of Information Act (FOIA): A Legal OverviewJun 27, 2024 · Information protected by FOIA's exemptions ranges from certain classified national security information to geological information pertaining to ...
-
[104]
FOIA Update: Litigation Review: History of Exemption 1 Disclosure ...The district court ruled that the CIA's affidavits were conclusory and rejected its use of Exemption 1 as "overly broad." The D.C. Circuit affirmed on entirely ...
-
[105]
FOIA/PA Overviews, Exemptions, and Terms - FBIThis page provides overviews and exemptions for the Freedom of Information Act and Privacy Act as well as a list of terms used by the FBI in its FOIA/PA ...Overview Of The Freedom Of... · Foia Exemptions · Overview Of The Privacy Act...
-
[106]
FOIA Exemptions - Homeland SecurityOct 26, 2022 · Below, find descriptions of the FOIA exemptions and examples of information DHS may withhold under each exemption.
-
[107]
FOIA Basics - The National Security ArchiveThe FOIA allows an agency only nine exemptions from its obligation to provide information in response to a request. The citation of these exemptions, found at ...
-
[108]
The Exemption 7 Escape from Government Disclosure of Sensitive ...Apr 12, 2017 · Exemption 7 (the law enforcement exemption) applies not only to investigations and prosecutions, “but also [to] proactive steps designed to maintain security.”
-
[109]
Access to information in a world in crisis: how opacity in the defence ...Weaknesses in legal frameworks regulating access to information in defence expose countries to high levels of corruption risk as they reduce transparency and ...
-
[110]
[PDF] The Transparency Turn of International LawThis paper diagnoses a genuine "transparency turn" in international law, it analyses the functions and drawbacks of increased transparency in global governance ...
-
[111]
In Honduras, government secrecy law undermines promise of ...Jan 20, 2014 · A newly passed government secrecy law in Honduras threatens the efficacy of the country's freedom-of-information legislation, ...
-
[112]
[PDF] The President - National ArchivesJan 5, 2010 · This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information ...
-
[113]
[PDF] DoDM 5200.45, "Original Classification Authority and Writing a ...Jan 17, 2025 · DoDM 5200.45 assigns original classification authority (OCA) responsibilities, provides original classification processes, and prescribes ...
-
[114]
[PDF] DoDM 5200.01, Volume 3, "DoD Information Security ProgramFeb 24, 2012 · (1) Provides guidance for safeguarding, storage, destruction, transmission, and transportation of classified information. (2) Identifies ...
-
[115]
[PDF] DoDI 5200.01, "DoD Information Security Program and Protection of ...Apr 21, 2016 · DoD Information Security Program policies will be developed to standardize processes and best practices in coordination with the Defense ...Missing: protocols | Show results with:protocols
-
[116]
[PDF] Review and Assessment of DoD Information Security ProceduresApr 18, 2023 · Cybersecurity Protocols: For the purposes of electronic transmission, DoD personnel are required to transmit CNSI only over secure ...
-
[117]
Nazi Spies in America! | National Endowment for the HumanitiesThe Duquesne Spy Ring—as it would come to be known—was the largest espionage case in U.S. history and would be counted among FBI Director J. Edgar Hoover's ...
-
[118]
Atom Spy Case/Rosenbergs - FBIUsing intelligence, the FBI uncovered an espionage ring run by Julius and Ethel Rosenberg that passed secrets on the atomic bomb to the Soviet Union.
-
[119]
Counterintelligence - FBIThe FBI is the lead agency for exposing, preventing, and investigating intelligence activities, including espionage, in the U.S..
-
[120]
War of Secrets: Cryptology in WWII - Air Force MuseumBreaking German and Japanese codes gave the Allies an important advantage in WWII -- it saved many lives and shortened the war, by some estimates as much as two ...
-
[121]
Secret Agents, Secret Armies: The D-Day Misfit Spies | New OrleansJun 2, 2020 · Operation FORTITUDE involved a group of double agents feeding disinformation to the Germans but the group was an odd collection of criminals, playboys, party ...
