Born secret

Last updated

A 1946 "Restricted Data" stamp on an Atomic Energy Commission document. Restricted Data stamp.jpg
A 1946 "Restricted Data" stamp on an Atomic Energy Commission document.
One of the Mk 39 nuclear weapons at Goldsboro, largely intact, with its parachute still attached. Goldsboro bomb Weapon No 1 color.jpg
One of the Mk 39 nuclear weapons at Goldsboro, largely intact, with its parachute still attached.
The Rocky Flats Plant, which released plutonium into the environment. Rocky Flats Site in July 1995 Prior to Final Cleanup.jpg
The Rocky Flats Plant, which released plutonium into the environment.

Born secret (also known as born classified) is a legal doctrine in the United States where certain information is automatically classified from the moment it is created, regardless of author or location. Scholars describe the doctrine as unique in U.S. law because it can criminalize the discussion of information that is already publicly available. The rule originated in laws of the United States covering the design, production, and use of nuclear weapons, although it has also been used to classify other nuclear technologies and cryptography data. The United States Department of Energy has called the born secret doctrine controversial.

Contents

The doctrine is associated with the Restricted Data category created by the Atomic Energy Act of 1946 and retained in the Atomic Energy Act of 1954, which treated nuclear weapons and related nuclear energy information as legally protected by default until affirmatively removed from that category. Legal and policy debate has focused on its relationship to the First Amendment to the United States Constitution, particularly because attempts to apply it can resemble prior restraint.

A challenge arose in United States v. The Progressive , a 1979 dispute over an article assembled from unclassified sources about the hydrogen bomb; the case ended without a definitive ruling when it was dismissed as moot. Experts have argued that secrecy rules associated with the doctrine complicate reporting on nuclear safety, accidents, contamination, and public health impacts.

History

The born-secret concept applied to any data related to nuclear technologies, whether the specific technology was developed by the United States government or by other parties. [1] Howard Morland, writing in Cardozo Law Review , compared the doctrine to a permanent gag order on nuclear ideas and concepts. [2] The idea is rooted in the Atomic Energy Act of 1946, which declared that all information about nuclear weapons and nuclear energy was 'Restricted Data' until officially declassified. [3] :87 In the 1954 revision, the United States Atomic Energy Commission (AEC) gained authority to declassify entire categories of information. [3] :92 The policy assumed that nuclear information could be so vital to national security that it required classification even before formal evaluation. [3] :87,91–92 The 1954 act defined Restricted Data as:

All data concerning (1) design, manufacture, or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the Restricted Data category pursuant to section 2162 of this title. [3] :91

United States government scientists working on nuclear weapons design have held Q clearance, to access Restricted Data. [4] [3] In 2006, the United States Department of Energy (DOE) itself called the born-secret doctrine "very controversial." [5] Writing for the Department, Nick Prospero cited concerns about constitutionality and the stifling of scientific progress. [5] Prospero also noted long-standing public pressure for open access to health, safety, and environmental data—issues stretching back to the DOE's predecessors, the AEC and the Energy Research and Development Administration. [5]

Legality and challenges

The constitutionality of categorically classifying information at the moment of its creation remains untested in U.S. courts. [3] Commentators have questioned whether categorically restricting dissemination of information at the moment it is created is compatible with the First Amendment to the United States Constitution, particularly where enforcement takes the form of prior restraint. [2] [6] The born‑secret doctrine is reported as the only area of United States law in which discussion of information already in the public sphere is illegal. [2]

United States v. The Progressive

The legality of the "born secret" doctrine was directly challenged in a 1979 freedom of the press case, United States v. The Progressive . [2] In that case, the magazine The Progressive attempted to publish an account of the so-called "secret of the hydrogen bomb"—the Teller–Ulam design—created entirely from unclassified sources. [2] Many analysts predicted that the United States Supreme Court would, if it heard the case, strike down the born‑secret clause as an unconstitutional restraint on speech. [2] However, the government dropped the case as moot before it was resolved. [6]

