Advertisement

The Threat of Secrecy

  • Daniele Santoro
  • Manohar Kumar
Chapter
  • 323 Downloads
Part of the Philosophy and Politics - Critical Explorations book series (PPCE, volume 6)

Abstract

National security and strategic interests of the modern state require a certain amount of secrecy. However, state secrecy poses a dilemma for constitutional democracies, whose legitimacy depends on the transparency of democratic decision-making. In this chapter, we defend the argument that citizens’ right to know limits the prerogatives of state secrecy. We start from the debate on the balance between liberty and security and provide some criticisms of the idea that striking a balance is always justified in a democracy. We pay particular attention to the role secrecy plays in matters of national security and the effects of unrestrained secrecy on the enjoyment of rights. We then introduce the notion of epistemic entitlement of rights and argue that secrecy is legitimate within a constitutional democracy only when citizens enjoy a specific right to know in which circumstances their rights can be legitimately limited or restricted. We call this the right of assessment.

Keywords

Balance model Epistemic entitlement Liberty Right of assessment Rights State secrecy Security 

References

  1. Ackerman, Bruce. 2004. The emergency constitution. Yale Law Journal 113: 1029–1091.CrossRefGoogle Scholar
  2. Ackerman, Spencer. 2014. US cited controversial law in decision to kill American citizen by drone. The Guardian. 23 June. https://www.theguardian.com/world/2014/jun/23/us-justification-drone-killing-american-citizen-awlaki. Accessed 8 Feb 2018.
  3. Anderson, Elizabeth. 2006. The epistemology of democracy. Episteme: A Journal of Social Epistemology 3 (1–2): 8–22.CrossRefGoogle Scholar
  4. Arendt, Hannah. 1972. Crises of the Republic: Lying in Politics, Civil Disobedience, on Violence, Thoughts on Politics and Revolution. New York: Harcourt, Brace & Co.Google Scholar
  5. Bentham, Jeremy. 1838. Principles of the civil code. In The Works of Jeremy Bentham. Part II, ed. John Bowring. Edinburgh: William Tait. https://books.google.fr/books?id=LU5ZAAAAcAAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false. Accessed 8 Feb 2018.
  6. Berman, Emily. 2009. Executive Privilege: A Legislative Remedy. New York University School of Law, Brennan Center for Justice. http://ssrn.com/abstract=2112138. Accessed 8 Feb 2018.
  7. Black, Edwin. 2012. IBM and the Holocaust: The Strategic Alliance Between Nazi Germany and America’s Most Powerful Corporation. New York: Random House Inc.Google Scholar
  8. Bobbio, Norberto. 1987. The Future of Democracy. A Defense of the Rules of the Game, ed. Richard Bellamy (trans: Roger Griffin). London: Polity Press.Google Scholar
  9. Bok, Sissela. 1983. Secrets: On the ethics of concealment and revelation. New York: Vintage Books.Google Scholar
  10. Brennan, William J. 1988. The quest to develop a jurisprudence of civil liberties in times of security crises. In Israel Yearbook on Human Rights, vol. 18, 11–22. Dordrecht: Martinus Nijhoff Publishers.Google Scholar
  11. Breslow, Jason M. 2016. Colin Powell: U.N. Speech ‘Was a Great Intelligence Failure’. Frontline. 17 May 2016. http://www.pbs.org/wgbh/frontline/article/colin-powell-u-n-speech-was-a-great-intelligence-failure/. Accessed 1 Mar 2017.
  12. Calhoun, L. 2015. We Kill Because We Can: From Soldiering to Assassination in the Drone Age. London: Zed Books.Google Scholar
  13. Chambers, Simone. 2004. Behind closed doors: Publicity, secrecy, and the quality of deliberation. Journal of Political Philosophy 12 (4): 389–410.CrossRefGoogle Scholar
