Secrets and Leaks : : The Dilemma of State Secrecy / / Rahul Sagar.
Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | Princeton, NJ : : Princeton University Press, , [2016] ©2016 |
Year of Publication: | 2016 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (304 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781400880850 |
---|---|
ctrlnum |
(DE-B1597)473101 (OCoLC)945771701 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sagar, Rahul, author. aut http://id.loc.gov/vocabulary/relators/aut Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar. Princeton, NJ : Princeton University Press, [2016] ©2016 1 online resource (304 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Preface to the Paperback Edition -- Acknowledgments -- Introduction. Who Watches the Watchers? -- Chapter 1. The Problem: How to Regulate State Secrecy? -- Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- Conclusion. Bitter Medicine -- Notes -- Selected Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, Rahul Sagar argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously--that is, to "leak" information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, Sagar writes, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021) Leaks (Disclosure of information). Official secrets. Whistle blowing Political aspects. POLITICAL SCIENCE / History & Theory. bisacsh Congress. Constitution. Freedom of Information Act. U.S. Congress. anonymity of disclosures. classified information disclosure. classified information. courts. democracy. executive power. executive privilege. executive. judges. judicial review. law. leaking. legitimacy. national security. public interest. retaliation. state secrecy. statecraft. transparency. unauthorized disclosure. unauthorized disclosures. whistleblowers. whistleblowing. wrongdoing. Sagar, Rahul. Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 9783110485103 ZDB-23-DGG Title is part of eBook package: De Gruyter EBOOK PACKAGE Social Sciences 2016 9783110485332 ZDB-23-DSW Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2016 9783110638592 print 9780691168180 https://doi.org/10.1515/9781400880850?locatt=mode:legacy https://www.degruyter.com/isbn/9781400880850 Cover https://www.degruyter.com/cover/covers/9781400880850.jpg |
language |
English |
format |
eBook |
author |
Sagar, Rahul, Sagar, Rahul, |
spellingShingle |
Sagar, Rahul, Sagar, Rahul, Secrets and Leaks : The Dilemma of State Secrecy / Frontmatter -- Contents -- Preface to the Paperback Edition -- Acknowledgments -- Introduction. Who Watches the Watchers? -- Chapter 1. The Problem: How to Regulate State Secrecy? -- Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- Conclusion. Bitter Medicine -- Notes -- Selected Bibliography -- Index |
author_facet |
Sagar, Rahul, Sagar, Rahul, Sagar, Rahul. |
author_variant |
r s rs r s rs |
author_role |
VerfasserIn VerfasserIn |
author2 |
Sagar, Rahul. |
author2_variant |
r s rs |
author2_role |
TeilnehmendeR |
author_sort |
Sagar, Rahul, |
title |
Secrets and Leaks : The Dilemma of State Secrecy / |
title_sub |
The Dilemma of State Secrecy / |
title_full |
Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar. |
title_fullStr |
Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar. |
title_full_unstemmed |
Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar. |
title_auth |
Secrets and Leaks : The Dilemma of State Secrecy / |
title_alt |
Frontmatter -- Contents -- Preface to the Paperback Edition -- Acknowledgments -- Introduction. Who Watches the Watchers? -- Chapter 1. The Problem: How to Regulate State Secrecy? -- Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- Conclusion. Bitter Medicine -- Notes -- Selected Bibliography -- Index |
title_new |
Secrets and Leaks : |
title_sort |
secrets and leaks : the dilemma of state secrecy / |
publisher |
Princeton University Press, |
publishDate |
2016 |
physical |
1 online resource (304 p.) Issued also in print. |
contents |
Frontmatter -- Contents -- Preface to the Paperback Edition -- Acknowledgments -- Introduction. Who Watches the Watchers? -- Chapter 1. The Problem: How to Regulate State Secrecy? -- Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- Conclusion. Bitter Medicine -- Notes -- Selected Bibliography -- Index |
isbn |
9781400880850 9783110485103 9783110485332 9783110638592 9780691168180 |
callnumber-first |
J - Political Science |
callnumber-subject |
JF - Public Administration |
callnumber-label |
JF1525 |
callnumber-sort |
JF 41525 S4 S48 42017 |
url |
https://doi.org/10.1515/9781400880850?locatt=mode:legacy https://www.degruyter.com/isbn/9781400880850 https://www.degruyter.com/cover/covers/9781400880850.jpg |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
350 - Public administration & military science |
dewey-ones |
352 - General considerations of public administration |
dewey-full |
352.379 |
dewey-sort |
3352.379 |
dewey-raw |
352.379 |
dewey-search |
352.379 |
doi_str_mv |
10.1515/9781400880850?locatt=mode:legacy |
oclc_num |
945771701 |
work_keys_str_mv |
AT sagarrahul secretsandleaksthedilemmaofstatesecrecy |
status_str |
n |
ids_txt_mv |
(DE-B1597)473101 (OCoLC)945771701 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 Title is part of eBook package: De Gruyter EBOOK PACKAGE Social Sciences 2016 Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2016 |
is_hierarchy_title |
Secrets and Leaks : The Dilemma of State Secrecy / |
container_title |
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1770176739468640256 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05892nam a22011295i 4500</leader><controlfield tag="001">9781400880850</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20162016nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979580784</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400880850</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400880850</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)473101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)945771701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.S4</subfield><subfield code="b">S48 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL010000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">352.379</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sagar, Rahul, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secrets and Leaks :</subfield><subfield code="b">The Dilemma of State Secrecy /</subfield><subfield code="c">Rahul Sagar.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (304 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface to the Paperback Edition -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction. Who Watches the Watchers? -- </subfield><subfield code="t">Chapter 1. The Problem: How to Regulate State Secrecy? -- </subfield><subfield code="t">Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- </subfield><subfield code="t">Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- </subfield><subfield code="t">Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- </subfield><subfield code="t">Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- </subfield><subfield code="t">Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- </subfield><subfield code="t">Conclusion. Bitter Medicine -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Selected Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, Rahul Sagar argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously--that is, to "leak" information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, Sagar writes, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Leaks (Disclosure of information).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Official secrets.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Whistle blowing</subfield><subfield code="x">Political aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / History & Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Congress.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Constitution.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Freedom of Information Act.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U.S. Congress.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">anonymity of disclosures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">classified information disclosure.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">classified information.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">courts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">democracy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">executive power.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">executive privilege.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">executive.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">judges.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">judicial review.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">law.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">leaking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">legitimacy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">national security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public interest.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">retaliation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">state secrecy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">statecraft.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transparency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">unauthorized disclosure.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">unauthorized disclosures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">whistleblowers.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">whistleblowing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">wrongdoing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagar, Rahul.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2016</subfield><subfield code="z">9783110485103</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Social Sciences 2016</subfield><subfield code="z">9783110485332</subfield><subfield code="o">ZDB-23-DSW</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2016</subfield><subfield code="z">9783110638592</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691168180</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400880850?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400880850</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400880850.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-063859-2 Princeton University Press Complete eBook-Package 2016</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DSW</subfield><subfield code="b">2016</subfield></datafield></record></collection> |