-
[122]
Defining a Spy: the Espionage Act - Pieces of HistoryJun 15, 2017 · The act, which was meant to define the act of espionage during wartime, put new limits to Americans' First Amendment rights.Missing: key | Show results with:key
-
[123]
Part III: Basics of trade secret protection - WIPOAt the national level, trade secrets are protected by common law and/or statute. In some countries, trade secrets are primarily protected by the law of ...
-
[124]
Trade secrets: Vital intellectual property assets - EUIPOMay 16, 2024 · Legally, trade secrets are a form of intellectual property (IP) that consist of information, such as formulas, practices, processes, designs, ...
-
[125]
The economic and innovation impacts of trade secrets - GOV.UKApr 19, 2021 · This report summarises and critiques the publicly available economic research on trade secrets and highlights key innovation aspects.
-
[126]
The Rise of Trade Secret LitigationSep 23, 2024 · When the Defend Trade Secrets Act was passed in 2016, trade secret litigation skyrocketed, increasing more than 25 percent in a single year.
-
[127]
Trade secrets: harmony between the US and Europe?Jan 15, 2019 · The aim of the EU Directive was to harmonise and clarify the protection of trade secrets in all Member States, which previously offered ...
-
[128]
Trade Secrets vs. Patents: Weighing the Pros and Cons for Your ...Sep 10, 2024 · Pros and Cons of Trade Secrets No Public Disclosure: Unlike patents, trade secrets do not require public disclosure, ensuring that sensitive ...
-
[129]
Patents vs Trade Secrets - Oury ClarkIn contrast to registering a patent, the initial cost of a trade secret is minimal. A trade secret can be protected by confidentiality agreements (or NDAs), so ...
-
[130]
Trade Secrets vs Patents: Which is Right for You? | MorningsideFeb 18, 2021 · The most substantial advantage of a trade secret designation over a patent is cost. Patent applications are legal documents that must include ...
- [131]
-
[132]
Trends in Trade Secret Litigation Report Volume 3 - StoutNov 4, 2024 · The report analyzes 9,600+ cases, provides in-depth analysis, case studies, emerging trends, and expert perspectives on trade secret litigation.
-
[133]
Trade Secrets: 10 of the Most Famous Examples - Vethan Law FirmNov 8, 2016 · THE GOOGLE SEARCH ALGORITHM · KENTUCKY FRIED CHICKEN · COCA-COLA · LENA BLACKBURN'S BASEBALL RUBBING MUD · NEW YORK TIMES BESTSELLER LIST · LISTERINE.
-
[134]
Understanding trade secrets - Worden ThaneSep 6, 2024 · Some of the most famous examples of trade secrets include the recipe for Coca-Cola, Google's search algorithm, and the process used by the fast ...
-
[135]
Lex Machina Releases 2024 Trade Secret Litigation ReportSep 12, 2024 · In 2023, 1,203 trade secret cases were filed in federal district courts. In the three-year period from 2021 to 2023, the highest number of trade ...Missing: enforcement | Show results with:enforcement
-
[136]
2024: A Year of Trade Secret Cases in Review | Articles | FinneganJan 13, 2025 · 2024 saw many impactful trade secret cases, including a vacated award, a case with terminated sanctions, a case with a large award reversed, ...
-
[137]
Massive Damages in U.S. Trade Secret Cases Signal High Stakes ...Aug 22, 2025 · Recent trade secret cases have resulted in hundreds of millions in damages, including exemplary damages and attorney's fees, under the DTSA. ...Missing: statistics | Show results with:statistics
-
[138]
What is Corporate Espionage? - UpGuardJul 2, 2025 · Corporate espionage is espionage conducted for commercial or financial purposes. Corporate espionage is also known as industrial espionage, economic espionage ...
-
[139]
Corporate Espionage: What You Need To Know - SplunkFeb 10, 2023 · Corporate espionage is the act of stealing trade secrets or proprietary information from a business for competitive advantage, often involving ...
-
[140]
NDAs and Confidentiality Agreements: What You Need to KnowOct 15, 2024 · Confidentiality agreements are very useful to prevent unauthorized disclosures of information, but they have inherent limitations and risks.
-
[141]
[PDF] Corporate Espionage 101 - GIAC CertificationsSome techniques for accessing valuable corporate information include: physically removing the hard drive and copying the information to another machine, hacking ...
