Knowledge

Secrecy

Source 📝

53: 575: 285: 65: 509: 115: 86: 130: 273:", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family 419:
Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government
447:
Research on corporate secrecy has studied the factors supporting secret organizations. In particular, scholars in economics and management have paid attention to the way firms participating in cartels work together to maintain secrecy and conceal their activities from antitrust authorities. The
420:
servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.
205:"True" secrecy systems where the meaning of the message is concealed by the cypher, code, etc. Although, its existence is not hidden. The enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal. 598:
Military secrecy is the concealing of information about martial affairs that is purposely not made available to the general public and hence to any enemy, in order to gain an advantage or to not reveal a weakness, to avoid
655:
repercussions. The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question.
440:, to meet legal requirements, or, in some cases, to conceal nefarious behavior. New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by 194:
Concealment systems, including such methods as invisible ink, concealing a message in a harmless text in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the
78:
is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.
973:"Chapter 5: Handling and safeguarding of classified and protected information and assets – Industrial Security Manual – Security requirements for contracting with the Government of Canada – Canada.ca" 566:. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information. 396:
secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S.
1063:
Faulkner, Robert R.; Cheney, Eric R.; Fisher, Gene A.; Baker, Wayne E. (2003). "Crime by Committee: Conspirators and Company Men in the Illegal Electrical Industry Cartel, 1954–1959".
928:
Manderson, Lenore; Davis, Mark; Colwell, Chip; Ahlin, Tanja (December 2015). "On Secrecy, Disclosure, the Public, and the Private in Anthropology: An Introduction to Supplement 12".
99:
Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of
167:(where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as through 615:, training methods, plans, and the number and location of specific weapons. Some secrets involve information in broader areas, such as secure communications, 335:
secret sharing is one way for people to establish traditional relations with other people. A commonly used narrative that describes this kind of behavior is
82:
Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy.
485: 1020:
Baker, Wayne E.; Faulkner, Robert R. (1993). "The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry".
292: 914: 382: 397: 393: 1098: 448:
diversity of the participants (in terms of age and size of the firms) influences their ability to coordinate to avoid being detected.
622: 1180: 1386:
The federal information manual: how the government collects, manages, and discloses information under FOIA and other statutes
1164: 366: 527: 153: 1580: 1250: 754: 636: 42: 1605: 1519: 1481: 1459: 1433: 1397: 1361: 559: 1218:
Lightfoot, Geoffrey; Wisniewski, Tomasz Piotr (2014). "Information asymmetry and power in a surveillance society".
996: 1625: 215: 1122: 146: 1596: 1372: 354:
often attempt to conceal information from other governments and the public. These state secrets can include
1323: 1292: 877: 469:
may be used to launder money from criminal activity, to finance terrorism, or to evade taxes. Registers of
