Secrecy

Last updated
U.S. soldier at camp during World War II. If You Talk Too Much This Man May Die mirror.jpg
U.S. soldier at camp during World War II.
Loose lips might sink ships, World War II slogan Loose lips might sink ships.jpg
Loose lips might sink ships, World War II slogan

Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.

Contents

Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy.

First secret confidence to Venus, Francois Jouffroy Premier-secret-confie-a-Venus.jpg
First secret confidence to Venus, François Jouffroy

Secrecy by government entities is often decried as excessive or in promotion of poor operation[ by whom? ]; excessive revelation of information on individuals can conflict with virtues of privacy and confidentiality. It is often contrasted with social transparency.

A Secret from on High (Secret d'en haut), Hippolyte Moulin (Hypolite Moulin), 1879 Un Secret d'en haut.jpg
A Secret from on High (Secret d'en haut), Hippolyte Moulin (Hypolite Moulin), 1879
A burn bag and security classification stickers on a laptop, between U.S.President Barack Obama and Vice President Joe Biden, May 1, 2011 Burnbag Obama Biden.jpg
A burn bag and security classification stickers on a laptop, between U.S.President Barack Obama and Vice President Joe Biden, May 1, 2011

Secrecy can exist in a number of different ways: encoding or encryption (where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as through government security classification)[ citation needed ] and obfuscation, where secrets are hidden in plain sight behind complex idiosyncratic language (jargon) or steganography.

Another classification proposed by Claude Shannon in 1948 reads that there are three systems of secrecy within communication: [1]

  1. Concealment systems, including such methods as invisible ink, concealing a message in a harmless text in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the enemy.
  2. Privacy systems, for example, voice inversion, is a special equipment required to recover the message.
  3. "True" secrecy systems where the meaning of the message is concealed by the cypher, code, etc. Although, its existence is not hidden. The enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal.

Sociology

Animals conceal the location of their den or nest from predators. Squirrels bury nuts, hiding them, and they try to remember their locations later. [2]

Humans attempt to consciously conceal aspects of themselves from others due to shame, or from fear of violence, rejection, harassment, loss of acceptance, or loss of employment. Humans may also attempt to conceal aspects of their own self which they are not capable of incorporating psychologically into their conscious being. Families sometimes maintain "family secrets", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family honor. The information may even be something as trivial as a recipe.[ citation needed ]

The Secret, (Das Geheimnis) by Moritz Stifter, 1885 Moritz Stifter Das Geheimnis 1885.jpg
The Secret, (Das Geheimnis) by Moritz Stifter, 1885

Secrets are sometimes kept to provide the pleasure of surprise. This includes keeping secret about a surprise party, not telling spoilers of a story, and avoiding exposure of a magic trick.[ citation needed ]

Keeping one’s strategy secret – is important in many aspects of game theory.[ citation needed ]

In anthropology secret sharing is one way for people to establish traditional relations with other people. [3] A commonly used[ citation needed ] narrative that describes this kind of behavior is Joseph Conrad's short story "The Secret Sharer".[ citation needed ]

Government

Governments often attempt to conceal information from other governments and the public. These state secrets can include weapon designs, military plans, diplomatic negotiation tactics, and secrets obtained illicitly from others ("intelligence"). Most nations have some form of Official Secrets Act (the Espionage Act in the U.S.) and classify material according to the level of protection needed (hence the term "classified information"). An individual needs a security clearance for access and other protection methods, such as keeping documents in a safe, are stipulated. [4]

Few people dispute the desirability of keeping Critical Nuclear Weapon Design Information secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S. Freedom of Information Act and sunshine laws. Government officials sometimes leak information they are supposed to keep secret. (For a recent (2005) example, see Plame affair.) [5]

Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.[ citation needed ]

Corporations

Organizations, ranging from multi-national for profit corporations to nonprofit charities, keep secrets for competitive advantage, to meet legal requirements, or, in some cases, to conceal nefarious behavior. [ citation needed ]New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by trade secret laws.

Research on corporate secrecy has studied the factors supporting secret organizations. [6] In particular, scholars in economics and management have paid attention to the way firms participating in cartels work together to maintain secrecy and conceal their activities from antitrust authorities. [7] The diversity of the participants (in terms of age and size of the firms) influences their ability to coordinate to avoid being detected.