-
[142]
What Is Corporate Espionage? 5+ Shocking Cases - CurrentWareMay 6, 2025 · Corporate espionage/industrial espionage refers to the unlawful acquisition of proprietary information through means such as bribery, ...
-
[143]
[PDF] executive summary china: the risk to corporate america - FBIThe annual cost to the U.S. economy of counterfeit goods, pirated software, and theft of trade secrets is between $225 billion and $600 billion.<|separator|>
-
[144]
[PDF] Economic Espionage and Trade Secret TheftMay 13, 2014 · Based on these proxies and other data, we estimated that trade secret theft costs on average 1 to 3 percent of GDP in the United States and ...
-
[145]
[PDF] ECONOMIC ESPIONAGE ACT OF 1996 - Congress.govAn interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing or directing the disclosure of any trade secret.
-
[146]
9-59.000 - Economic Espionage | United States Department of JusticeA more detailed discussion of the prosecutions of theft of trade secrets is contained in the Computer Crime and Intellectual Property Section's of the Criminal ...
-
[147]
Confidentiality and non disclosure agreements - DLA PiperJun 22, 2012 · This article discusses: 1) when NDAs are appropriate, 2) what type of information should be covered, 3) what type of information should not be ...
-
[148]
How to Detect and Prevent Corporate Espionage Attacks - TeramindJan 27, 2025 · Corporate espionage, also known as industrial espionage or business espionage, is the deliberate and illegal practice of gathering confidential ...<|separator|>
-
[149]
What is the CIA triad (confidentiality, integrity and availability)?Dec 21, 2023 · The CIA triad refers to confidentiality, integrity and availability, describing a model designed to guide policies for information security ...
-
[150]
What Is the CIA Triad and Why Is It Important? - IT GovernanceJun 18, 2025 · The CIA triad refers to three core principles: Confidentiality: Ensuring that sensitive data is accessed only by authorised parties.
-
[151]
Role-Based Access Control: RBAC vs. ABAC vs. ACLSep 6, 2022 · Role-based access control limits an employee's access to certain programs or data on the network based on their role within the organization.
-
[152]
[PDF] Guide to Attribute Based Access Control (ABAC) Definition and ...ABAC systems are capable of enforcing both Discretionary Access Control (DAC) and Mandatory Access Control (MAC) concepts.<|separator|>
-
[153]
ABAC (Attribute-Based Access Control): Guide and ExamplesABAC enables organizations to extend existing roles via attributes and policies. It offers the context needed to make intelligent authorization decisions.Missing: secrecy | Show results with:secrecy
-
[154]
Confidential Computing Technology - FortanixSecure enclaves, such as Intel SGX (Software Guard Extensions) or AMD SEV (Secure Encrypted Virtualization), are practical examples of Confidential Computing.
-
[155]
Confidential computing platform-specific details - Red HatJun 16, 2023 · AMD provides Confidential Computing through a technology called secure encrypted virtualization (SEV). ... Intel Software Guard Extensions (SGX).
-
[156]
[PDF] Zero Trust Architecture - NIST Technical Series PublicationsA zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no ...
-
[157]
Art. 32 GDPR – Security of processing - General Data Protection ...Rating 4.6 (9,719) Article 32 GDPR requires controllers/processors to implement technical and organizational measures, including pseudonymisation, encryption, and regular testing ...
-
[158]
2025 Data Breach Investigations Report - VerizonRead the complete report for an in-depth, authoritative analysis of the latest cyber threats and data breaches. Download report. 2025 DBIR Executive Summary.Missing: failures | Show results with:failures
-
[159]
Healthcare Data Breach Statistics - The HIPAA JournalSep 30, 2025 · In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.How Much Has Ocr Fined Hipaa... · Ocr Penalties For Hipaa... · Attorneys General Hipaa...Missing: secrecy | Show results with:secrecy<|separator|>
-
[160]
110+ of the Latest Data Breach Statistics to Know for 2026 & BeyondSep 24, 2025 · The average cost of a data breach dropped to $4.44 million in 2025, a 9% decrease from the all-time high in 2024. The global average would have ...Missing: major failures
-
[161]
[PDF] Advanced Encryption Standard (AES)May 9, 2023 · In 1997, NIST initiated the Advanced Encryption Standard (AES) development effort [1] and called for the public to submit candidate algorithms ...Missing: RSA | Show results with:RSA
-
[162]
[PDF] The Early Days of RSA -- History and Lessons Ronald L. Rivest MIT ...Cryptography” Nov '76: “We stand today at the brink of a revolution in cryptography.” ◇ Proposed “Public-Key Cryptosystem” . (This remarkable idea ...