  14. Chinen, Mark. 2009. Secrecy and democratic decisions. Qunnipiac Law Review 27 (1): 1–55.Google Scholar
  15. Cohen, Joshua. 1986. An epistemic conception of democracy. Ethics 97 (1): 26–38.CrossRefGoogle Scholar
  16. Cole, David. 2003. Their liberties, our security democracy and double standards. International Journal of Legal Information 31: 290–311.Google Scholar
  17. Dryzek, John S. 2000. Deliberative Democracy and Beyond. Oxford: Oxford University Press.Google Scholar
  18. Dworkin, Gerald. 1988. The Theory and Practice of Autonomy. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
  19. Dworkin, Ronald. 2002. The threat to patriotism. New York Review of Books 493: 44–49. http://www.nybooks.com/articles/archives/2002/feb/28/the-threat-to-patriotism/?pagination=false. Accessed 23 July 2013.Google Scholar
  20. Ellsberg, Daniel. 2002. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking.Google Scholar
  21. Elster, Jon. 1995. Strategic uses of argument. In Barriers to Conflict Resolution, ed. K. Arrow. New York: Norton.Google Scholar
  22. Estlund, David M. 2009. Democratic Authority: A Philosophical Framework. Princeton: Princeton University Press.CrossRefGoogle Scholar
  23. Feinberg, Joel. 1986. The Moral Limits of the Criminal Law Volume 3: Harm to Self. Oxford: Oxford University Press.Google Scholar
  24. Fenster, Mark. 2005. The opacity of transparency. Iowa Law Review 91: 885–949.Google Scholar
  25. Ferrara, Alessandro. 1998. Reflective Authenticity. London/New York: Routledge.Google Scholar
  26. Fisher, Louis. 2007. The state secrets privilege: Relying on Reynolds. Political Science Quarterly 122 (3): 385–408.CrossRefGoogle Scholar
  27. Fuchs, Meredith. 2006. Judging secrets: The role courts should play in preventing unnecessary secrecy. Administrative Law Review 58 (1): 130–176.Google Scholar
  28. German, Mike, and Jay Stanley. 2011. Drastic Measures Required: Congress Needs to Overhaul US Secrecy Laws and Increase Oversight of the Secret Security Establishment. https://www.aclu.org/files/assets/secrecyreport_20110727.pdf. Accessed 15 July 2017.
  29. Gettier, Edmund L. 1963. Is justified true belief knowledge? Analysis 23 (6): 121–123.CrossRefGoogle Scholar
  30. Graham, John. 2005. Who is watching the watch list? Alternate. 6 July. http://www.alternet.org/story/23362/who%27s_watching_the_watch_list. Accessed 18 Feb 2018.
  31. Greenwald, Glenn. 2017. Obama killed a 16-year-old American in Yemen. Trump just killed his 8-year-old sister. The Intercept. 30 January. https://theintercept.com/2017/01/30/obama-killed-a-16-year-old-american-in-yemen-trump-just-killed-his-8-year-old-sister/. Accessed 8 Feb 2018.
  32. Gutmann, Amy, and Dennis Thompson. 1996. Democracy and Disagreement. Cambridge, MA: The Belknap Press of Harvard University Press.Google Scholar
  33. Herring, George C., ed. 1993. The Pentagon Papers. Abridged edition. New York: McGraw-Hill.Google Scholar
  34. Hobbes, Thomas. 1996. Leviathan. (1651). ed. Richard Tuck. New York: Cambridge University Press.Google Scholar
  35. Horton, John. 2010. Political Obligation. London: Palgrave Macmillan.CrossRefGoogle Scholar
  36. Jones, Peter. 1994. Rights. London: Palgrave Macmillan.CrossRefGoogle Scholar
  37. Julius, A.J. 2003. Basic structure and the value of equality. Philosophy & Public Affairs 31 (4): 321–355.CrossRefGoogle Scholar
  38. Korsgaard, Christine M. 1996. The Sources of Normativity. New York: Cambridge University Press.CrossRefGoogle Scholar
  39. Kramer, Matthew H., N.E. Simmonds, and H. Steiner. 1998. A Debate Over Rights. Oxford: Oxford University Press.Google Scholar