Under the laws of the United States, prior restraint is the state censorship of speech by the government before the sharing of information occurs, and is defined in law and allowed in narrow scenarios. [7] Writing in the Cardozo Law Review, Aviam Soifer argues that classification can even apply retroactively to the original conception—or "germination"—of an idea. [8] In Security Classification of Information, Volume 1, Arvin Quist described the statutory "Restricted Data" regime as unique to nuclear information, but noted that the National Security Agency (NSA) later pursued analogous controls over cryptography through voluntary prepublication review rather than legislation. [3] [9]

Voluntary compliance and NSA

Corrigan and Gibbs in Stanford Magazine describe the NSA response as moving toward measures such as voluntary commercial and academic compliance, including a voluntary compliance system for cryptography research papers that was intended as a compromise approach. The cryptography dispute began in 1977, when a letter from J. A. Meyer warned the Institute of Electrical and Electronics Engineers that publishing work on encryption could violate federal regulations and expose authors and publishers to prosecution, including under export-control theories and laws such as the U.S.'s International Traffic in Arms Regulations. Meyer was identified by journalists as an NSA employee and the letter helped trigger wider academic and press attention around whether publication could be treated as a national security offense. [9]

The stakeholders in the non-legislative approach included academic researchers, commercial researchers, and scientific publishers, because the compromise mechanism depended on voluntary behavior by authors and journals rather than a statutory restriction. Corrigan and Gibbs connected the shift to NSA director Vice Admiral Bobby Ray Inman, who convened an internal panel that considered seeking new legislation, then moved toward voluntary prepublication review after legislative options were described as politically unviable. [9]

Publication options and risks

Martin Hellman argued that even if publication were blocked in journals, researchers could still disclose work through public talks via the First Amendment. Steven Aftergood of the Federation of American Scientists described voluntary review as the best compromise that participants had found, and notes that similar voluntary systems were later attempted by other scientific journals. The prepublication review process was used for about a decade before it "fell apart" amid growing civilian and commercial uses for cryptography and the rapid expansion of the field. [9]

As suppressing publication proved difficult to sustain in public, the NSA emphasized other points of influence over nongovernmental cryptography, including research funding and national standards. Corrigan and Gibbs described NSA involvement in reviewing research grant applications and a parallel effort to shape which cryptosystems entered national standards via the National Bureau of Standards (later the National Institute of Standards and Technology), including later-declassified accounts of NSA pressure and disputes over the Data Encryption Standard (DES) cryptography algorithm key lengths, which determined the potential strength of DES's encryption. [9]

Quist cited Federal Register notices in 1967 and 1972—that a loophole exists for certain topics of classification:

According to current DOE procedures, research and development on methods of isotope separation other than gaseous diffusion or gas centrifuge can be carried out on an unclassified basis until that research shows a "reasonable potential for the separation of practical quantities of special nuclear material." Thus, this area of atomic‑energy information is not "born classified" but is classified only when it reaches "adolescence." [3]

In the early years of the American nuclear program, scientists expressed fear of unintentionally violating the Atomic Energy Act. [10] Because declassifications were rare, researchers often could not tell what they were allowed to publish or even discuss. [10] Recommendations therefore urged the AEC to "publish explicit and detailed catalogues of types of data not included in the restricted category," so that those working with nuclear matters would no longer face "the intolerable fear that publication of every research finding is a violation of the Atomic Energy Act of 1946." [10] [11]

Risks to media coverage of nuclear incidents

Aryeh Neier, writing in 1980 for the Index on Censorship essay USA: Born classified, warned that the born-secret doctrine could be invoked to suppress reporting on nuclear accidents and contamination. [12] As examples of incidents he believed were inadequately reported due to secrecy, Neier cited three events. The Rocky Flats Plant near Denver, Colorado released plutonium and uranium into the atmosphere multiple times over years, including wastewater discharges. [13] :6,19,20 [14] :85 In the 1966 Palomares B-52 crash in Spain, a mid-air collision dropped undetonated thermonuclear weapons to the Earth. [12] Following the 1966 B-52 crash, four bombs fell to earth; three were recovered on land near the fishing village of Palomares in the municipality of Cuevas del Almanzora, where the conventional explosives in two warheads detonated on impact, contaminating roughly 0.77 sq mi (2 km2) with plutonium. The fourth bomb was located intact on the floor of the Mediterranean Sea after an 80-day search. [15]

