Skip navigation

Pfaw Government Secrecy 2007

Download original document:
Brief thumbnail
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
Decisions Without Democracy
by David Banisar
Preface by Bob Barr and John Podesta

Government Secrecy:
Decisions Without Democracy
BY DAVID BANISAR

People For the American Way Foundation is an energetic advocate for the values and institutions that sustain a
diverse democratic society, and which are threatened by the political rise of the religious right. PFAW Foundation
seeks to protect fundamental rights and freedoms guaranteed under the Constitution, sustain an independent
judiciary and mobilize activists to support progressive causes.
www.pfaw.org
People For the American Way • 2000 M Street, NW,
Suite 400 • Washington, DC 20036
Telephone: 202-467-4999 or 800-326-7329 • pfaw@pfaw.org
Donations to People For the American Way Foundation, a
nonprofit 501(c)(3) organization, are tax deductible

OpenTheGovernment.org is a coalition of consumer and good government groups, environmentalists, journalists,
library groups, labor and others united to make the federal government a more open place in order to make us safer,
strengthen public trust in government, and support our democratic principles.
 
www.openthegovernment.org  
OpenTheGovernment.org, 1742 Connecticut Avenue N.W., 3rd Floor, Washington D.C. 20009  202-332-OPEN (6736)
A project of the Fund for Constitutional Government.
All donations are tax-deductible to the maximum allowable by law.

This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License

FOREWORD. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 1
PREFACE	 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  3
PREFACE (1987 EDITION) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  5
EXECUTIVE SUMMARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  7
1. OPENNESS: AN AMERICAN VALUE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  9
	
	

The Benefits of Openness	
The History of Openness in the U.S.	

9
11

2. THE DARKENING CLOUD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
	
It’s a Secret: Classified and Semi-classified Information	
		
Classified information	
		
The U.S. Executive Order on Classification	
		
Declassification	
		
Now you see it, now you don’t: Secret Reclassifications	
		
Watching the Watchers: Oversight of the classification system	
		
Go Away: The State Secrets Privilege	
		
Keep away: It’s Sensitive (but not classified)!	
		
Propaganda and Dis-information	

13
13
14
15
16
16
17
18
20

	
Closing Doors	
		
The Freedom from Information Act: Limiting the FOIA	
		
Executive Privilege	
		
Closing the Courthouse Doors	

20
20
22
25

	
Gagging the Insiders: Public Employees	
		
Gag rules	
		
Plugging the Whistle	
		
Official Secrets?: The Espionage Act and other criminal statutes	
		
Attacking the Messenger: the Media and Protection of Sources	

26
26
27
28
29

3. OPPORTUNITIES FOR PUBLIC ACCESS AND PARTICIPATION IN A DIGITAL AGE. . . . 31
	
Electronic Government	
		
Access to government information online	
		
E-Rulemaking	

31
31
34

	
Challenges of Digital Government Information	
		
Digital Divide	
		
Disappearing documents and web sites	
		
Managing “Born Digital” Information	

34
34
35
35

	
What the Public Can Do	
		
Activism/ organizing	

36
36

APPENDIX – LIST OF RELEVANT LEGISLATION. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
APPENDIX – RESOURCES. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Government Secrecy: Decisions Without Democracy



Foreword
Excessive secrecy is the enemy of public accountability and democratic governance. Unfortunately, it is
becoming standard operating procedure for many government officials. Vice President Dick Cheney’s recent
insistence that his office is not subject to secrecy regulations that apply to the executive branch is just the
latest evidence of a systematic campaign to keep information about government activities out of the hands
of the American public.
Freedoms of Information laws are grounded in the recognition that knowledge about the government’s
actions is the necessary first step in oversight and accountability. Most Americans recognize the need to
safeguard national security information from improper public disclosures that would damage the national
interest. But national security has become a blanket excuse to withhold information from the public as well
as from Congress, especially in the aftermath of the 9/11 terrorist attacks.
The National Security Archive has documented widespread agency mismanagement and obstruction which
lead to delays as long as 17 years in responding to public Freedom of Information Act requests. Only one in
four agencies is complying with the Electronic Freedom of Information Act a decade after it passed.
Of course, the right to know is also undermined by the release of information that is inaccurate or misleading. At the federal level, politics increasingly trumps sound science: reports on key environmental issues are
altered by political appointees; information about HIV/AIDS is manipulated to promote a particular ideological viewpoint; and federal employees are muzzled from sharing their expertise.
The misuse of secrecy and the manipulation of science and other information undermine the public’s right to
know and the health of our democracy. And they threaten the health of the public as well: a fire at a chemical plant situated near a neighborhood could pose a serious threat to residents’ health, but it is difficult for
individuals to learn the most basic information about hazards to which their families may be exposed.
The preface to this report, written by Republican Robert Barr and Democrat John Podesta, reflects that the
importance of the public’s right to know is not a partisan issue; it is a fundamentally American issue.
Over the years, regardless of the political party in charge, our three organizations have challenged excessive
government secrecy and offered ideas to protect the public’s right to know. For example, in 1987, People for
the American Way, OMB Watch, the Benton Foundation, and the Advocacy Institute launched a public education campaign to draw attention to the ways in which government was withholding information from the
public. One element of that campaign was the publication by People for the American Way of Government
Secrecy: Decisions Without Democracy, a primer on secrecy that serves as the model for this publication.



Government Secrecy: Decisions Without Democracy

OMB Watch and National Security Archive followed Government Secrecy with a retreat at the Blue Mountain
Center in New York in the early 1990s that established principles for advancing the public right to know that
have guided the public interest community for more than a decade.
But today the foundation of democratic accountability is being steadily eroded. At the same time that
technology has given us new tools for linking government information in ways that could empower citizens,
policies and procedures at the federal, state, and local levels serve as barriers to fulfilling the promise. And
public confidence in the openness of the federal government is shrinking, as documented in a recent poll by
the Association of Newspaper Editors.
Our three organizations are part of OpenTheGovernment.org, a broad-based coalition that brings together
journalists, librarians, academics, individual citizens, advocacy groups, and professional associations committed to strengthening and protecting our right to know. This primer is just one step in engaging the public in
a campaign to make our government more transparent and accountable to the public. “We the people” must
exercise our rights to strengthen, if not preserve, democracy. We encourage you to get involved by visiting
the website (www.openthegovernment.org) to learn what you can do.
We want to thank David Banisar, the author of this publication, for his excellent work. Patrice McDermott,
the director of the OpenTheGovernment.org, and Emily Feldman, the policy associate, shepherded the
process from start to finish. They did a wonderful job. This project would have not started had not Conrad
Martin of the Fund for Constitutional Government suggested the idea. The Steering Committee for OpenTheGovernment.org provided invaluable assistance in establishing the themes of this book: the expansive
and myriad secrecy we confront; and the opportunities that a more digital government presents to us for
greater participation, openness, and accountability. Special thanks goes to Elliot Mincberg while he was with
People for the American Way, Steve Aftergood, Marge Baker, Mary Alice Baish, and Charles Davis who served
as a panel to provide the ongoing advice, guidance and review that led to this strong report.
Gary D. Bass
Executive Director, OMB Watch
and co-chair, OpenTheGovernment.org
Thomas S. Blanton
Executive Director, National Security Archive
and co-chair, OpenTheGovernment.org
Ralph G. Neas
President, People for the American Way
and partner, OpenTheGovernment.org
July 2007