-
[163]
[PS] An Introduction to Cryptography - Columbia CSMilestones in Modern Cryptography. 1883 Kerckhoffs' Principles. 1917-1918 ... CRLs are the weak link of public key cryptography. Steven M. Bellovin ...
-
[164]
Cryptographic Standards and Guidelines | CSRCIt includes cryptographic primitives, algorithms and schemes are described in some of NIST's Federal Information Processing Standards (FIPS), Special ...Publications · AES Development · Block Cipher Techniques · Hash FunctionsMissing: RSA | Show results with:RSA
-
[165]
How Does PGP Encryption Work—and Is It Still Secure in 2025?Jun 12, 2025 · PGP encryption remains a foundational technology for secure communication. This blog explains how it works and offers guidance for ...
-
[166]
Tor anonymity compromised by law enforcement. Is it still safe to use?Sep 19, 2024 · Tor enhances privacy by directing internet traffic through a minimum of three randomly chosen routers, or nodes. During this process user ...
-
[167]
History of the First Crypto War - Schneier on Security -Jun 22, 2015 · The act that truly launched the Crypto Wars was the White House's introduction of the “Clipper Chip” in 1993.
-
[168]
Doomed to Repeat History? Lessons from the Crypto Wars of the ...Jun 17, 2015 · In September 1999, the White House announced a sweeping policy change that removed virtually all restrictions on the export of retail encryption ...
-
[169]
[PDF] Encryption Workarounds - UC Berkeley LawFirst, it is too early to tell how much the widespread use of encryption will impact the government's ability to solve criminal cases. FBI Director James Comey ...
-
[170]
NIST Releases First 3 Finalized Post-Quantum Encryption StandardsAug 13, 2024 · NIST has finalized its principal set of encryption algorithms designed to withstand cyberattacks from a quantum computer.
-
[171]
The Crypto-Wars myth: The reality of state access to encrypted ...Dec 9, 2020 · This article draws on four state studies to address a myth of the contemporary debate on internet communications.
-
[172]
The Effect of Encryption on Lawful Access to Communications and ...Our research found that the risk to public safety created by encryption has not reached a level that justifies restrictions or design mandates.
-
[173]
Privacy and secrecy: A conceptual comparison. - APA PsycNetPrivacy and secrecy both involve boundaries and the denial of access to others; they differ, however, in the moral content of the behavior that is concealed.Missing: scholarly articles
-
[174]
[PDF] Privacy vs. Secrecy - NCFPA rule of thumb to distinguish the two is to ask: is this fact about me important in this relationship at this time? Consider this example: you are about to ...
-
[175]
When Do Your Secrets Hurt Your Well-Being?Jul 25, 2022 · Especially among intimate friends and romantic partners, being secretive can create emotional distance—and make you feel inauthentic, as well.Missing: individual | Show results with:individual
-
[176]
The Harms of Secrecy | SPSPAug 27, 2021 · We found that the more immoral a secret is, the more ashamed people feel. The less relationship-oriented the secret (that is, the more it is ...
-
[177]
Investigating the underlying effects of secrets in everyday lifeResults show that keeping more secrets from an interaction partner (and secrets of greater importance) was associated with higher burden in daily interactions.
-
[178]
The Silent Strain: How Keeping Secrets Affects Emotional Well-BeingJun 27, 2024 · Columbia Business School research reveals that addressing the psychology of secrets can enhance emotional well-being and social connections.
-
[179]
I'll Never Tell: Rethinking the Psychology of SecrecyJul 17, 2024 · The more our thoughts wander to our secrets, the greater the toll on our mental and emotional health, spawning feelings of shame, isolation, and ...