  40. Lazar, Nomi C. 2009. States of Emergency in Liberal Democracies. New York: Cambridge University Press.CrossRefGoogle Scholar
  41. Locke, John. 1980. In Second Treatise of Government. (1689). ed. C.B. Macpherson. Indianapolis/Cambridge: Hackett Publishing Co.Google Scholar
  42. Mill, John S. 1863. On Liberty. (1859). 2nd ed. Ticknor and Fields.Google Scholar
  43. ———. 1879. Utilitarianism. (1861). 7th ed. London: Longmans Green and Co.Google Scholar
  44. Moore, Adam. 2011. Privacy, security, and government surveillance: The new accountability landscape. Public Affairs Quarterly 25 (2): 141–156.Google Scholar
  45. Moynihan, Daniel P. 1998. Secrecy: The American Experience. New Haven: Yale University Press.Google Scholar
  46. Neocleous, Mark. 2002. Privacy, secrecy, idiocy. Social Research: An International Quarterly 69 (1): 85–110.Google Scholar
  47. ———. 2008. Critique of Security. Montreal: McGill-Queen’s University Press.CrossRefGoogle Scholar
  48. Norton-Taylor, Richard. 2013. MI6 and CIA were told before invasion that Iraq had no active WMD. The Guardian. 18 May. https://www.theguardian.com/world/2013/mar/18/panorama-iraq-fresh-wmd-claims. Accessed 8 Feb 2018.
  49. Parry, Robert, and Peter Kornbluh. 1988. Iran-Contra’s untold story. Foreign Policy 72: 3–30.CrossRefGoogle Scholar
  50. Pogge, Thomas W.M. 2008a. World Poverty and Human Rights. London: Polity Press.Google Scholar
  51. ———. 2008b. Making war on terrorists—Reflections on harming the innocent. Journal of Political Philosophy 16 (1): 1–25.CrossRefGoogle Scholar
  52. Posner, Richard. 2006. Not a Suicide Pact: The Constitution in a Time of National Emergency. Oxford: Oxford University Press.Google Scholar
  53. Posner, Eric A., and Adrian Vermeule. 2007. Terror in the Balance: Security, Liberty and the Courts. Oxford: Oxford University Press.Google Scholar
  54. ———. 2011. The Executive Unbound: After the Madisonian Republic. Oxford: Oxford University Press.CrossRefGoogle Scholar
  55. Pozen, David. 2010. Deep secrecy. Stanford Law Review 62 (2): 257–340.Google Scholar
  56. Priest, Dana, and William M. Arkin. 2016. A hidden world, growing beyond control. Top Secret America. A Washington Post Investigation. Washington Post. http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/. Accessed 1 Mar 2017.
  57. Rawls, John. 1999. A Theory of Justice, revised edition. Cambridge, MA: The Belknap Press of Harvard University Press.Google Scholar
  58. Raz, Joseph. 1986. The Morality of Freedom. Oxford: Clarendon Press.Google Scholar
  59. Rozell, Mark J. 2002. Executive Privilege: Presidential Power, Secrecy, and Accountability. Lawrence: University Press of Kansas.Google Scholar
  60. Sacirbey, Omar. 2011. Muslims and ACLU sue FBI over mosque surveillance. Religion News Service. The Huffington Post. 25 May. http://www.huffingtonpost.com/2011/02/23/muslims-and-aclu-sue-fbi-_n_827339.html. Accessed 7 June 2013.
  61. Sagar, Rahul. 2007. On combating the abuse of state secrecy. The Journal of Political Philosophy 15 (4): 404–427.CrossRefGoogle Scholar
  62. ———. 2009. Who holds the balance? A missing detail in the debate over balancing security and liberty. Polity 41 (2): 166–188.CrossRefGoogle Scholar
  63. Santoro, Daniele, and Manohar Kumar. 2017. Liberty, secrecy, and the right of assessment. Unpublished manuscript. Available with the authors.Google Scholar
  64. Savage, C., Eric Schmitt, and Mark Mazzetti. 2016. Obama expands war with Al Qaeda to include Shabab in Somalia. The New York Times. 27 November. https://www.nytimes.com/2016/11/27/us/politics/obama-expands-war-with-al-qaeda-to-include-shabab-in-somalia.html?_r=0. Accessed 8 Feb 2018.