Government Secrecy: Decisions Without Democracy



Preface
by Bob Barr and John Podesta

Twenty years ago, People for The American Way published the first “Government Secrecy” primer. At the
time, our founding principles of openness and accountability were being strained under the decades-long
Cold War with the Soviet Union. Presidents of both parties repeatedly invoked security to justify greater
secrecy, very often in ways that did not reflect legitimate security concerns but rather served what Arthur
Schlesinger, Jr. called in his preface “the Imperial Presidency.”
Today, we face a new security threat, but the Imperial Presidency is back. In the aftermath of the 9/11 terrorist attacks, the current administration has laid claim to a dramatic expansion of executive power, sometimes
with congressional approval, as with the PATRIOT Act, and sometimes through legally dubious assertions, as
with the National Security Agency’s domestic surveillance program.
At the same time, the administration has routinely withheld information that should be made public, thereby insulating itself from democratic accountability. As this primer documents, secrecy has been advanced
in a myriad of ways, including excessive classification, brazen assertions of “executive privilege” and “state
secrets,” new control markings to restrict “sensitive but unclassified” information, and new limits on Freedom
of Information Act requests.
The government should, of course, keep certain kinds of information secret. Our laws recognize the need to
protect national security information, such as intelligence sources and military plans, for example, as well
as personally identifiable data, such as information provided on tax returns. But the secrecy claims asserted
by the administration go far beyond what is contemplated by the law—and far beyond what is healthy for
democracy, which depends on an informed citizenry.
Citizens deprived of relevant information cannot participate in their government’s decisions or hold their
leaders accountable. Without this check, government officials are more likely to make decisions contrary
to the public interest, abuse their authority, and engage in corrupt activities. In words that ring prophetic
today, James Madison warned in 1822, “A popular Government, without popular information, or the means
of acquiring it, is but a Prologue to a Farce or a Tragedy; or, perhaps both.”
The administration’s embrace of secrecy comes frustratingly at a time of great opportunity for government
openness. The Internet and other new information technologies make it far easier and cheaper for government to disseminate information and interact with the public. Through government Websites, for example,
citizens can now access the Congressional Record, track environmental pollution in their neighborhoods,
and comment on regulatory proposals. Instead of building on this foundation, however, the executive
branch is retrenching—in a host of cases, government information previously available through the Internet
has been removed.
This primer by David Banisar on behalf of OpenTheGovernment.org and People for the American Way clearly
documents the expansion of secrecy and the dangers posed to democracy. In doing so, it provides ammunition to reclaim the open and balanced system of government set forth in our Constitution and Bill of Rights.
It is now up to all of us to make our voices heard. v

Government Secrecy: Decisions Without Democracy



Preface to the 1987 Edition
by Arthur Schlesinger, Jr.

Secrecy is the bane of democracy because it is the enemy of accountability. The framers of the American
Constitution designed a system of government intended to bring power and accountability into balance. The
secrecy system, as it has been nurtured by the executive branch over the last forty years and with special zeal
over the last seven years, is the indispensable ally and instrument of the Imperial Presidency.
Now no one can question the right of the state to keep certain things secret. Weapons technology and deployment, diplomatic negotiations, intelligence methods and sources, and military contingency plans are among
the areas where secrecy is entirely defensible. Secrecy is defensible too in certain domestic areas: personal data
given the government on the presumption it would be kept confidential—tax returns, personnel investigations and the like; and official decisions that, if prematurely disclosed, would lead to speculation in land or commodities, preemptive buying, higher governmental costs and private enrichment.
But the contemporary state has extended the secrecy system far beyond its legitimate bounds. In doing so, the
target is far less to prevent the disclosure of information to enemy governments than to prevent the disclosure
of information to the American Congress, press and people. For governments have discovered that secrecy is
a source of power and an efficient way of covering up the embarrassments, blunders, follies and crimes of the
ruling regime.
When governments claim that a broad secrecy mandate is essential to protect national security, they mostly
mean that it is essential to protect the political interests of the administration. The harm to national security
through breaches of secrecy is always exaggerated. The secrecy system has been breached since the beginning
of the republic—from the day in 1795 when Senator Mason of Virginia enraged President Washington by giving the secret text of Jay’s Treaty to the Philadelphia Aurora, or the day in 1844 when Senator Tappan of Ohio
enraged President Tyler by giving the secret text of the treaty annexing Texas to the New York Evening Post. No
one has ever demonstrated that such leaks, or the publication of the Pentagon Papers either, harmed national
security. No one can doubt that these disclosures benefited the democratic process.
The republic has survived great crises—the War of 1812, the Civil War, the First and Second World War— without erecting the suffocating structure of secrecy the Reagan administration proposes today. One wonders what
greater crisis justifies the extreme measures taken and contemplated by the Reagan administration since 1981.
The consequences for American democracy of the cult of secrecy may be dire. For the secrecy system not only
safeguards the executive branch from accountability for its incompetence and its venality. Worse, it emboldens
the state to undertake rash and mindless adventures, as the Iran-contra scandal sadly reminds us. “Though
secrecy in diplomacy is occasionally unavoidable,” wrote James Bryce, who was not only an acute student of
comparative government but also a distinguished diplomat, “it has its perils...Publicity may cause some losses,
but may avert some misfortunes.” Perhaps President Reagan will one day regret that the press had not exposed



Government Secrecy: Decisions Without Democracy

his secret intentions toward Iran in time to block his ill-considered policy, as President Kennedy regretted that
the New York Times had not played up its story on the exile invasion of Cuba. “If you had printed more about
the operation,” he told a Times editor, “you would have saved us from a colossal mistake.”
Because the secrecy system is controlled by those on whom it bestows prestige and protection, it has long
since overridden its legitimate objectives. The religion of secrecy has become an all-purpose means by which
the American Presidency seeks to dissemble its purposes, bury its mistakes, manipulate its citizens and maximize its power. This People For the American Way report by Steven L. Katz is a meticulous and dispassionate account of the growth and widening reach of the secrecy system and of the danger it poses to American democracy. It is not too late for Congress to bring the secrecy system under control and redress the balance between
presidential power and presidential accountability.
The issue is hardly new. “Executive secrecy,” John Taylor of Caroline, the philosopher of Jeffersonian democracy,
wrote in 1814, “is one of the monarchial customs, plausibly defended, and certainly fatal to republican government...How can national self government exist without a knowledge of national affairs? or how can legislatures
be wise or independent, who legislate in the dark upon the recommendation of one man?” v
December 1987, New York

Acknowledgements
The Steering Committee for OpenTheGovernment.
org provided invaluable assistance in establishing the
themes of this book: the expansive and myriad secrecy
we confront; and the opportunities that a more digital
government presents to us for greater participation, openness, and accountability. A smaller editorial committee
provided ongoing advice, guidance and review that led to
this strong report.
	
Recognition must also be given to the staff of OpenTheGovernment.org who shepherded the process and assisted
with the proof-reading and copy-editing.
OpenTheGovernment.org is most grateful for the generous
support of the Angelina Fund, CS Fund, Educational Foundation of America, HKH Foundation, Knight Foundation,
Open Society Institute, Philanthropic Venture Fund, and
Warsh-Mott Legacy, which made this publication possible.
We would like to acknowledge our partners in
OpenTheGovernment.org, many of whom have labored
in these fields for many years and all of whom continue
to work to push back secrecy and advance openness and
accountability in our government:
American Association of Law Libraries, American
Booksellers Foundation for Free Expression, American
Library Association, American Society of Newspaper
Editors, Association of American Publishers, Association For
Community Networking, Association of Research Libraries,
Bill of Rights Defense Committee, Californians Aware,
Center for American Progress, Center for Democracy and
Technology, Center for National Security Studies, Center