The patent system encourages inventors to publish information in exchange for a limited time monopoly on its use, though patent applications are initially secret. Secret societies use secrecy as a way to attract members by creating a sense of importance.[ citation needed ]

Shell companies may be used to launder money from criminal activity, to finance terrorism, or to evade taxes. Registers of beneficial ownership aim at fighting corporate secrecy in that sense. [8]

Other laws require organizations to keep certain information secret, such as medical records (HIPAA in the U.S.), or financial reports that are under preparation (to limit insider trading). Europe has particularly strict laws about database privacy. [9]

In many countries, neoliberal reforms of government have included expanding the outsourcing of government tasks and functions to private businesses with the aim of improving efficiency and effectiveness in government administration. However, among the criticisms of these reforms is the claim that the pervasive use of "Commercial-in-confidence" (or secrecy) clauses in contracts between government and private providers further limits public accountability of governments and prevents proper public scrutiny of the performance and probity of the private companies. Concerns have been raised that 'commercial-in-confidence' is open to abuse because it can be deliberately used to hide corporate or government maladministration and even corruption.[ citation needed ]

Computing

Das Geheimnis (The Secret) (Le secret), Felix Nussbaum Das Geheimnis - Le secret.jpg
Das Geheimnis (The Secret) (Le secret), Felix Nussbaum

Preservation of secrets is one of the goals of information security. Techniques used include physical security and cryptography. The latter depends on the secrecy of cryptographic keys. Many believe that security technology can be more effective if it itself is not kept secret. [10]

Information hiding is a design principle in much software engineering. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.[ citation needed ]

Military

A Stolen Interview, Edmund Blair Leighton Edmund Blair Leighton - A Stolen interview.jpg
A Stolen Interview, Edmund Blair Leighton

Military secrecy is the concealing of information about martial affairs that is purposely not made available to the general public and hence to any enemy, in order to gain an advantage or to not reveal a weakness, to avoid embarrassment, or to help in propaganda efforts. Most military secrets are tactical in nature, such as the strengths and weaknesses of weapon systems, tactics, training methods, plans, and the number and location of specific weapons. Some secrets involve information in broader areas, such as secure communications, cryptography, intelligence operations, and cooperation with third parties. [11]

US Government rights in regard to military secrecy were uphold in the landmark legal case of United States v. Reynolds , decided by the Supreme Court in 1953. [12]

Views

Excessive secrecy is often cited [13] as a source of much human conflict. One may have to lie in order to hold a secret, which might lead to psychological repercussions.[ original research? ] The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question.[ improper synthesis? ]

Nearly 2500 years ago, Sophocles [ who? ] wrote: 'Do nothing secretly; for Time sees and hears all things, and discloses all.'.[ citation needed ] Gautama Siddhartha said: "Three things cannot long stay hidden: the sun, the moon and the truth.".

See also

Related Research Articles

<span class="mw-page-title-main">Cryptanalysis</span> Study of analyzing information systems in order to discover their hidden aspects

Cryptanalysis refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.

<span class="mw-page-title-main">Encryption</span> Process of converting plaintext to ciphertext

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.

<span class="mw-page-title-main">One-time pad</span> Encryption technique

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key. Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition.

<span class="mw-page-title-main">Public-key cryptography</span> Cryptographic system with public and private keys

Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.

Steganography is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, message, image, or video is concealed within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós, meaning "covered or concealed", and -graphia meaning "writing".

<span class="mw-page-title-main">Symmetric-key algorithm</span> Algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both the encryption of plaintext and the decryption of ciphertext. The keys may be identical, or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain a private information link. The requirement that both parties have access to the secret key is one of the main drawbacks of symmetric-key encryption, in comparison to public-key encryption. However, symmetric-key encryption algorithms are usually better for bulk encryption. With exception of the one-time pad they have a smaller key size, which means less storage space and faster transmission. Due to this, asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.

Kerckhoffs's principle of cryptography was stated by Dutch-born cryptographer Auguste Kerckhoffs in the 19th century. The principle holds that a cryptosystem should be secure, even if everything about the system, except the key, is public knowledge. This concept is widely embraced by cryptographers, in contrast to security through obscurity, which is not.

<span class="mw-page-title-main">Digital signature</span> Mathematical scheme for verifying the authenticity of digital documents

A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature on a message gives a recipient confidence that the message came from a sender known to the recipient.

Radical transparency is a phrase used across fields of governance, politics, software design and business to describe actions and approaches that radically increase the openness of organizational process and data. Its usage was originally understood as an approach or act that uses abundant networked information to access previously confidential organizational process or outcome data.

As an ethic that spans science, engineering, business, and the humanities, transparency is operating in such a way that it is easy for others to see what actions are performed. Transparency implies openness, communication, and accountability.

Cryptography, the use of codes and ciphers to protect secrets, began thousands of years ago. Until recent decades, it has been the story of what might be called classical cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

<span class="mw-page-title-main">Key exchange</span> Cryptographic protocol enabling the sharing of a secret key over an insecure channel

Key exchange is a method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm.