46: 1443: 744: 68: 1407:
Maret, Susan, ed. (2014). "Government secrecy, Research in Social Problems and Public Policy, vol. 19".
1451: 794: 553: 535: 631: 299:
Secrets are sometimes kept to provide the pleasure of surprise. This includes keeping secret about a
862: 1538: 1534: 1503: 1389: 531: 35: 20: 437: 16:
Practice of hiding information to certain individual or group for personal or interpersonal reason
804: 704: 31: 27: 377:
in the U.S.) and classify material according to the level of protection needed (hence the term "
997:"- THE FREEDOM OF INFORMATION ACT: ENSURING TRANSPARENCY AND ACCOUNTABILITY IN THE DIGITAL AGE" 972: 709: 607:
efforts. Most military secrets are tactical in nature, such as the strengths and weaknesses of
556:. Many believe that security technology can be more effective if it itself is not kept secret. 378: 168: 138: 52: 907: 1573:
Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are
849: 589: 582: 574: 108: 563: 541: 470: 370: 838: 93: 8: 774: 1340: 1309: 1076: 1045: 953: 759: 714: 664: 663:
wrote: 'Do nothing secretly; for Time sees and hears all things, and discloses all.'.
1576: 1546: 1515: 1508: 1477: 1455: 1429: 1412: 1393: 1357: 1344: 1313: 1278: 1246: 1205: 1160: 1080: 1037: 957: 945: 895: 724: 647:
Excessive secrecy is often cited as a source of much human conflict. One may have to
545: 466: 340: 258: 284: 235:. Squirrels bury nuts, hiding them, and they try to remember their locations later. 1620: 1332: 1301: 1274: 1152: 1072: 1029: 937: 789: 729: 612: 489: 308: 122: 1321:
Birchall, Clare (December 2011). "Transparency interrupted: secrets of the left".
1241:
Secrecy in the Sunshine Era: The Promise and Failures of U.S. Open Government Laws
455:
system encourages inventors to publish information in exchange for a limited time
1555: 1239: 719: 694: 493: 304: 199: 175:, where secrets are hidden in plain sight behind complex idiosyncratic language ( 142: 104: 1491: 85: 1469: 784: 779: 520: 481: 460: 405: 187: 1545:, London: Longman, Rees, Orme, Brown, Green, & Longman, pp. 128–131, 64: 1614: 1416: 1336: 1305: 1084: 1041: 949: 699: 626: 608: 600: 374: 336: 270: 262: 180: 1099:"How Anonymous Shell Companies Finance Insurgents, Criminals, and Dictators" 508: 300: 190:
in 1948 reads that there are three systems of secrecy within communication:
1550: 1506:(1991), "Sir Henry Taylor (1800-86): On secrecy", in Gross, John J. (ed.), 971:
Government of Canada, Public Services and Procurement Canada (2017-12-12).
764: 616: 549: 463:
use secrecy as a way to attract members by creating a sense of importance.
441: 411: 401: 332: 149: 57: 1148:
Read "Computers at Risk: Safe Computing in the Information Age" at NAP.edu
1146: 876:
November 2018, Emma Bryce-Live Science Contributor 17 (17 November 2018).
769: 593: 429: 362: 325: 172: 385:
for access and other protection methods, such as keeping documents in a
241:
attempt to consciously conceal aspects of themselves from others due to
114: 1181:"Digital Open Source Intelligence and International Security: A Primer" 1049: 652: 604: 351: 261:
which they are not capable of incorporating psychologically into their
254: 250: 164: 1265:": The false choice between secrecy and transparency in US politics". 129: 816: 799: 749: 739: 689: 660: 433: 359: 232: 156: 1426:
Death by mustard gas: how military secrecy and lost weapons can kill
1033: 941: 810: 734: 497: 456: 315: 134: 1156: 100: 1601: 1495: 619:, intelligence operations, and cooperation with third parties. 452: 355: 278: 266: 224: 220: 176: 676: 459:
on its use, though patent applications are initially secret.
274: 242: 238: 163:
Secrecy can exist in a number of different ways: encoding or
672: 386: 246: 228: 927: 480:
organizations to keep certain information secret, such as
257:. Humans may also attempt to conceal aspects of their own 1062: 878:"How Do Squirrels Remember Where They Buried Their Nuts?" 668: 648: 277:. The information may even be something as trivial as a 202:, is a special equipment required to recover the message. 1570: 625:
rights in regard to military secrecy were uphold in the
41:"Clandestinity" redirects here. Not to be confused with 1474:
Secrets and lies: digital security in a networked world
1448:
Blacked out: government secrecy in the information age
428:
Organizations, ranging from multi-national for profit
365:
tactics, and secrets obtained illicitly from others ("
1514:, Oxford England New York: Oxford University Press, 1354:
Secrets: on the ethics of concealment and revelation
970: 1217: 1507: 1286:Birchall, Clare (December 2011). "Introduction to 1238: 667:said: "Three things cannot long stay hidden: the 473:aim at fighting corporate secrecy in that sense. 26:Several terms redirect here. For other uses, see 1612: 1597:An Open Source Collection of Readings on Secrecy 1428:. Newport, New South Wales: Big Sky Publishing. 651:in order to hold a secret, which might lead to 540:Preservation of secrets is one of the goals of 408:information they are supposed to keep secret. ( 392:Few people dispute the desirability of keeping 1409:Research in Social Problems and Public Policy 1208:, decided 8 March 1953, accessed 5 April 2023 1019: 875: 496:). Europe has particularly strict laws about 1206:United States v. Reynolds, 345 U.S. 1 (1953) 836: 249:of violence, rejection, harassment, loss of 1383: 1263:There's been too much secrecy in this City 394:Critical Nuclear Weapon Design Information 1290:: the politics of opacity and openness". 1127:European Commission - European Commission 839:"Communication Theory of Secrecy Systems" 1468: 1423: 1320: 1285: 1260: 913:CS1 maint: numeric names: authors list ( 573: 507: 283: 128: 119:A Secret from on High (Secret d'en haut) 113: 84: 63: 51: 1442: 552:. The latter depends on the secrecy of 1613: 1533: 1502: 1371:Canal, Vicente Aceituno (April 2006). 1236: 1406: 1370: 492:that are under preparation (to limit 1351: 528:Full disclosure (computer security) 369:"). Most nations have some form of 186:Another classification proposed by 13: 1564: 1077:10.1111/j.1745-9125.2003.tb00996.x 755:Freedom of information legislation 324:– is important in many aspects of 169:government security classification 43:Clandestinity (Catholic canon law) 14: 1637: 1606:Federation of American Scientists 1590: 1571:Seth Stephens-Davidowitz (2018). 1492:"Secrecy Legal News and Research" 410:For a recent (2005) example, see 404:. Government officials sometimes 1476:. Indianapolis, Indiana: Wiley. 1384:Gidiere III, P. Stephen (2006). 1279:10.2752/175174311X12861940861905 1261:Birchall, Clare (March 2011). "" 90:First secret confidence to Venus 1211: 1198: 1173: 1139: 423: 216:Sociological aspects of secrecy 1245:. University Press of Kansas. 1115: 1091: 1056: 1013: 989: 964: 921: 869: 830: 562:is a design principle in much 223:conceal the location of their 198:Privacy systems, for example, 107:. It is often contrasted with 1: 1324:Theory, Culture & Society 1293:Theory, Culture & Society 823: 346: 1220:Information and Organization 1103:Council on Foreign Relations 1022:American Sociological Review 503: 209: 56:U.S. soldier at camp during 7: 1356:. New York: Vintage Books. 1237:Arnold, Jason Ross (2014). 1123:"Data protection in the EU" 837:Shannon, C.E. (1946–1948). 