for Progressive Reform, The Center for Public Integrity,
Common Cause, Electronic Frontier Foundation, Electronic
Privacy Information Center, EnviroJustice, Environmental
Defense, Essential Information, Federation of American
Scientists, First Amendment Foundation, Florida First
Amendment Foundation, Free Expression Policy Project,
Friends Committee on National Legislation, Fund for
Constitutional Government, Good Jobs First, Government
Accountability Project, Humanist Society of New Mexico,
Human Rights First, Illinois Community Technology
Coalition, Indiana Coalition for Open Government, Institute
for Defense and Disarmament Studies, James Madison
Project, League of Women Voters, Liberty Coalition,
Mine Safety and Health News, Minnesota Coalition on
Government Information, National Coalition Against
Censorship, National Coalition for History, National
Committee Against Repressive Legislation, National
Freedom of Information Coalition, National Security Archive,
National Security Whistleblowers Coalition, New Jersey
Work Environment Council, Northern California Association
of Law Libraries, NPOTechs, OMB Watch, PEN American
Center, People For the American Way, Political Research
Associates, Positive Financial Advisors, Inc, Project On
Government Oversight, Public Employees for Environmental
Responsibility, ReadtheBill.org, ReclaimDemocracy.org,
Reporters Committee for Freedom of the Press, Society of
American Archivists, Society of Professional Journalists,
Southeastern American Association of Law Libraries,
Special Libraries Association, Sunlight Foundation,
Taxpayers for Common Sense, Transactional Records
Access Clearinghouse, U.S. Public Interest Research Group,
Washington Coalition for Open Government, Working
Group on Community Right-to-Know.

Government Secrecy: Decisions Without Democracy



Executive Summary
Openness is an American value. It promotes democracy and good government. It reduces corruption and
ensures that rights are respected and protected. In the past six years, the basic principle of openness as the
underpinning of democracy has been serious undermined. The Administration has taken an extreme view of
the power of the presidency. In its view, its powers to operate are largely unchecked by the Congress, courts,
states or the public.
Existing laws on openness have been undermined while secrecy is increased. The Administration has issued
executive orders placing limits on the Freedom of Information Act and Presidential Records Act, expanded
the power to classify information for national security reasons, and created a whole range of new categories
of “sensitive” information. Classification of information has nearly doubled while efforts toward declassification have largely been stopped and many records were secretly reclassified. Thousands of records have
disappeared off of public web sites. The State Secrets privilege has been regularly invoked in shutting down
court challenges.
Congress and the public have been misled about important issues. Government decision-making leading up
to and following the invasion of Iraq has been rife with misinformation and secrecy. Key evidence relating to
the presence of chemical and biological weapons was misrepresented and key information withheld from
Congress and the public. Once the initial invasion was over, information about contracts activities and costs
that shows millions of dollars have been lost in fraud and mismanagement has been systematically hidden.
Records relating to abuses in prisons were classified. The photos of the caskets of dead soldiers, bringing
home the severity of the war, were prohibited from being released.
The public health has been threatened. In 2006, the Environmental Protection Agency approved changes
limiting the collection of information about how much chemical waste they released into the environment.
In 2004, the National Highway Traffic Safety Administration restricted the amount of information on the
safety of automobiles that would be released to the public.
Dozens of whistleblowers who have revealed information about misconduct in federal agencies have been
fired, lost their security clearances or been transferred to lesser jobs. Scientists have faced new restrictions
on their ability to speak to the press about scientific issues. Employees at NASA were censored from speaking about global warming. The EPA decreed that whistleblower protections under environmental laws no
longer applied to workers. Journalists have also been investigated and jailed for refusing to identify the
sources of their information.
At the same time, advances in digital technology have increased the amount of information and the speed
at which it is available. Federal laws, regulations and structures are available online. Information that was



Government Secrecy: Decisions Without Democracy

once difficult to obtain is now available at the click of a button.
The new digital technologies also offer unprecedented opportunities for organizations and citizens to
obtain and use information to monitor the government and affect government policy. E-government allows
for easier access to services and some governance such as rulemaking.
However, digital information is not a panacea. Problems continue with technology distribution and education to ensure that all persons have equal access to government information. Information can also disappear
in the blink of an eye. Thousands of pages were abruptly removed from federal web sites following 9/11.
Long term strategies for collecting, archiving and maintaining information are not yet fully developed.
It is now time for Congress to take charge. Oversight is needed to ensure that laws are enforced. Many need
revisions to replace the policies that have been put in place in the last six years with more openness. Others
need to be updated to recognize changes in law, society and technology in the past decade. v

Government Secrecy: Decisions Without Democracy



1
Openness: an American Value
Liberty cannot be preserved without a general knowledge among the people, who have a right,
from the frame of their nature, to knowledge…and a desire to know; but besides this, they have
a right, an indisputable, unalienable, indefeasible, divine right to that most dreaded and envied
kind of knowledge, I mean, of the characters and conduct of their rulers.1
	
–JOHN ADAMS, 1765
The liberties of a people never were, nor ever will be, secure, when the transactions of their rulers
may be concealed from them. 2
	
–PATRICK HENRY, 1788
A popular Government, without popular information, or the means of acquiring it, is but a Prologue to a Farce or a Tragedy; or, perhaps both. Knowledge will forever govern ignorance: And a
people who mean to be their own Governors, must arm themselves with the power which knowledge gives.3
	
–JAMES MADISON, 1822

American democracy is based, in the words of
Thomas Jefferson, on government “deriving their
just powers from the consent of the governed.” It
has been long recognized that openness is essential
to ensuring that government is working on behalf
of its citizens. Individuals have the right to know,
either directly from officials, or through organizations, the media or their elected representatives,
how government is operating to ensure it is on their
behalf. The information held by the government is
owned by the American people and only held in
trust for them by the government and its officials.
Openness has many benefits for both citizens
and governments. It promotes trust and efficient
government, it reduces mismanagement and corruption, and it promotes rights, fairness and the
rule of the law.

The Benefits of Openness
Openness limits misinformation and promotes
awareness and trust in government. Government
officials are less able to mislead the public for political reasons if the system is open and information
is widely available. As noted by President Nixon in
1972, “Fundamental to our way of life is the belief
that when information which properly belongs to
the public is systematically withheld by those in
power, the people soon become ignorant of their
own affairs, distrustful of those who manage them,
and---eventually---incapable of determining their
own destinies.”4 Public awareness of the information
and reasons behind decisions can improve support
and reduce misunderstandings and dissatisfaction.
The public can also better participate in the process
when they have information about the activities of

10

Government Secrecy: Decisions Without Democracy

the government. Confidence in the government is
also improved if it is known that the decisions will
be predictable.
Openness fights corruption and mismanagement. As the future President Woodrow Wilson said
in 1913, “Everybody knows that corruption thrives
in secret places, and avoids public places, and we
believe it a fair presumption that secrecy means
impropriety. So, our honest politicians and our
honorable corporation heads owe it to their reputations to bring their activities out into the open.”5
Billions of dollars are spent every year by the federal
government. Openness in public spending makes it
possible for representatives and citizens to monitor their government actions and publicize poor
spending. The public controversy over “The Bridge
to Nowhere” and other earmarks show that public
rebuke is often more powerful than the Congressional appropriations process. Billions misspent and
wasted in Iraq and in the cleanup of Katrina have
been revealed; armed with this knowledge, citizens
can demand meaningful reforms from their government. Billions have been recovered by whistleblowers in the past ten years.
Openness prevents abuses. As Justice Louis
Brandeis said, “Sunlight is said to be the best of
disinfectants; electric light the most efficient

policeman.”6 Government officials are less likely to
abuse their power if they believe the abuse wil be
exposed. At a minimum, officials will stop abuses,
once they become public. The revelations of abuses
of detainees in Iraq and of domestic surveillance in
the U.S. show that the spotlight of public scrutiny
can force changes when internal administrative
processes and Congressional oversight fail.
Openness promotes government efficiency.
Openness allows government agencies to better
share information and learn lessons. Sharing reduces redundant efforts and allows better analysis. Overspending and double spending can be
reduced. The 9/11 Commission found that the lack
of sharing among government agencies was one of
the reasons the plot was able to succeed.
Openness helps individuals protect themselves.
An open system of law allows individuals to know
their rights and responsibilities. Each year, millions
of veterans access their records held by the federal
government to help determine their disabilities.
Local citizens and municipalities can better protect
themselves from chemical hazards. Openness could
have helped the dozens who have died in the aftermath of 9/11 due to respiratory problems around
the site of the World Trade Center.