-
[180]
[PDF] The Sociology of Secrecy and of Secret Societies - Georg SimmelAug 4, 2002 · If lying appeared today among us as a sin as permissible as among the Greek divinities, the Hebrew patriarchs, or the South Sea Islanders; if ...
-
[181]
Culture and secrecy: A prototype analysis of secretsThe findings suggest that Mexican and American participants conceptualize secrets similarly but have unique conceptions of concealment aspects of secrecy.<|separator|>
-
[182]
Secrecy, a Cross-cultural Perspective - Google BooksEssays discuss the nature of privacy and secrecy, their perception in other cultures, and their application in business, organizations, and intelligence ...
-
[183]
The Relationship Between Masculine Honor and Social - jstorThis is a very powerful rule both within COs (i.e., internal omertà) and in the broader society (external omertà) (Allum, 2006). The concept of omertà is rooted ...
-
[184]
The Relationship Between Masculine Honor and Social Activism ...Aug 6, 2025 · Omertà is linked to the concepts of honor and masculinity. That is, in order to fit ideological constructions of manliness, individuals should ...
-
[185]
The Lies and Deceptions That Made D-Day Possible | IWMThe D-Day deceptions were massively successful, and today they offer us a brilliant masterclass in military misdirection. The aim of the D-Day deceptions was to ...
-
[186]
Security and Secrecy - Nuclear Museum - Atomic Heritage FoundationA key component of keeping the Manhattan Project secret was making sure Project sites were secret and secure.Missing: strategic advantage
-
[187]
How Alan Turing Cracked The Enigma Code | Imperial War MuseumsIt has been estimated that the efforts of Turing and his fellow code-breakers shortened the war by several years.
-
[188]
1967 war: Six days that changed the Middle East - BBC NewsJun 5, 2017 · In 1956, when Israel attacked Egypt as part of a secret agreement ... The Israeli war plan depended on a surprise attack, called ...
-
[189]
Uncovering Trade Secrets - An Empirical Assessment of Economic ...The paper also finds a positive association between the stringency of trade secrets protection and key indicators of innovation and international economic flows ...
-
[190]
Trade secrets protection and employment of public firms: Evidence ...I demonstrate that the adoption of the Uniform Trade Secrets Act (UTSA) results in a 5.1% increase in employment among public firms in Compustat.
-
[191]
[PDF] The Economic and Innovation Impacts of Trade SecretsMisappropriation or theft of trade secrets, according to industry estimates, is said to cost between 1-3% of GDP in developed economies (Passman, 2014).
-
[192]
Part II: Strategic roles of trade secrets in the innovation ecosystemProtection of trade secrets aims to improve the overall efficiency of the innovation ecosystem. The need to keep information confidential in creating and ...
-
[193]
Economic and innovation impacts of trade secrets - GOV.UKApr 19, 2021 · Global legal and economic trends suggest that growth in the use of trade secrets is outpacing that of patents. Little is understood about trade ...
-
[194]
MK-Ultra, The Disturbing CIA Project To Master Mind-ControlJul 8, 2022 · For more than a decade at the height of the Cold War, CIA researchers abused helpless subjects in some of the most disturbing experiments in ...
-
[195]
70 years of MKUltra, the CIA 'mind-control' program that inspired ...Apr 13, 2023 · Electroshock, hypnosis, sensory deprivation, verbal and sexual abuse, and other forms of torture were also part of the experiments, ...
-
[196]
About The Untreated Syphilis Study at Tuskegee - CDCSep 4, 2024 · The 40-year Untreated Syphilis Study at Tuskegee ended in 1972 and resulted in drastic changes to standard research practices.
-
[197]
Iran-Contra scandal begins to unravel | October 5, 1986 - History.comCongress, reacting to complaints about corruption and brutality against the Contras, had passed the Boland Amendment in 1984, specifically forbidding the ...
-
[198]
Oliver North's Checkered Iran-Contra RecordMay 16, 2018 · Pattern of Deception, Personal Corruption, Deals with Narco-Traffickers Bueso and Noriega Highlighted in Declassified Documents.
-
[199]
[PDF] Illegal Secrets - Washington University Open ScholarshipGovernment secrecy and the abuse of power have long shared a symbiotic ... secrecy could produce dishonest and corrupt government. For example ...