The 1961 Goldsboro B-52 crash in North Carolina was also cited by Neier, and was a "Broken Arrow" nuclear accident of the Cold War. [12] In January 1961, the bomber had a rendezvous with a tanker for aerial refueling but suffered a fuel leak that led to the plane crashing with nuclear weapons aboard, which were released. The weapons began their firing sequences despite safeguards meant to prevent that from occurring. One of its nuclear bombs was judged by nuclear weapons engineers at the time to have been only one safety switch away from detonation, and that it was "credible" to imagine conditions under which it could have detonated. The other bomb did not get as far into its firing sequence and one of its major weapons components, the thermonuclear "secondary" stage, was regarded as irrecoverably lost after an extensive, failed effort to recover it. [16] The National Security Archive later published additional declassified material on nuclear weapons safety and security issues. [17]

Neier noted that editors of The Progressive cited such accidents and contamination incidents to argue, in the United States v. Progressive dispute, that nuclear secrecy had suppressed public discussion of safety and risk. [12]

John Aristotle Phillips

In 1976, Princeton University undergraduate John Aristotle Phillips designed, on paper, a nuclear weapon to demonstrate how easily such technology might be acquired by American adversaries. [18] Although his design relied solely on publicly available information, the completed work was made classified and was therefore illegal to disseminate in the United States. [19] Phillips reflected:

Suppose an average—or below-average in my case—physics student at a university could design a workable atomic bomb on paper. That would prove the point dramatically and show the federal government that stronger safeguards have to be placed on the manufacturing and use of plutonium. In short, if I could design a bomb, almost any intelligent person could. [20]

See also

References

PD-icon.svg This article incorporates public domain material from websites or documents of the United States government .