Government Secrecy: Decisions Without Democracy

Openness promotes scientific innovation and
development. Information sharing between scientists and others allows for greater innovation. Many
of the most significant technical developments in
the past thirty years, including the Internet, have
come out of open scientific research sponsored
by the government. These developments have
substantially benefited the U.S. economically. Today,
many areas of new scientific development such
as genetics are based on government- sponsored
projects. Information sharing can also be a benefit
in protecting the national defense, as sharing can
lead to faster breakthroughs in areas such as cures
or developments of immunizations for the flu virus
and other biological threats.
Openness can be used as an alternative to regulations. Over half of the release of toxic materials
– millions of tons of pollutants – have been reduced
due to public availability of information on pollutants.7 Consumers are better able to make decisions
on products when information, such as safety and
reliability, are made available.
Openness improves the stability of markets. Millions of investors use the public filings of companies
to evaluate their financial worthiness. Money can
then be invested in well-managed companies with
innovative ideas rather than only those with the
best public relations and slickest brochures. The
markets can also act more fairly. Better general access to financial information makes secret deals and
monopolies more difficult.

The History of Openness .
in the U.S. 
As the initial statements show, many of the founding fathers recognized the power of information
in promoting democracy. Along with a free press,
government openness was seen as a necessity to
promote trust.
Our system of government was not totally open
originally and in many areas, such as foreign relations, there was great secrecy imposed by the executive branch. But there are many early examples
of the openness of activities on the federal level.
In 1813, Congress initiated the beginnings of the
Federal Depository Library Program by requiring
copies of its Journals to be sent to university and
state libraries. As far back as 1816, the salaries of the
employees in federal agencies were being published. Congress too opened its proceedings almost

11

from the beginning and published them. In 1860,
it created the Government Printing Office, which
opened the day of Abraham Lincoln’s inauguration.
From the beginning, the judicial system was based
on the English principle that an open court would
ensure fairness and limit abuses.
The states have been at the forefront of providing
information to citizens about their activities. Most
states have provided information about local and
police activities for over a century. In Wisconsin, the
legislature in 1849 adopted a law on the openness
of country records and meetings.8 In Louisiana, the
1940 Public Records Act set up the first comprehensive system for the archiving and access to public
records. Today, the states are still at the forefront as
“laboratories of democracy,” with many still trying
innovative new ideas to promote openness later
adopted by the federal government.
The development of the federal administrative state
in the early 20th century led to a great concern
about the transparency and accountability of the
newly-created powerful federal administrative
agencies. Within a short period of time, many large
agencies were created and issued thousands of
pages of orders and regulations with little organization. Even individuals working at the highest levels
of government found it difficult or impossible to
keep track of all of them. And for the regulated
public, this new body of “executive legislation” was
inaccessible and virtually hidden. 9
In 1935, a case10 that went to the Supreme Court
revealed that the section of a rule under which a
company was being prosecuted was omitted from
the publication of the regulation. Soon thereafter,
the Congress enacted a law ordering the creation of
the Federal Register to publish all regulations in a
systematic way.11
In 1946, the Administrative Procedures Act (APA),
which was intended to regulate the activities of the
agencies, was adopted. The law provided for a limited to right of access for those who were affected
by agencies’ decisions. A permissive provision in the
law encouraged agencies to make more information
about their activities available. Most, however, took
a restrictive view and did not disclose information.
Starting in 1950s, Congress, led by Congressman
John Moss (D-CA), began investigating the right
of access and found that agencies did not make
much information available. A campaign led by
media organizations resulted finally in the 1966

12

Government Secrecy: Decisions Without Democracy

Freedom of Information Act (FOIA). For the past
40 years, this Act, subsequently amended several
times to enhance openness and supplemented with
other laws, has stood as the pinnacle of openness
for the public.
It has been supplemented by laws such as: the Government in the Sunshine Act to ensure that meetings of federal agencies headed by a collegial body,
such as the Federal Communications Commission,
are open to the public and minutes or transcripts
are kept of the meetings; the Federal Advisory
Committee Act which ensures that committees that
advise the federal government are composed fairly
and hold open meetings; and the Privacy Act, which

allows individuals to obtain and correct their personal information in records held by federal bodies.
As new technologies have made the provision
more easily available and increased demand by
citizens to know more, the trend toward more
openness has continued. In 1993, Congress enacted a law to require that the Federal Register be
published in electronic form. In 1996, the Congress
adopted the Electronic Freedom of Information
Act to extend the FOIA to electronic records and to
provide for more use of electronic resources. More
recently, efforts to improve electronic government
have increased both access to information and
increased participation. v

13

Government Secrecy: Decisions Without Democracy

2
The Darkening Cloud
Behind closed doors, there is no guarantee that the most basic of individual freedoms will be preserved. And as we enter the 21st Century, the great fear we have for our democracy is the enveloping culture of government secrecy and the corresponding distrust of government that follows.12
	

–FORMER SENATOR DANIEL PATRICK MOYNIHAN 2000

In the past six years, the basic principle of openness as the underpinning of democracy has been
seriously undermined and distrust of government is
on the rise.
The Administration has taken an extreme view of
the power of the presidency. In its view, its powers
to operate are largely unchecked by the Congress,
courts, states, or the public. The number of secrets generated has substantially increased, while
release of information has declined. New categories
of semi-secret “sensitive” information proliferate
while laws on access to information are undermined or ignored. Whistleblowers and journalists
are threatened with jail while billions of dollars are
squandered on secret contracts or incompetence.
Scientists are gagged while propaganda and misinformation are released from the highest offices.

It’s a Secret: Classified and 
Semi-classified Information

of the year, nearly 40,000 items (such as documents, files, or videos) – 15 million in 2004 and
14.2 million in 2005 – are classified by government
officials and private contractors. This number has
been increasing for the last ten years – up from 3.5
million in 1995; it has substantially increased in the
last six years.

For every Tax Dollar Spent Declassifying
Old Secrets, The Government Spends
$134 Creating and Securing Old Secrets
$150

$134.09

$100

$50

Classified information

2005

2004

2003

2002

2001

2000

1999

1998

$0
1997

The system of protecting information for national
security reasons is out of control. Information is
classified at an astounding rate. On an average day

14

Government Secrecy: Decisions Without Democracy

Problems with the classification system have been
long recognized. In 1994, Congress approved the
creation of the Commission on Protecting and
Reducing Government Secrecy, chaired by Senator
Daniel Patrick Moynihan. The Commission issued a
detailed report in 1997 that found that the system
for classified information was severely broken:
The result today is a system which neither protects
nor releases national security information particularly well. Substantial concerns exist with respect
to both the ability of the classification system to
protect secrets effectively and the adequacy of the
procedures in place to make information available
to those outside the Government.13
The biggest problem is the prevalence of mis-classification and over-classification. It is estimated that
between 10 percent and 90 percent of all documents are over-classified. Lee Hamilton, the ViceChair of the 9/11 Commission said that 70 percent
of the classified information that he saw during the
Inquiry was “needlessly classified.” Reviews by the
Government Accountability Office have found numerous problems with the classification levels and
markings employed in agencies.14
Even government officials admit there are serious
problems. Carol Haave, the Deputy Under-Secretary
of Defense, testified in a Congressional hearing in
2004 that she believed that 50 percent of information was over-classified. At the same hearing, William Leonard, Director of the Information Security
Oversight Office thought it was even higher. He
noted that over-classification was “disturbingly
increasing, where information is being classified
that is clear, blatant violation of the order.”15 Former
Central Intelligence Agency (CIA) Director (now Secretary of Defense) Robert Gates testified to the 9/11
Commission “We overclassify very badly.”16

