Secrets and Leaks : : The Dilemma of State Secrecy / / Rahul Sagar.

Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016
VerfasserIn:
TeilnehmendeR:
Place / Publishing House:Princeton, NJ : : Princeton University Press, , [2016]
©2016
Year of Publication:2016
Language:English
Online Access:
Physical Description:1 online resource (304 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781400880850
ctrlnum (DE-B1597)473101
(OCoLC)945771701
collection bib_alma
record_format marc
spelling Sagar, Rahul, author. aut http://id.loc.gov/vocabulary/relators/aut
Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar.
Princeton, NJ : Princeton University Press, [2016]
©2016
1 online resource (304 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface to the Paperback Edition -- Acknowledgments -- Introduction. Who Watches the Watchers? -- Chapter 1. The Problem: How to Regulate State Secrecy? -- Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- Conclusion. Bitter Medicine -- Notes -- Selected Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, Rahul Sagar argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously--that is, to "leak" information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, Sagar writes, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)
Leaks (Disclosure of information).
Official secrets.
Whistle blowing Political aspects.
POLITICAL SCIENCE / History & Theory. bisacsh
Congress.
Constitution.
Freedom of Information Act.
U.S. Congress.
anonymity of disclosures.
classified information disclosure.
classified information.
courts.
democracy.
executive power.
executive privilege.
executive.
judges.
judicial review.
law.
leaking.
legitimacy.
national security.
public interest.
retaliation.
state secrecy.
statecraft.
transparency.
unauthorized disclosure.
unauthorized disclosures.
whistleblowers.
whistleblowing.
wrongdoing.
Sagar, Rahul.
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016 9783110485103 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Social Sciences 2016 9783110485332 ZDB-23-DSW
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2016 9783110638592
print 9780691168180
https://doi.org/10.1515/9781400880850?locatt=mode:legacy
https://www.degruyter.com/isbn/9781400880850
Cover https://www.degruyter.com/cover/covers/9781400880850.jpg
language English
format eBook
author Sagar, Rahul,
Sagar, Rahul,
spellingShingle Sagar, Rahul,
Sagar, Rahul,
Secrets and Leaks : The Dilemma of State Secrecy /
Frontmatter --
Contents --
Preface to the Paperback Edition --
Acknowledgments --
Introduction. Who Watches the Watchers? --
Chapter 1. The Problem: How to Regulate State Secrecy? --
Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference --
Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege --
Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy --
Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation --
Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation --
Conclusion. Bitter Medicine --
Notes --
Selected Bibliography --
Index
author_facet Sagar, Rahul,
Sagar, Rahul,
Sagar, Rahul.
author_variant r s rs
r s rs
author_role VerfasserIn
VerfasserIn
author2 Sagar, Rahul.
author2_variant r s rs
author2_role TeilnehmendeR
author_sort Sagar, Rahul,
title Secrets and Leaks : The Dilemma of State Secrecy /
title_sub The Dilemma of State Secrecy /
title_full Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar.
title_fullStr Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar.
title_full_unstemmed Secrets and Leaks : The Dilemma of State Secrecy / Rahul Sagar.
title_auth Secrets and Leaks : The Dilemma of State Secrecy /
title_alt Frontmatter --
Contents --
Preface to the Paperback Edition --
Acknowledgments --
Introduction. Who Watches the Watchers? --
Chapter 1. The Problem: How to Regulate State Secrecy? --
Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference --
Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege --
Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy --
Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation --
Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation --
Conclusion. Bitter Medicine --
Notes --
Selected Bibliography --
Index
title_new Secrets and Leaks :
title_sort secrets and leaks : the dilemma of state secrecy /
publisher Princeton University Press,
publishDate 2016
physical 1 online resource (304 p.)
Issued also in print.