  65. Shenon, Philip, and Stephen Engelberg. 1987. Eight important days in november: Unraveling the Iran-Contra affair. The New York Times. 4 July. http://www.nytimes.com/1987/07/05/world/eight-important-days-in-november-unraveling-the-iran-contra-affair.html?pagewanted=all. Accessed 8 Feb 2018.
  66. Simmel, Georg. 1906. The sociology of secrecy and of secret societies. The American Journal of Sociology 11 (4): 441–498.CrossRefGoogle Scholar
  67. Solove, Daniel J. 2008. Data mining and the security-liberty debate. University of Chicago Law Review 75: 343–362.Google Scholar
  68. Steiner, Hillel. 1994. An Essay on Rights. Oxford/Cambridge, MA: Blackwell.Google Scholar
  69. Stiglitz, Joseph. 1999. On Liberty, the Right to Know, and Public Discourse: The Role of Transparency in Public Life. Oxford Amnesty Lecture. January 27, 1999. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.594.93&rep=rep1&type=pdf. Accessed 23 Feb 2018.
  70. Sunstein, Cass. 1986. Government control of information. Symposium: New perspectives in the law of defamation. California Law Review 74 (3): 889–921.CrossRefGoogle Scholar
  71. ———. 2002. Conformity and Dissent. University of Chicago Law & Economics, Olin Working Paper No. 164; and University of Chicago, Public law research paper No. 34. Available at SSRN: http://ssrn.com/abstract=341880 or  https://doi.org/10.2139/ssrn.341880. Accessed 20 July 2012.
  72. The European Convention on Human Rights. 1950. Council of Europe. Rome.Google Scholar
  73. Thompson, Dennis. 1999. Democratic secrecy. Political Science Quarterly 114 (2): 181–193.CrossRefGoogle Scholar
  74. Van Buren, Peter. 2012. Obama’s unprecedented war on whistleblowers. From Manning to Kiriakou. Salon. February 9.Google Scholar
  75. Vermeule, Adrian. 2014. Security and liberty: Critiques of the tradeoff thesis. In The Long Decade: How 9/11 Changed the Law, ed. David Jenkins, Amanda Jacobsen, and Anders Heriksen, 31–44. Oxford/New York: Oxford University Press.CrossRefGoogle Scholar
  76. Waldron, Jeremy. 2003. Security and liberty: The image of balance. The Journal of Political Philosophy 11(2): 191–210, now included in Waldron, Jeremy. 2012. Torture, Terror, and Trade-Offs: Philosophy for the White House, 20–47. Oxford/New York: Oxford University Press.Google Scholar
  77. ———. 2006. Safety and security. Nebraska Law Review 85: 454–507.Google Scholar
  78. Weber, Max. 1978. Economy and Society: An Outline of Interpretative Sociology. Vol. 1. Berkeley: University of California Press.Google Scholar
  79. Wenar, Leif. 2011. Rights. In The Stanford Encyclopedia of Philosophy, ed. Edward N. Zalta. http://plato.stanford.edu/archives/fall2011/entries/rights/. Accessed 18 Feb 2018.
  80. Williams, Bernard. 1996. Truth, politics and self-deception. Social Research: An International Quarterly 63 (4): 603–617.Google Scholar
  81. Zedner, Lucia. 2005. Securing liberty in the face of terror: Reflections from criminal justice. Journal of Law and Society 32 (4): 507–533.CrossRefGoogle Scholar
  82. ———. 2007. Seeking security by eroding rights. The side-stepping of due process. In Security and Human Rights, ed. Benjamin J. Goold and Laura Lazarus, 257–276. Oxford/Portland: Hart Publishing.Google Scholar
  83. ———. 2009. Security. London/New York: Routledge.Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Daniele Santoro
    • 1
  • Manohar Kumar
    • 2
  1. 1.Centre for Ethics, Politics, and Society, ILCHUniversity of MinhoBragaPortugal
  2. 2.Department of Social Sciences and HumanitiesIndraprastha Institute of Information Technology, DelhiNew DelhiIndia

Personalised recommendations