The U.S. Executive Order on Classification
The rules for classification of information for
national security reasons are set by the U.S. Executive Order 12958 on Classified National Security
Information originally issued by President Clinton in
1995 and amended by President Bush in 2003.17 The
Order sets out procedures on the classification of
information including who can classify, under what
standards they can do so, for how long information can be classified, and a process for its eventual
declassification and release. There are a limited
number of people who are authorized to create

classified information (around 4,000 total) and they
must mark each time why it is classified and for how
long it needs to be protected.
There are eight categories of information that are
eligible for classification:
(a) military plans, weapons systems, or operations;
(b) foreign government information;
(c) intelligence activities (including special activities),
intelligence sources or methods, or cryptology;
(d) foreign relations or foreign activities of the
United States, including confidential sources;
(e) scientific, technological, or economic matters
relating to the national security, which includes
defense against transnational terrorism;
(f ) United States Government programs for safeguarding nuclear materials or facilities;
(g) vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans, or protection
services relating to the national security, which
includes defense against transnational terrorism; or
(h) weapons of mass destruction.
Depending on the sensitivity of the information,
there are three levels of classification:
•		Top Secret - where unauthorized disclosure could
be reasonably expected to cause exceptionally
grave damage to the national security.
•		Secret - where disclosure could be expected to
cause serious damage to the national security.
•		Confidential - disclosure could be expected to
cause damage to the national security.
The E.O. prohibits the classification of information to “conceal violations of law, inefficiency, or
administrative error, prevent embarrassment to a
person, organization or agency, retain competition, or prevent or delay the release of information
that does not require protection in the interest
of national security information.” It also prohibits
the classification of basic scientific information
not clearly related to national security. In practice,
however, these prohibitions have often been unsuccessful, with information such as the report on the
abuses from the Abu Ghraib prison being classified
to prevent its release.18
The default period for information to be classified is
ten years unless the person who issues the classification can identify an earlier date or event that
would cause it to be available sooner, or makes a
specific determination that it is sensitive to a later
date. Since the adoption of the Clinton order, ap-

Government Secrecy: Decisions Without Democracy

Changes to the Order by President Bush
The 2003 Bush Amendment (E.O. 13292) left the
structure of the Clinton order mostly intact but
significantly changed the presumptions about
classification. It removed the requirement that, if
there were a significant doubt about classification,
it should not be classified. Expert Harry Hammit
describes it as a “when in doubt, classify” standard.
Other changes include:
•		Set presumption that information in categories
“shall” be considered for classification rather than
“may” be classified.
•		Expanded categories to include Information infrastructure, WMD, and terrorism.
•		Allowed for easier reclassification of information.
•		Removed presumption of 10 years for classification if no date can be determined.
•		Eliminated requirement that each agency make
plans for declassification.
•		Extended the deadline for automatic declassification to December 2006.
•		Allowed the CIA Director, unless overruled by
President, to block decisions by the Interagency
Security Classification Appeals Panel (ISCAP) to
declassify information.
•		Expanded protection of information provided by
foreign governments.

Declassification

The result of the order was the massive systematic
review by agencies of their records. Between 1995
and 2001, one billion pages were reviewed and declassified, 200 million pages in 1997 alone. Since the
beginning of the Bush Administration, that effort
significantly declined, dropping below 30 million
pages in 2004 and 2005.
Limited efforts have also occurred to declassify
information in special areas where there was a compelling interest. Congress enacted two specialized
laws on the access to files relating to the assassination of President John F Kennedy (following the
movie JFK),19 and to Nazi and Japanese war crimes20
held by government agencies, including the intelligence services. Both Acts created review boards
to collect and examine documents and decide on
their release. Over four million pages were released,
including thousands of previously classified records
under the JFK Act.21 Over eight million documents
have been released under the war crimes laws.
However, the Administration has also often used selective declassification for political means. President
Bush secretly declassified sections of a National
Intelligence Estimate that supported its claims of
weapons of mass destruction in Iraq. These were
leaked to reporters by the Office of the Vice-President.22 The Attorney General went before the 9/11
Commission with what Senator Leahy called a
conveniently declassified memo to attack a Commissioner. In 2004, Secretary of State Rice quoted
from a selectively declassified 2001 memo prepared
for the National Security Council by then-counter-

Official Classification Down Slightly as More Documents are Released
15
12
9
6
3
0

New classified documents (in millions)

Number of pages declassified

1980
1981
1982
1983
1984
1985
1986
1987
1988
1989
1990
1991
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005

Newly Classified Documents
(in millions)

The other, equally important, side of protecting
classified information is ensuring that it is declassified and released once it is no longer sensitive.
The Clinton Executive Order required, and the Bush
order retained the requirement, that all information 25 years and older that has permanent histori-

cal value be automatically declassified, starting in
December 2006 (originally set for 2000), unless it
is specifically exempted and is subject to outside
review. The Order created a new standard by placing the burden on the government agency to justify
why the information should not be declassified,
rather than why it should be.

Source: Information Security Oversight Office Compiled by OpenTheGovernment.org & National Security Archive

250
200
150
100
50
0

Pages Declassified (in millions)

proximately fifty percent of all information is set for
declassification in 10 years or less.

15

16

Government Secrecy: Decisions Without Democracy

terrorism czar Richard Clarke.23 It has also used it to
stymie Congressional oversight of the Foreign Intelligence Surveillance Act and anti-terrorism policy.
A bill was introduced in the 109th Congress which
would require notification to the Intelligence Committees when information was declassified.24 In the
110th Congress, the House Intelligence Committee
has already announced plans to investigate the
practice of selective declassification.25

Now you see it, now you don’t: .
Secret Reclassifications
As noted above, the Bush amendments to the
Clinton Executive Order make it easier to reclassify
information. Under the Clinton Order, information
could not be reclassified if it had been declassified
and released to the public. Now, information can
be reclassified if the head of the agency determines
that it is in the interest of national security, “the
information may be reasonably recovered” and the
Director of the Information Security Oversight Office (ISOO) is notified.
In 2006, it was discovered that over fifty-five thousand pages of records were secretly reclassified at
the National Archives and the Presidential libraries
under an agreement with the CIA and other agencies.26 Many were documents that had never been
classified in the first place or were already published
by the State Department. Some were over 60 years
old, such as the Korean War era assessments by the
CIA that China was not likely to intervene in Korea
two weeks before China entered the war. An ISOO
audit of the files found that over one third were
not even eligible for classification. It also found a
“significant number of instances when records that
were clearly inappropriate for continued classification were withdrawn from public access.”27 The U.S.
Archivist apologized for the secret agreements, stating “There can never be a classified aspect to our
mission. Classified agreements are the antithesis of
our reason for being.”28
The Administration is not the only party at fault
in promoting excessive secrecy. In 1998, Congress
ordered that the Department of Energy withdraw
from public availability all of its recently declassified
documents that might be related to the design of
nuclear weapons, to ensure that improper declassification did not take place.29 In all, the Department
withheld and reviewed over 200 million pages.
Only 6,640 pages containing classified information

were found, mostly long-public material about the
previous locations of weapons that are no longer
sensitive. Many documents that were previously
public were withheld, such as a 1971 Congressional
briefing by Secretary of Defense Melvin Laird on
Theatre Nuclear Forces and Strategic Forces, the
numbers of weapons and bombers in the 1960s
and 1970s, and agreements with the Canadian government from the 1960s.30 The review has cost $22
million and delayed efforts by the DOE to continue
its declassification effort.