682: 569: 69:Loose lips might sink ships 10: 1642: 1452:Cambridge University Press 587: 544:. Techniques used include 536:security through obscurity 525: 398:Freedom of Information Act 381:"). An individual needs a 213: 40: 25: 18: 1537:(1836), "On secrecy", in 1510:The Oxford book of essays 1373:"How secret is a secret?" 632:United States v. Reynolds 358:designs, military plans, 307:of a story, and avoiding 1424:Plunkett, Geoff (2014). 1411:. Bingley, UK: Emerald. 1390:American Bar Association 1337:10.1177/0263276411423040 1306:10.1177/0263276411427744 1288:secrecy and transparency 642: 36:Secrets (disambiguation) 21:Secrecy (disambiguation) 805:State Secrets Privilege 795:Somebody Else's Problem 705:Clandestine cell system 659:Nearly 2500 years ago, 139:security classification 125:(Hypolite Moulin), 1879 32:Secret (disambiguation) 28:Covert (disambiguation) 1626:Classified information 1450:. Cambridge New York: 857:Cite journal requires 710:Classified information 585: 523: 379:classified information 296: 160: 126: 96: 72: 61: 45:. For other uses, see 1352:Bok, Sissela (1989). 977:www.tpsgc-pwgsc.gc.ca 745:Don't ask, don't tell 590:Military intelligence 583:Edmund Blair Leighton 577: 532:Kerckhoffs' principle 511: 438:competitive advantage 291:, (Das Geheimnis) by 287: 132: 117: 88: 71:, World War II slogan 67: 55: 1575:. Dey Street Books. 930:Current Anthropology 564:software engineering 542:information security 471:beneficial ownership 371:Official Secrets Act 269:sometimes maintain " 19:For other uses, see 1532:Also available as: 775:Secrecy (sociology) 627:landmark legal case 436:, keep secrets for 109:social transparency 1204:US Supreme Court, 936:(S12): S183–S190. 906:has generic name ( 760:Media transparency 715:Concealment device 665:Gautama Siddhartha 586: 579:A Stolen Interview 560:Information hiding 554:cryptographic keys 524: 389:, are stipulated. 383:security clearance 311:of a magic trick. 297: 161: 127: 97: 73: 62: 1444:Roberts, Alasdair 1267:Cultural Politics 1166:978-0-309-04388-5 725:Conspiracy theory 635:, decided by the 546:physical security 490:financial reports 488:in the U.S.), or 341:The Secret Sharer 94:François Jouffroy 1633: 1586: 1554: 1525: 1513: 1499: 1487: 1465: 1439: 1420: 1403: 1380: 1367: 1348: 1317: 1282: 1256: 1244: 1228: 1227: 1215: 1209: 1202: 1196: 1195: 1193: 1192: 1177: 1171: 1170: 1143: 1137: 1136: 1134: 1133: 1119: 1113: 1112: 1110: 1109: 1095: 1089: 1088: 1060: 1054: 1053: 1017: 1011: 1010: 1008: 1007: 993: 987: 986: 984: 983: 968: 962: 961: 925: 919: 918: 911: 905: 901: 899: 891: 889: 888: 873: 867: 866: 860: 855: 853: 845: 843: 834: 790:Self-concealment 730:Covert operation 603:, or to help in 461:Secret societies 339:'s short story " 323: 123:Hippolyte Moulin 1641: 1640: 1636: 1635: 1634: 1632: 1631: 1630: 1611: 1610: 1593: 1583: 1567: 1565:Further reading 1562: 1522: 1490: 1484: 1470:Schneier, Bruce 1462: 1436: 1400: 1364: 1253: 1232: 1231: 1216: 1212: 1203: 1199: 1190: 1188: 1179: 1178: 1174: 1167: 1145: 1144: 1140: 1131: 1129: 1121: 1120: 1116: 1107: 1105: 1097: 1096: 1092: 1061: 1057: 1034:10.2307/2095954 1018: 1014: 1005: 1003: 1001:www.govinfo.gov 995: 994: 990: 981: 979: 969: 965: 926: 922: 912: 903: 902: 893: 892: 886: 884: 882:livescience.com 874: 870: 858: 856: 847: 846: 841: 835: 831: 826: 821: 720:Confidentiality 695:Banking secrecy 685: 645: 596: 572: 538: 506: 494:insider trading 482:medical records 467:Shell companies 426: 349: 321: 218: 212: 200:voice inversion 105:confidentiality 50: 39: 24: 17: 12: 11: 5: 1639: 1629: 1628: 1623: 1609: 1608: 1599: 1592: 1591:External links 1589: 1588: 1587: 1582:978-0062390868 1581: 1566: 1563: 1561: 1560: 1559: 1558: 1527: 1526: 1520: 1500: 1488: 1482: 1466: 1460: 1440: 1434: 1421: 1404: 1398: 1381: 1368: 1362: 1349: 1331:(7–8): 60–84. 