-
[200]
Rescuing History (and Accountability) from SecrecySep 14, 2018 · The literature on national security secrecy tends to focus on the threat it poses to democratic accountability and participation.
-
[201]
How classification shapes public confidence in democratic institutionsJul 10, 2025 · We argue that the abuse of classified documents undermines not only presidential approval but also confidence in democratic institutions writ large.
-
[202]
Transparency and Trust in Government. Evidence from a Survey ...The evidence highlights that the relationship between transparency and trust may be mediated by the performance of the government. Our complementary analytical ...
-
[203]
Public Trust in Government: 1958-2024 - Pew Research CenterJun 24, 2024 · Trust in government began eroding during the 1960s, amid the escalation of the Vietnam War, and the decline continued in the 1970s with the ...
-
[204]
COVID-19, Diffuse Anxiety, and Public (Mis)Trust in Government - NIHJul 27, 2023 · This article, using data from the American National Election Study, explores how economic, social, and political anxieties pervasive throughout the pandemic ...
-
[205]
The culture of government secrecy undermines democratic ...The study asked for research from the authors of 1792 studies from open-access journa. ... The culture of government secrecy undermines democratic accountability.
-
[206]
Executive Privilege: Presidential Power, Secrecy, and AccountabilityThis study proposes that the resolution to the dilemma of executive branch secrecy and democratic accountability is in the founders' theory of the separation ...
-
[207]
[PDF] Secrecy and Self-Governance - Chicago UnboundThe most vexing problem arises when the public disclosure of secret information is both harmful to national security and valuable to self-governance. Suppose, ...<|separator|>
-
[208]
Secrecy, Transparency, and the Logic of Self-GovernmentSecrecy is stigmatized as a work of corruption, tolerable (if at all) by a compromise of democratic principles. My dissertation challenges both ideas.
-
[209]
WHISTLEBLOWING OUTREACH - DNI.govWhistleblowing is the lawful disclosure of information a discloser reasonably believes evidences wrongdoing to an authorized recipientMissing: examples Wikipedia
-
[210]
[PDF] Disclosure's Effects: WikiLeaks and TransparencyFeb 13, 2012 · See Kim Zetter, WikiLeaks Was Launched with Documents Intercepted from Tor,. THREAT LEVEL (June 1, 2010, 4:28 PM), http://www.wired.com/ ...
-
[211]
The Whistleblower Protection Act (WPA): A Legal OverviewDec 30, 2024 · The Whistleblower Protection Act of 1989 (WPA or the Act) protects most federal civil service employees who disclose government illegality, waste, and ...Missing: Wikipedia | Show results with:Wikipedia
-
[212]
Hacktivism: WikiLeaks - Purdue cyberTAPNov 28, 2024 · WikiLeaks is a nonprofit media organization founded in 2006 by Julian Assange, Kristinn Hrdnsson, and Danial Mathews. · WikiLeaks began as a ...
-
[213]
12 Years Of Disruption: A WikiLeaks Timeline - NPRApr 11, 2019 · October: WikiLeaks posts nearly 400,000 classified military documents it calls "The Iraq War Logs"; they detail the involvement of Iraqi ...
-
[214]
How Much Did WikiLeaks Damage U.S. National Security? - NPRApr 12, 2019 · But many in the national security community say the leaks were harmful to a broad range of people. However, they generally say the damage was ...
-
[215]
Truth and consequence: The Wikileaks saga - Policy OptionsSecretary of State Hillary Clinton has asserted the leak “puts people's lives in danger, threatens our national security, and undermines [US] efforts to work ...
-
[216]
NSA Documents Released to the Public Since June 2013 - ACLUOn June 5, 2013, The Guardian released the first in a series of documents detailing the NSA's spying activities. Listed below are all of the documents released ...
-
[217]
The case of Edward Snowden - National Whistleblower CenterNov 19, 2020 · Snowden's exposure of NSA surveillance is a controversial subject; supporters claim he is a hero, while detractors say he is un-American.
-
[218]
Edward Snowden: Leaks that exposed US spy programme - BBCJan 17, 2014 · BBC News retraces the leaks by ex-CIA contractor Edward Snowden, which led to the revelation of America's extensive surveillance programme.