Watching the Watchers: oversight of the
classification system

The Information Security Oversight Office (ISOO)
An intelligent system of classification needs independent oversight to ensure that it is working.
Under the Executive Order, the Information Security
Oversight Office, a division of the National Archives,
has general responsibility relating to the development and oversight of protections on classification and declassification of information. Its duties
include:
•		Implementing Directives, Instruction and
Regulations
•		Liaison, Inspections and General Oversight
•		Statistical Collection, Analysis and Reporting
•		Recommending Policy Changes
Each year, the ISOO collects statistics on the classification and declassification of information the
previous year and presents a public document on
the amount of classification and its estimated costs.
The ISOO’s powers are limited, however. It audits
and makes recommendations on agencies classification practices; the agencies, however, are not
required to follow its guidelines and recommendations. This is why Senator Moynihan's Commission
on Protecting and Reducing Government Secrecy
recommended the creation of a National Declassification Center.

Missing in Action: The Public Interest
Declassification Board
In 2000, Congress approved the creation of the
Public Interest Declassification Board.31 The board
functions are to:

Government Secrecy: Decisions Without Democracy

•		Advise the President and other executive branch
officials on classification and declassification
process;
•		Promote public access to a thorough, accurate,
and reliable documentary record of significant
U.S. national security decisions and significant
U.S. national security activities;
•		Provide recommendations to the President on
declassification of information of extraordinary
public interest; and
•		Review and make recommendations to the
President with respect to any Congressional
request on declassification of information.
The board was the only recommendation of the
Commission on Protecting and Reducing Government Secrecy that was adopted. To date, it has not
been of much use. The board remained in a legal
vacuum for over five years while the White House
delayed appointing members and providing funding for it. It was not until 2005 that the President
appointed members and it began to hold meetings.
Now that it is finally in place, the Board has already
taken a very limited view of its own powers. In September 2006, members of the Senate Intelligence
Committee asked the Board to review two committee reports on Iraq intelligence that had been classified by the Administration. The Chairman, L. Britt
Snider, a former CIA Inspector General, responded
that it could not review the classified documents

17

unless it was asked to do so by the President. It
recently announced that it plans to move ahead
unless it hears from the President.

Go Away: The State Secrets Privilege
Another justification invoked by the government
to deny access to information is the claim that the
information is privileged as involving state secrets.
The privilege was first recognized by the Supreme
Court in a 1953 case where the widows and families
of several civilians killed in the crash of an Air Force
airplane conducting experiments sued under the
Federal Torts Claims Act.32
The sources of the privilege are nebulous. It has
been attributed to pre-constitutional powers, separation of powers, executive privilege and others.33 Its
scope is not well defined. In many cases, it allows the
government to prevent courts from even evaluating
the information before ruling on the merits. Some
courts treat it as absolute and dismiss cases as soon
as the privilege is invoked; others have rejected that
view and demanded access to the records to ensure
that they are actually state secrets.34
Over the years, the government has used this privilege controversially in many cases to shut down
lawsuits against it and prevent having to defend
against them. A recent review of the cases in the Po-

18

Government Secrecy: Decisions Without Democracy

litical Science Quarterly notes “At present, it is costless for the president to assert a secrecy privilege:
the overwhelming odds are that the assertion will
be successful, and even if unsuccessful, the process
of overturning claims of privilege is lengthy and the
only potential cost of excessive claims of national
security is in bad publicity.“35 Tom Blanton, Director
of the National Security Archive, is more direct in his
criticism: “State secrets privilege continues as a kind
of the neutron bomb of whistleblower litigation. It
leaves no plaintiff standing.”
In the past six years, the privilege has been invoked
over 20 times by the federal government to end
court cases. These include:
		RENDITIONS. Khaled El-Masri, a German citizen
who was taken by the CIA in Macedonia and sent
to Afghanistan where he was tortured for six
months. El-Masri sued the CIA for an apology. The
case was dismissed after the court ruled that the
state secrets privilege was absolute. It was also
successfully invoked in the case of Maher Arar,
a Canadian on his way through New York back
to Canada, who was sent to Syria where he was
tortured. His case was also dismissed.
		ILLEGAL SURVEILLANCE. In separate cases
brought by the American Civil Liberties Union
(ACLU), Electronic Frontier Foundation and the
Center for Constitutional Rights on the warrantless surveillance by the National Security Agency,
the government has invoked the state secrets
privilege to demand that all of the cases be dismissed. In at least one case, the court has rejected
the privilege.
		WHISTLEBLOWERS. The privilege has been used
to prevent former FBI translator Sibel Edmonds
from challenging in court her dismissal from the
FBI after revealing numerous problems with the
translation division. The FBI’s Inspector General
found that she was improperly terminated and
that her allegations were never properly investigated. She was also prevented from testifying in a
civil suit brought by the families of victims of 9/11.

Keep away: It’s Sensitive .
(but not classified)!
The growth in secrecy has not been limited just
to classified information. In the past six years,
there has been substantial growth in categories of
information designated as “sensitive” and therefore

restricted. Some of these categories have statutory
authorization but, for the most part, these designations are made internally by each agency and have
no legal authority.
While categories designating information sensitive
have existed for at least thirty years in some form
or another, their use appears to have dramatically
expanded since March 2002 when White House
Chief of Staff Andrew Card issued a memorandum
to all agencies requiring review of their information with an eye to protect “information that could
be misused to harm the security of our nation and
the safety of our people,” and urged the agencies to
view FOIA exemptions broadly.36 It is estimated that
there are now more than 100 different designations
for categories of sensitive information.
Some of the recent uses of sensitive information
include:
•		The prosecution of a Miami-based Transportation
Security Administration (TSA) employee caught
stealing baggage was dropped and local police
officials are not allowed from publicly reporting
on incidents in airports without permission of
the TSA. 37
•		The DC government was not allowed to see
information on trains that are allowed to travel
through the District carrying hazardous cargoes.
•		The Nuclear Regulatory Commission (NRC)
attempted to suppress a report by the National
Academy of Sciences that it did not agree with.
•		Federal Energy Regulatory Commission (FERC)
refused to share information about the safety
of a proposed Liquid Natural Gas plan with the
Connecticut Attorney General because it was
Sensitive Energy Information.38
•		Department of Homeland Security (DHS)
cited it when it refused to name the new DHS
ombudsman.39
•		The TSA withheld information about information
circulars that had been published in the 9/11
Commission report as sensitive, only releasing
them after it was directly pointed that it was
published in the 9/11 Commission report.
Currently, there are no government-wide procedures on how sensitive information is to be designated, who can impose it, how it is to be reviewed
for release or its withholding appealed. A report
sponsored by the Department of Defense noted
in 2004 that the “status of sensitive information
outside of the present classification system is
murkier than ever ... Sensitive but unclassified data

Government Secrecy: Decisions Without Democracy

is increasingly defined by the eye of the beholder.
Lacking in definition, it is correspondingly lacking
in policies and procedures for protecting (or not
protecting) it, and regarding how and by whom
it is generated and used."40 Representative Henry
Waxman describes “sensitive” as, “a code word for
embarrassing to senior officials”.
The lack of standards results in overuse of the
designations and greater restrictions on information both for internal use and for public availability.
A 2006 Government Accountability Office review
found over fifty different categories of information designated as sensitive, ranging from Sensitive Homeland Security Information, Sensitive but
Unclassified, Law Enforcement Sensitive, to For
Official Use Only.41 The GAO found that, in different agencies, similar information was often being
designated for control using different labels and
procedures. It also found that few agencies provided adequate guidance, training or internal controls.
The GAO concluded that “the lack of such recommended internal controls increases the risk that the
designations will be misapplied. This could result
in either unnecessarily restricting materials that
could be shared or inadvertently releasing materials
that should be restricted.” Within departments such
as Justice, the GAO found numerous procedural
problems due to lack of formal policies, inadequate
training, and poor oversight. In the FBI, any employee or contractor could designate information as
sensitive even though the FBI had no guide and did
not provide adequate training.42
A 2006 review by the National Security Archive of
37 major agencies and components found little
consistency across government agencies.43 Only
eight of the agencies had legal authority to designate information as sensitive, while 24 were only
following their own internal guidelines. Eleven had
no policy at all. Nearly one-third of the policies
allowed any employee to designate information as
sensitive, but they did not set policies on how the
markings could be removed, and only seven total
set restrictions on how they can be designated. The
review also found that policies set after 9/11 were
“vague, open-ended or broadly applicable” compared with those before.
Even though the designations often have no official
standing, agencies are more restrictive in many cases with such information when it is requested under
FOIA.44 The National Security Archive found that
at least half of the agencies subject the information to greater review and more restrictions when