1318: 1283: 1273:(1): 133–156. 1258: 1252:978-0700619924 1251: 1233: 1230: 1229: 1210: 1197: 1187:. 17 July 2018 1172: 1165: 1138: 1114: 1090: 1071:(2): 511–554. 1055: 1028:(6): 837–860. 1012: 988: 963: 942:10.1086/683302 920: 868: 859:|journal= 828: 827: 825: 822: 820: 819: 814: 807: 802: 797: 792: 787: 785:Secret sharing 782: 780:Secret passage 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 722: 717: 712: 707: 702: 697: 692: 686: 684: 681: 644: 641: 609:weapon systems 571: 568: 521:Felix Nussbaum 505: 502: 425: 422: 348: 345: 314:Keeping one’s 303:, not telling 301:surprise party 293:Moritz Stifter 271:family secrets 214:Main article: 211: 208: 207: 206: 203: 196: 188:Claude Shannon 154:Vice President 141:stickers on a 15: 9: 6: 4: 3: 2: 1638: 1627: 1624: 1622: 1619: 1618: 1616: 1607: 1603: 1600: 1598: 1595: 1594: 1584: 1578: 1574: 1569: 1568: 1557: 1552: 1548: 1544: 1543:The statesman 1540: 1539:Taylor, Henry 1536: 1535:Taylor, Henry 1531: 1530: 1529: 1528: 1523: 1521:9780192141859 1517: 1512: 1511: 1505: 1504:Taylor, Henry 1501: 1497: 1493: 1489: 1485: 1483:9780471453802 1479: 1475: 1471: 1467: 1463: 1461:9780521858700 1457: 1453: 1449: 1445: 1441: 1437: 1435:9781922132918 1431: 1427: 1422: 1418: 1414: 1410: 1405: 1401: 1399:9781590315798 1395: 1391: 1387: 1382: 1378: 1374: 1369: 1365: 1363:9780679724735 1359: 1355: 1350: 1346: 1342: 1338: 1334: 1330: 1326: 1325: 1319: 1315: 1311: 1307: 1303: 1300:(7–8): 7–25. 1299: 1295: 1294: 1289: 1284: 1280: 1276: 1272: 1268: 1264: 1259: 1254: 1248: 1243: 1242: 1235: 1234: 1226:(4): 214–235. 1225: 1221: 1214: 1207: 1201: 1186: 1182: 1176: 1168: 1162: 1158: 1157:10.17226/1581 1154: 1150: 1149: 1142: 1128: 1124: 1118: 1104: 1100: 1094: 1086: 1082: 1078: 1074: 1070: 1066: 1059: 1051: 1047: 1043: 1039: 1035: 1031: 1027: 1023: 1016: 1002: 998: 992: 978: 974: 967: 959: 955: 951: 947: 943: 939: 935: 931: 924: 916: 909: 897: 883: 879: 872: 864: 851: 840: 833: 829: 818: 815: 813: 812: 808: 806: 803: 801: 798: 796: 793: 791: 788: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 721: 718: 716: 713: 711: 708: 706: 703: 701: 700:Black project 698: 696: 693: 691: 688: 687: 680: 678: 674: 670: 666: 662: 657: 654: 653:psychological 650: 640: 638: 637:Supreme Court 634: 633: 628: 624: 623:US Government 620: 618: 614: 610: 606: 602: 601:embarrassment 595: 591: 584: 580: 576: 567: 565: 561: 557: 555: 551: 547: 543: 537: 533: 529: 522: 518: 517:) (Le secret) 514: 513:Das Geheimnis 510: 501: 499: 495: 491: 487: 483: 479: 474: 472: 468: 464: 462: 458: 454: 449: 445: 443: 439: 435: 432:to nonprofit 431: 421: 417: 415: 413: 407: 403: 402:sunshine laws 399: 395: 390: 388: 384: 380: 376: 375:Espionage Act 372: 368: 364: 361: 357: 353: 344: 342: 338: 337:Joseph Conrad 334: 329: 327: 320: 317: 312: 310: 306: 302: 294: 290: 286: 282: 280: 276: 272: 268: 264: 260: 256: 253:, or loss of 252: 248: 244: 240: 236: 234: 230: 226: 222: 217: 204: 201: 197: 193: 192: 191: 189: 184: 182: 181:steganography 178: 174: 170: 166: 159:, May 1, 2011 158: 155: 151: 148: 147:U.S.President 144: 140: 136: 131: 124: 120: 116: 112: 110: 106: 102: 95: 91: 87: 83: 80: 77: 70: 66: 59: 54: 48: 44: 37: 33: 29: 22: 1602:Secrecy News 1572: 1542: 1509: 1473: 1447: 1425: 1408: 1385: 1377:ISSA Journal 1376: 1353: 1328: 1322: 1297: 1291: 1287: 1270: 1266: 1262: 1240: 1223: 1219: 1213: 1200: 1189:. Retrieved 1184: 1175: 1147: 1141: 1130:. Retrieved 1126: 1117: 1106:. Retrieved 1102: 