A cryptosystem is considered to have information-theoretic security if the system is secure against adversaries with unlimited computing resources and time. In contrast, a system which depends on the computational cost of cryptanalysis to be secure is called computationally, or conditionally, secure.

In cryptography, a semantically secure cryptosystem is one where only negligible information about the plaintext can be feasibly extracted from the ciphertext. Specifically, any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a certain message , and the message's length, cannot determine any partial information on the message with probability non-negligibly higher than all other PPTA's that only have access to the message length. This concept is the computational complexity analogue to Shannon's concept of perfect secrecy. Perfect secrecy means that the ciphertext reveals no information at all about the plaintext, whereas semantic security implies that any information revealed cannot be feasibly extracted.

End-to-end encryption (E2EE) is a private communication system in which only communicating users can participate. As such, no one, including the communication system provider, telecom providers, Internet providers or malicious actors, can access the cryptographic keys needed to converse.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key-agreement protocols that gives assurances that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised, limiting damage. For HTTPS, the long-term secret is typically the private key of the server. Forward secrecy protects past sessions against future compromises of keys or passwords. By generating a unique session key for every session a user initiates, the compromise of a single session key will not affect any data other than that exchanged in the specific session protected by that particular key. This by itself is not sufficient for forward secrecy which additionally requires that a long-term secret compromise does not affect the security of past session keys.

<span class="mw-page-title-main">Invention Secrecy Act</span> United States national security law

The Invention Secrecy Act of 1951 is a body of United States federal law designed to prevent disclosure of new inventions and technologies that, in the opinion of selected federal agencies, present an alleged threat to the economic stability or national security of the United States.

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

References

  1. Shannon, C.E. (1946–1948). "Communication Theory of Secrecy Systems" (PDF): 1.{{cite journal}}: Cite journal requires |journal= (help)
  2. November 2018, Emma Bryce-Live Science Contributor 17 (17 November 2018). "How Do Squirrels Remember Where They Buried Their Nuts?". livescience.com. Retrieved 2020-06-03.{{cite web}}: |first= has generic name (help)CS1 maint: numeric names: authors list (link)
  3. Manderson, Lenore; Davis, Mark; Colwell, Chip; Ahlin, Tanja (December 2015). "On Secrecy, Disclosure, the Public, and the Private in Anthropology: An Introduction to Supplement 12". Current Anthropology. 56 (S12): S183–S190. doi:10.1086/683302. ISSN   0011-3204. S2CID   147148098.
  4. Government of Canada, Public Services and Procurement Canada (2017-12-12). "Chapter 5: Handling and safeguarding of classified and protected information and assets – Industrial Security Manual – Security requirements for contracting with the Government of Canada – Canada.ca". www.tpsgc-pwgsc.gc.ca. Retrieved 2020-06-03.
  5. "- THE FREEDOM OF INFORMATION ACT: ENSURING TRANSPARENCY AND ACCOUNTABILITY IN THE DIGITAL AGE". www.govinfo.gov. Retrieved 2020-06-03.
  6. Baker, Wayne E.; Faulkner, Robert R. (1993). "The Social Organization of Conspiracy: Illegal Networks in the Heavy Electrical Equipment Industry". American Sociological Review. 58 (6): 837–860. doi:10.2307/2095954. ISSN   0003-1224. JSTOR   2095954.
  7. Faulkner, Robert R.; Cheney, Eric R.; Fisher, Gene A.; Baker, Wayne E. (2003). "Crime by Committee: Conspirators and Company Men in the Illegal Electrical Industry Cartel, 1954–1959". Criminology. 41 (2): 511–554. doi:10.1111/j.1745-9125.2003.tb00996.x. ISSN   1745-9125.
  8. "How Anonymous Shell Companies Finance Insurgents, Criminals, and Dictators". Council on Foreign Relations. Retrieved 2020-06-03.
  9. "Data protection in the EU". European Commission - European Commission. Retrieved 2020-06-03.
  10. Read "Computers at Risk: Safe Computing in the Information Age" at NAP.edu. 1991. doi:10.17226/1581. ISBN   978-0-309-04388-5.
  11. "Digital Open Source Intelligence and International Security: A Primer". edam.org.tr. 17 July 2018. Retrieved 2020-06-03.
  12. US Supreme Court, United States v. Reynolds, 345 U.S. 1 (1953), decided 8 March 1953, accessed 5 April 2023
  13. Lightfoot, Geoffrey; Wisniewski, Tomasz Piotr (2014). "Information asymmetry and power in a surveillance society". Information and Organization. 24 (4): 214–235.
Also available as: Taylor, Henry (1836), "On secrecy", in Taylor, Henry (ed.), The statesman, London: Longman, Rees, Orme, Brown, Green, & Longman, pp. 128–131, OCLC   4790233. Preview.

Further reading