19

requested under FOIA; only two made any attempts
at ensuring that the restrictions were balanced with
the public’s right to know.45
The designation is also being used to create de
facto secret laws. The 2002 Homeland Security Act
allows the Department of Homeland Security to
designate dozens of categories of information as
sensitive. This includes DHS regulations that authorize requiring showing ID to get on a plane and
who can be searched. Republican Congresswoman
Helen Chenoweth-Hage was refused access onto
a plane after she demanded unsuccessfully to be
shown the legal authorization for being searched.
When asked why the regulations were not shown,
a TSA spokesman said “Because we don’t have
to ... That is called ‘sensitive security information.’
She’s not allowed to see it, nor is anyone else.”46
In another case involving the no-fly list, a District
Court found that the TSA used “frivolous claims
of exemption” in designating the security policies
as sensitive.47
In December 2005, the White House issued a
memorandum ordering government-wide standardization of “procedures and standards for
designating, marking, and handling SBU information.”48 Agencies were required to conduct reviews
of their procedures for sensitive information and
report to the Director of National Intelligence. An
inter-agency working group led by the DNI was due
to issue guidance by the end of 2006, but there are
reports that it has been delayed due to controversy
among agencies on which headings should be
kept. A report in June 2006 from the DHS and DOJ
was reported to be rejected by the White House
because it “lacked substance”.49
Congress has shown some recognition that sensitive information needs to be limited. In 2002,
Congress required the President to come up
with a government-wide definition of homeland
security information.50 The standards were never
issued and might have been pre-empted by the
December 2005 memorandum. In 2005 and 2006,
a number of House and Senate Committees held
hearings on Sensitive Security Information (SSI) and
“Pseudo-classification.” In 2006, Congress approved
an amendment to the Department of Homeland
Security Appropriations Act requiring that the DHS
amend its regulations to review SSI information
when requested under FOIA, declassify SSI for most
information that is over three years old unless the
DHS secretary “identifies a rational reason why the
information must remain SSI,” and allow access to

20

Government Secrecy: Decisions Without Democracy

SSI by parties to lawsuits who need to access for the
lawsuit, subject to restrictions on further disclosure.51 These changes were not expected to make
a substantive improvement to the overall problem,
though, because of the limitation of the strictures
to the DHS.

Propaganda and Dis-information
The dissemination of truthful information is essential
to allow for an informed electorate and Congress.
This has also been systematically disregarded in the
past six years. The Administration has selectively released information, actively deceived Congress and
the public, secretly hired journalists and released
“news” videos and other similar activities.
Following 9/11, the White House instructed the EPA
to tell the public that the air around Ground Zero
was “safe,” even though the EPA had not conducted
full testing. The EPA’s Office of the Inspector General
issued a critical report in 2003, finding that the
White House had “convinced EPA to add reassuring statements and delete cautionary ones.”52 The
Mount Sinai Medical Center found that 70 percent
of ground zero responders had some form of respiratory problem.53 At least 75 police and firefighters
have been found to have developed cancer and
several have died.54
The administration has also engaged in active deception of Congress. When Congress was debating
the cost of the changes to Medicare bill in 2004, it
was told by the Administration that the total was
going to be $395 billion. However, the Chief Actuary of Health and Human Services (HHS) was aware
that the actual cost was over $720 billion and was
told not to inform Congress of the actual cost. The
White House claimed that it has a constitutional
power to withhold information.55
Under federal law, spending money for “publicity
or propaganda purposes” is prohibited.56 However,
there has been a series of incidents where the
government has been paying for news articles
or influencing journalists. In 2002, the Pentagon
proposed the creation of an Office of Strategic
Influence to influence media outlets to favor the
United States. It was widely reported that the office
would engage in misinformation and planting of
stories in foreign media and on the Internet. The
proposal was quickly killed off by the Pentagon
following public outcry. However, in 2005, the
LA Times revealed that U.S. military was secretly
paying to have stories planted in the Iraqi press.57

The Education Department secretly paid conservative commentator Armstrong Williams $240,000
to promote the No Child Left Behind Act. The HHS
produced videos that were intended to look like
news stories promoting changes to Medicare which
were unknowingly run on 40 television stations. The
Governmental Accountability Office found that this
was “covert propaganda” prohibited by law.

Closing Doors
The Freedom from Information Act: .
Limiting the FOIA
The Freedom of Information Act (FOIA) is one of the
most important pieces of legislation in ensuring that
information is available to the public.58 It has two
principal functions. First, it requires that government
agencies publish information about their activities.
Second, it gives a legal right to any person to request
information from federal government agencies. The
FOIA sets a presumption that all persons have a right
to know information about what the federal government is doing and the government has a legal obligation to tell them, subject to a few limited exemptions.
Over 4 million requests were made in 2005 under the
FOIA and the vast majority (over 90 percent, mostly
personal files) were responded to in full.
The FOIA was signed by President Lyndon Baines
Johnson on July 4, 1966 and went into effect in
June 1967 after a fifteen year campaign by media
and members of Congress to reduce secrecy in federal agencies. Prior to the FOIA coming into effect,
agencies used a variety of different excuses, including an obscure 1798 “Housekeeping Statute” and a
misreading of the Administrative Procedures Act, to
deny access to information. The FOIA was substantially amended in 1974 over the veto of President
Ford, in 1986, and in 1996 with the Electronic FOIA
(E-FOIA) amendments.
The FOIA only applies to agencies of the executive
branch of the federal government such as the Department of Homeland Security, the Environmental
Protection Agency, the Department of Defense and
the Department of Health and Human Services. It
does not apply to the Congress, the federal courts,
offices directly under the President such as the
National Security Council, private contractors or
state government bodies.59 Any individual, without
regard to interest, legal status or geographic location, can request records from the agencies.

Government Secrecy: Decisions Without Democracy

There are nine exemptions under the FOIA. They
are for:
•		Classified information relating to the national
defense or foreign policy;
•		Internal personnel rules and practices of an
agency;
•		Information made secret by another statute;
•		Confidential trade and business secrets;
•		Internal and inter-agency communications;
•		Personal information;
•		Law enforcement;
•		Financial institutions;
•		Well and geologic information.
Most of these exemptions are discretionary (agencies may, but are neither required to release nor
withhold information requested). The presumption
overall is for the release of information and agencies can withhold it only if there is a good reason.
The 1986 amendments to the law also allow agencies to refuse to confirm to existence of records
if the information would interfere with a current
secret criminal investigation, records about informants, and some classified and secret FBI intelligence or terrorism files.
A person denied information can first appeal
internally to the agency to reconsider. A lawsuit
can also be filed in the federal District court where
the requestor resides or the U.S. District Court in
Washington, DC. Several hundred law suits are filed
each year.
For fees purposes, requestors can be broken down
into three categories – commercial; educational or
noncommercial scientific and news media (including
public interest groups); and other. Commercial-use
requestors are required to pay for all search, review
and duplication costs; news media and representatives of scientific or educational organizations are
required to pay for duplication of records of more
than 100 pages. Requestors who are not commercial,
news media, scientific or educational requesters are
required to pay search costs for more than 2 hours
and duplication costs for more than 100 pages.
Attempts by agencies to use the fees as a barrier
have been increasing. The CIA in October 2005
began demanding search fees from public interest groups and the news media if it determined
that the information requested was not “important
enough news” to justify a waiver.