  1. Wellerstein, Alex (August 18, 2022). "Can Trump Just Declare Nuclear Secrets Unclassified?". Lawfare . Archived from the original on August 30, 2023. Retrieved August 31, 2024. Over the years, the 'all data' part would be taken very literally: All data relating to atomic weapons, irrespective of who discovered or invented it, or whether they worked for the U.S. government or not, would be covered.
  2. 1 2 3 4 5 6 Howard Morland (March 2005). "Born Secret" (PDF). Cardozo Law Review : 1401–1408. Archived from the original (PDF) on May 12, 2006.
  3. 1 2 3 4 5 6 7 8 Quist, Arvin (2002). "4". Security Classification of Information: Vol. 1. Introduction, History, and Adverse Impacts, chapter 4, "Classification Under The Atomic Energy Act" (PDF). Oak Ridge National Laboratory. Archived from the original on September 22, 2021.
  4. William, Burr (July 1, 2003). "1960s "Nth Country Experiment" Foreshadows Today's Concerns Over the Ease of Nuclear Proliferation". National Security Archive . Archived from the original on August 24, 2017. Retrieved August 31, 2024. The two scientists received "Q" clearances for nuclear weapons design information because any information that they developed on nuclear design would, under the law, be considered secret and "born classified."
  5. 1 2 3 Prospero, Nick (February 2006). ""Born Classified" - The Phrase That Won't Die" (PDF). United States Department of Energy . Archived (PDF) from the original on February 1, 2017. Retrieved August 31, 2024.
  6. 1 2 Entin, Jonathan L. (1980). "United States v. Progressive, Inc.: The Faustian Bargain and the First Amendment". Northwestern University Law Review . 75 (3): 541. ISSN   0029-3571. Archived from the original on May 14, 2018. The government moved to dismiss the case as moot after the Madison (Wis.) Press Connection published an article containing the same basic information by Charles Hansen; a California computer programmer, on September 16, 1979.
  7. "prior restraint". Legal Information Institute . Cornell Law School. Archived from the original on March 26, 2025.
  8. Soifer, Aviam (2024). "Born Classified, Born Free: An Essay for Henry Schwarzschild". Cardozo Law Review. 19: 16. Archived from the original on September 1, 2024. Retrieved August 20, 2024. The Born Classified rationale could apply from the moment of the germination of these ideas and could even be applied retroactively. In fact, the Progressive litigation exemplified this point. The decision by Government officials to label a publication as a national security risk moved the dispute outside the usual legal rules and beyond the ken of regular judicial processes.
  9. 1 2 3 4 5 Corrigan-Gibbs, Henry (2014). "Keeping Secrets". Stanford Magazine. Archived from the original on November 10, 2018. Even if Inman could get a bill through Congress, Hellman said, the First Amendment would make it difficult to prevent researchers from speaking publicly about their work. If they didn't publish their papers, "they'll give 100 talks before they submit it for publication." As a sort of last-ditch effort at compromise, Inman organized a voluntary system of prepublication review for cryptography research papers. A number of other scientific journals have attempted a similar system in recent years.
  10. 1 2 3 Quist, Arvin (2002). "3". Security Classification of Information: Vol. 1. Introduction, History, and Adverse Impacts. Oak Ridge National Laboratory, chapter 3, "Classification of Information--An Overview". Archived from the original on December 4, 2021.
  11. J. R. Newman & B. S. Miller (1948). The Control of Atomic Energy. New York: McGraw-Hill Book Company, Inc. p. 220. But to dispel doubts and to relieve physicists of the intolerable fear that publication of every research finding is a violation of the Act, the Commission will be well advised to publish explicit and detailed catalogues of types of data not included in the restricted category.
  12. 1 2 3 4 Aryeh Neier (February 1980). "USA: 'Born classified'". Index on Censorship . 9: 51–54. doi:10.1080/03064228008533026. Archived from the original on September 2, 2024.
  13. Till, John (September 1999). Technical Summary Report for the Historical Public Exposures Studies for Rocky Flats Phase II (PDF) (Report). Radiological Assessments Corporation. Archived from the original (PDF) on January 16, 2017. Retrieved January 4, 2025.
  14. ChemRisk (August 1992). "Reconstruction of Historical Rocky Flats Operations & Identification of Release Points" (PDF). Colorado Department of Public Health and Environment. Archived from the original (PDF) on January 27, 2025.
  15. Long, Tony (January 17, 2008). "Jan. 17, 1966: H-Bombs Rain Down on a Spanish Fishing Village". WIRED. Archived from the original on December 3, 2008. Retrieved February 16, 2008. A U.S. Air Force B-52 bomber collides with its refueling tanker jet in mid-air over the Spanish coast. Its four hydrogen bombs fall to earth near the fishing village of Palomares. The bomber collided with the KC-135 tanker at 31,000 feet. Exploding fuel completely destroyed the tanker, killing all four crew members. The B-52 broke apart, spilling its payload -- four Type B28RI hydrogen bombs equipped with 1.45-megaton warheads. Three hit the ground near Palomares while the fourth fell into the Mediterranean Sea.
  16. "Goldsboro revisited: account of hydrogen bomb near-disaster over North Carolina – declassified document". Guardian News. September 20, 2013. Retrieved June 21, 2020.
  17. Burr, William (November 18, 2022). "New Declassifications on Nuclear Weapons Safety and Security". National Security Archive.
  18. Peterson, Charles (May 8, 1977). "John Aristotle Phillips: The A-Bomb Kid". Youngstown Vindicator . Archived from the original on July 2, 2022. Retrieved July 24, 2011 via Google News.
  19. Collins, Paul (December 16, 2003). "The A-Bomb Kid". The Village Voice . Archived from the original on October 31, 2023.
  20. Wellerstein, Alex (April 9, 2021). Restricted Data: The History of Nuclear Secrecy in the United States (First ed.). University of Chicago Press. ASIN   B08SL9YB5B. ISBN   978-0226020419.