contents Frontmatter --
Contents --
Preface to the Paperback Edition --
Acknowledgments --
Introduction. Who Watches the Watchers? --
Chapter 1. The Problem: How to Regulate State Secrecy? --
Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference --
Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege --
Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy --
Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation --
Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation --
Conclusion. Bitter Medicine --
Notes --
Selected Bibliography --
Index
isbn 9781400880850
9783110485103
9783110485332
9783110638592
9780691168180
callnumber-first J - Political Science
callnumber-subject JF - Public Administration
callnumber-label JF1525
callnumber-sort JF 41525 S4 S48 42017
url https://doi.org/10.1515/9781400880850?locatt=mode:legacy
https://www.degruyter.com/isbn/9781400880850
https://www.degruyter.com/cover/covers/9781400880850.jpg
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 350 - Public administration & military science
dewey-ones 352 - General considerations of public administration
dewey-full 352.379
dewey-sort 3352.379
dewey-raw 352.379
dewey-search 352.379
doi_str_mv 10.1515/9781400880850?locatt=mode:legacy
oclc_num 945771701
work_keys_str_mv AT sagarrahul secretsandleaksthedilemmaofstatesecrecy
status_str n
ids_txt_mv (DE-B1597)473101
(OCoLC)945771701
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016
Title is part of eBook package: De Gruyter EBOOK PACKAGE Social Sciences 2016
Title is part of eBook package: De Gruyter Princeton University Press Complete eBook-Package 2016
is_hierarchy_title Secrets and Leaks : The Dilemma of State Secrecy /
container_title Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2016
author2_original_writing_str_mv noLinkedField
_version_ 1770176739468640256
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05892nam a22011295i 4500</leader><controlfield tag="001">9781400880850</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20210830012106.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">210830t20162016nju fo d z eng d</controlfield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)979580784</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781400880850</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781400880850</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)473101</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)945771701</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nju</subfield><subfield code="c">US-NJ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.S4</subfield><subfield code="b">S48 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL010000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">352.379</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sagar, Rahul, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secrets and Leaks :</subfield><subfield code="b">The Dilemma of State Secrecy /</subfield><subfield code="c">Rahul Sagar.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Princeton, NJ : </subfield><subfield code="b">Princeton University Press, </subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (304 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface to the Paperback Edition -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Introduction. Who Watches the Watchers? -- </subfield><subfield code="t">Chapter 1. The Problem: How to Regulate State Secrecy? -- </subfield><subfield code="t">Chapter 2. Should We Rely on Judges? Transparency and the Problem of Judicial Deference -- </subfield><subfield code="t">Chapter 3. Should We Rely on Congress? Oversight and the Problem of Executive Privilege -- </subfield><subfield code="t">Chapter 4. Should the Law Condone Unauthorized Disclosures? Fire Alarms and the Problem of Legitimacy -- </subfield><subfield code="t">Chapter 5. Should We Rely on Whistleblowers? Disobedience and the Problem of Retaliation -- </subfield><subfield code="t">Chapter 6. Should We Trust Leakers? Anonymous Sources and the Problem of Regulation -- </subfield><subfield code="t">Conclusion. Bitter Medicine -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Selected Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Secrets and Leaks examines the complex relationships among executive power, national security, and secrecy. State secrecy is vital for national security, but it can also be used to conceal wrongdoing. How then can we ensure that this power is used responsibly? Typically, the onus is put on lawmakers and judges, who are expected to oversee the executive. Yet because these actors lack access to the relevant information and the ability to determine the harm likely to be caused by its disclosure, they often defer to the executive's claims about the need for secrecy. As a result, potential abuses are more often exposed by unauthorized disclosures published in the press. But should such disclosures, which violate the law, be condoned? Drawing on several cases, Rahul Sagar argues that though whistleblowing can be morally justified, the fear of retaliation usually prompts officials to act anonymously--that is, to "leak" information. As a result, it becomes difficult for the public to discern when an unauthorized disclosure is intended to further partisan interests. Because such disclosures are the only credible means of checking the executive, Sagar writes, they must be tolerated, and, at times, even celebrated. However, the public should treat such disclosures skeptically and subject irresponsible journalism to concerted criticism.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 30. Aug 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Leaks (Disclosure of information).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Official secrets.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Whistle blowing</subfield><subfield code="x">Political aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / History &amp; Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Congress.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Constitution.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Freedom of Information Act.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">U.S. Congress.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">anonymity of disclosures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">classified information disclosure.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">classified information.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">courts.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">democracy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">executive power.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">executive privilege.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">executive.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">judges.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">judicial review.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">law.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">leaking.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">legitimacy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">national security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public interest.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">retaliation.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">state secrecy.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">statecraft.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transparency.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">unauthorized disclosure.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">unauthorized disclosures.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">whistleblowers.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">whistleblowing.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">wrongdoing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sagar, Rahul.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2016</subfield><subfield code="z">9783110485103</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Social Sciences 2016</subfield><subfield code="z">9783110485332</subfield><subfield code="o">ZDB-23-DSW</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Princeton University Press Complete eBook-Package 2016</subfield><subfield code="z">9783110638592</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780691168180</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781400880850?locatt=mode:legacy</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781400880850</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/cover/covers/9781400880850.jpg</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-063859-2 Princeton University Press Complete eBook-Package 2016</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2016</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DSW</subfield><subfield code="b">2016</subfield></datafield></record></collection>