-
[219]
NSA files decoded: Edward Snowden's surveillance revelations ...Nov 1, 2013 · The documents show the NSA providing vital information to American and allied forces in Afghanistan, defending the country against cyber attacks ...
-
[220]
The Snowden disclosures, 10 years on - IAPPJun 28, 2023 · Even 10 years on, Edward Snowden's disclosures of U.S. government surveillance programs continue to make an impact on law and policy debates, ...
-
[221]
U.S. court: Mass surveillance program exposed by Snowden was ...Sep 2, 2020 · Evidence that the NSA was secretly building a vast database of U.S. telephone records - the who, the how, the when, and the where of millions ...
-
[222]
[PDF] The Untold Story of Edward Snowden's Impact on the GDPRNov 15, 2019 · Importantly, it fails to account for the significant impact that Snowden's leaks had on the development of the European Union's General Data ...
-
[223]
[PDF] House Intelligence Committee Review of Edward Snowden ...Most of the documents Snowden stole have no connection to programs that could impact privacy or civil liberties—they instead pertain to military, defense, ...Missing: details verifiable facts
-
[224]
What Declassified Government Documents Reveal About America's ...Ultimately, it's the president who is sovereign over secrecy, and it's the president who sets the rules. And if presidents really wanted to do something about ...
-
[225]
Reducing Overclassification Through AccountabilityOct 5, 2011 · In fact, “overclassification” jeopardizes national security. Excessive secrecy prevents federal agencies from sharing information internally, ...
-
[226]
Over-classification: How Bad Is It, What's the Fix? (Occasional Paper ...Mar 28, 2023 · The report first details how harmful over-classification has become to our national security and gives examples.
-
[227]
Report of the Commission on Protecting and Reducing Government ...The final report of an official two year investigation into government secrecy and personnel security practices.
-
[228]
[PDF] COMMISSION ON PROTECTING AND REDUCING GOVERNMENT ...As Chairman Moynihan correctly points out, the government secrecy system did not start with the. Cold War, but began during another conflict, with the ...
-
[229]
Chairman's Foreword - FAS Project on Government SecrecyThe Commission, accordingly, judges that the first priority is to give a firm statutory base to the secrecy system. Classification should proceed according to ...
-
[230]
[PDF] REDUCING OVER-CLASSIFICATION ACT - GovInfoOct 7, 2010 · To require the Secretary of Homeland Security to develop a strategy to prevent the over-classification of homeland security and other ...
-
[231]
The President Signs H.R. 553, The Reducing Over-Classification ActOct 7, 2010 · The President signs into law bipartisan legislation to decrease over-classification and promote information sharing across the federal government.
-
[232]
Reducing Over-classification of DHS' National Security InformationAug 2, 2013 · The Reducing Over-Classification Act of October 2010 (Public Law 111-258) requires the DHS Secretary to develop a strategy to prevent the ...
-
[233]
S.1541 - 118th Congress (2023-2024): Classification Reform Act of ...Continuity of membership of the Public Interest Declassification Board. TITLE III—PREVENTING MISHANDLING OF CLASSIFIED INFORMATION. Sec. 301. Security review of ...
-
[234]
S.4648 - Classification Reform for Transparency Act of 2024 118th ...Jul 9, 2024 · A bill to require the President to establish a task force on streamlining the classified national security information system and narrowing of the criteria for ...
-
[235]
Senators Introduce Bipartisan Legislation to Reform the Security ...May 10, 2023 · As chairman of the Senate Intelligence Committee, I think it is clear that our security classification system is badly in need of change,” said ...
-
[236]
The National Intelligence Director: Over-Classification Undermines ...Jan 30, 2023 · “Over-classification undermines critical democratic objectives, such as increasing transparency to promote an informed citizenry and greater accountability,” ...
-
[237]
A New Say in Secrecy: Congress Takes Up Classification ReformDec 14, 2023 · Following fresh scrutiny of the U.S. classification system, Congress eyes new ideas and a new role in the regulation of national secrets.
-
[238]
Eight Steps to Reduce Overclassification and Rescue ...Dec 5, 2016 · ... classified digital information. It is also clear that our dysfunctional classification system harms national security, as it inhibits ...