1093: 1068: 1064: 1058: 1025: 1021: 1015: 1004:. Retrieved 1000: 991: 980:. Retrieved 976: 966: 933: 929: 923: 904:|first= 885:. Retrieved 881: 871: 850:cite journal 832: 809: 765:Need to know 658: 646: 630: 621: 617:cryptography 597: 578: 558: 550:cryptography 539: 516: 512: 477: 475: 465: 450: 446: 442:trade secret 430:corporations 427: 424:Corporations 418: 412:Plame affair 409: 391: 367:intelligence 350: 333:anthropology 330: 318: 313: 298: 288: 237: 219: 185: 162: 150:Barack Obama 118: 98: 89: 81: 75: 74: 58:World War II 1388:. Chicago: 1185:edam.org.tr 1065:Criminology 770:Open secret 594:Born secret 515:(The Secret 476:Other laws 363:negotiation 352:Governments 326:game theory 173:obfuscation 47:Clandestine 1615:Categories 1191:2020-06-03 1132:2020-06-03 1108:2020-06-03 1006:2020-06-03 982:2020-06-03 887:2020-06-03 824:References 605:propaganda 588:See also: 526:See also: 360:diplomatic 347:Government 289:The Secret 255:employment 251:acceptance 245:, or from 165:encryption 145:, between 1604:from the 1417:0196-1152 1345:144862855 1314:145098295 1085:1745-9125 1042:0003-1224 958:147148098 950:0011-3204 817:WikiLeaks 800:Smuggling 750:Espionage 740:Deception 690:Ambiguity 661:Sophocles 639:in 1953. 504:Computing 500:privacy. 434:charities 263:conscious 233:predators 210:Sociology 157:Joe Biden 1556:Preview. 1472:(2004). 1446:(2006). 1151:. 1991. 896:cite web 811:Sub rosa 735:Cover-up 683:See also 675:and the 570:Military 498:database 457:monopoly 316:strategy 309:exposure 305:spoilers 267:Families 265:being. 135:burn bag 1621:Secrecy 1551:4790233 1541:(ed.), 1050:2095954 613:tactics 478:require 221:Animals 101:privacy 76:Secrecy 1579:  1549:  1518:  1496:JURIST 1480:  1458:  1432:  1415:  1396:  1360:  1343:  1312:  1249:  1163:  1083:  1048:  1040:  956:  948:  671:, the 534:, and 453:patent 444:laws. 356:weapon 322:  319:secret 295:, 1885 279:recipe 239:Humans 195:enemy. 177:jargon 171:) and 143:laptop 34:, and 1341:S2CID 1310:S2CID 1046:JSTOR 954:S2CID 842:(PDF) 677:truth 643:Views 486:HIPAA 373:(the 275:honor 243:shame 231:from 179:) or 1577:ISBN 1547:OCLC 1516:ISBN 1478:ISBN 1456:ISBN 1430:ISBN 1413:ISSN 1394:ISBN 1358:ISBN 1247:ISBN 1161:ISBN 1081:ISSN 1038:ISSN 946:ISSN 915:link 908:help 863:help 844:: 1. 679:.". 673:moon 592:and 548:and 451:The 406:leak 400:and 387:safe 259:self 247:fear 229:nest 152:and 137:and 103:and 1333:doi 1302:doi 1275:doi 1153:doi 1073:doi 1030:doi 938:doi 669:sun 649:lie 629:of 343:". 331:In 227:or 225:den 1617:: 1494:. 1454:. 1392:. 1375:. 1339:. 1329:28 1327:. 1308:. 1298:28 1296:. 1269:. 1224:24 1222:. 1183:. 1159:. 1125:. 1101:. 1079:. 1069:41 1067:. 1044:. 1036:. 1026:58 1024:. 999:. 975:. 952:. 944:. 934:56 932:. 900:: 898:}} 894:{{ 880:. 854:: 852:}} 848:{{ 611:, 581:, 530:, 519:, 416:) 328:. 281:. 183:. 133:A 121:, 111:. 92:, 30:, 1585:. 1553:. 1524:. 1498:. 1486:. 1464:. 1438:. 1419:. 1402:. 1379:. 1366:. 1347:. 1335:: 1316:. 1304:: 1281:. 1277:: 1271:7 1257:* 1255:. 1194:. 1169:. 1155:: 1135:. 1111:. 1087:. 1075:: 1052:. 1032:: 1009:. 985:. 960:. 940:: 917:) 910:) 890:. 865:) 861:( 484:( 414:. 60:. 49:. 38:. 23:.

Index

Secrecy (disambiguation)
Covert (disambiguation)
Secret (disambiguation)
Secrets (disambiguation)
Clandestinity (Catholic canon law)
Clandestine

World War II

Loose lips might sink ships

François Jouffroy
privacy
confidentiality
social transparency

Hippolyte Moulin

burn bag
security classification
laptop
U.S.President
Barack Obama
Vice President
Joe Biden
encryption
government security classification
obfuscation
jargon
steganography

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.