21

E-FOIA
In 1996, the U.S. Congress adopted the Electronic
FOIA (E-FOIA) Act, the most significant amendment to the FOIA since 1974. The primary goal of
the E-FOIA was to improve how agencies handled
electronic information related to FOIA requests.
This included a specific recognition that requests
for electronic information were to be treated in
the same way as requests for physical documents,
and greater obligations for publishing information
online and accepting electronic requests.
However, the requirements have not been fully
implemented more than ten years after the adoption of the Act. Many agencies still do not have
adequate web sites with Electronic Reading Rooms
or accept electronic requests for information.

Problems
The chilling of FOIA in the Bush Administration
began nearly from its outset. In October 2001, Attorney General John Ashcroft issued a memo on
FOIA that substantially undermined the presumption of openness.60 The memo encouraged agencies
to limit disclosure of information, ordering them
to “carefully consider” interests including national
security, business information, and personal privacy
before allowing the release of any information.
The agencies were told that the Justice Department would defend them in court except in the
most extreme cases. The DOJ then issued guidance
suggesting expanded views on exemptions such
as privacy and internal agency rules and practices.
This substantially changed the presumption of the
previous order issued by Attorney General Reno.
That order created a presumption of openness and
stated that the DOJ would only defend agencies if
a “foreseeable harm” existed, not if there were only
a substantial legal basis (the standard under the
2001 order).
Following the 2001 memo, studies have found that
the number of exemptions cited expanded greatly.
The use of the privacy exemption has been especially aggressive.

Delays - Waiting until kingdom come
One of the most significant problems with the
FOIA is the often long delays that occur in agencies providing information to requestors. The FOIA
requires that agencies respond to requestors within
20 working days. However, there are no set dead-

22

Government Secrecy: Decisions Without Democracy

lines for actually making the information available,
rather the information must be provided “promptly”.
In some cases, requestors can wait years for the
information that they requested. A review by the
National Security Archive in 2006 found that the
oldest request was 17 years old. The GAO found that
the backlog of agencies requests had also increased
from 2002 to 2005 by 14 percent.61

•		Conduct a review of FOI operations and draft a
plan for improvements including review of the
use of information technology and reducing
backlogs;
•		Establish one or more FOIA Requester Service
Center(s);
•		Designate a FOIA Public Liaison to work with
requestors.

In part, this is a resource issue. Many agencies have
not provided for enough resources to ensure that
requests are responded to in a timely manner. But
agencies know that unless a lawsuit is filed, they do
not have to respond in a timely manner and many
use that as a means to deny access.

It was widely suspected that the executive order
was issued to undermine Congressional efforts to
adopt amendments to the FOI to improve operations. Most of the requirements such as Chief FOI officers and Liaisons were already in place, and it does
not address problems such as the 2001 Ashcroft
memo that sets the default at withholding information rather than releasing it.

Oversight
Another significant problem with the FOIA is the
lack of a central authority to monitor and enforce
it. Many U.S. states such as Connecticut, Florida,
Hawaii, and New York (and over forty other countries) have appointed a Commission or ombudsman which has this task. The office can also play a
proactive role in providing guidance and training to
assist agencies.
The best the U.S. has is the FOI and Privacy Office in
the Department of Justice. The DOJ provides guidance to agencies but its actual authority is limited
to some administrative functions on annual reports.
The Department also defends agencies who are
sued but, under the Ashcroft memorandum, its
duty is to defend in nearly all cases.

Proposals for Improvements
In the past several years, Congress has again been
discussing improvement to the FOIA. Hearings were
held and a number of bills were introduced and discussed by Committees in the House and the Senate
in the 109th Congress.62
In December 2005, President Bush issued an executive order requiring agencies to improve their administration of FOI.63 The order requires that each agency
establish “citizen centered” policies that require that
requestors are treated “courteously and appropriately” and agencies operate in a “results-oriented”
manner. Specifically each Agency was required to:
•		Designate a senior official as Chief FOIA Officer
with overall power over agency compliance and
implementation;

In October 2006, the Attorney General released the
first report based on the implementation plans. The
report presented a very rosy view of the Executive
Order, calling it a “first of its kind FOIA executive
order” and “the most significant administrative
development in its history” and lauding it as an
international standard. The order was described
as having “an immediate and widespread positive
effect on the operations of the federal agencies”. It
recommended minor changes to the administration including a meeting of Chief FOIA Officers,
improvement of acknowledgement letters, a review
of forms and better use of technology. A review of
the same reports by the National Security Archive
was much less cheery, saying that the review “fails
to provide an honest assessment of where agencies'
FOIA programs stand today.” The review noted that
many agencies have still not implemented the 1996
E-FOIA amendments; many plans rely on uncertain funding; there is a lack of recognition of the
resources needed to resolve longstanding backlog
problems; and there is a lack of any cross-agency
authority for FOI.64
In March 2007, the House passed the “Freedom of
Information Act Amendments of 2007” (H.R. 1309),
and the “OPEN Government Act” (S. 849) was introduced in the Senate. S. 849 has passed out of the
Judiciary Committee and is awaiting floor time for
debate and a vote.

Executive Privilege
Underlying many of the Administration’s claims for
denying information is the belief that the Administration is not subject to most requests (even legal)

Government Secrecy: Decisions Without Democracy

23

for information because its release would violate
“executive privilege.” The administration has from
the beginning strongly worked to enhance its
powers in relation to the other branches of government and the public. It has stated its belief that the
Presidency should return to the (largely mythical)
unchecked powers that it held before the Watergate era. As Bush told a press conference in 2002,
“I’m not going to let Congress erode the power of
the Executive Branch.”65

Hiding from Congress

The privilege comes from the constitutional separation of powers and is promoted to protect the
advice given to presidents. Scholar Mark Rozell defines it as “the right of the president and high-level
executive branch officers to withhold information
from those who have compulsory power -- Congress and the courts (and therefore, ultimately,
the public).”66
The claim was first made in the administration of
George Washington, but it was not recognized
by the courts until the 1950s. In cases such as the
Watergate tapes and debates over the files of President Nixon, the Courts found that it is limited and
diminishes over time.67

executive privilege, that they are immune from
testifying before Congress and providing information. Instances include the activities of White House
Counsel Alberto Gonzales when he was nominated
for Attorney General, and Supreme Court nominee
John Roberts’ activities in the Justice Department.

Starting in 2001, the Administration began using
expansive claims of executive privilege to resist
Congressional inquiries into a variety of areas,
including the Boston FBI’s misconduct in the 1960s
that resulted in an innocent man being imprisoned
for 30 years, Justice Department memorandums on
campaign finance prosecutions, and copies of the
President’s Daily Brief relating to perceived terror
threats prior to 9/11. Officials have claimed, under

The claim of executive privilege also has been used
to stymie investigations by Congressional officers.
The General Accounting Office (now the Government Accountability Office), the investigative arm
of the Congress, was asked to review the activities
of the 2001 task force on energy policy chaired by
Vice-President Cheney, which had held a series of
secret meetings. It was widely believed that these
included meetings with controversial compa-

24

Government Secrecy: Decisions Without Democracy

nies such as Enron. The GAO was asked to obtain
information on the meetings, who participated and
what was discussed. The Office of the Vice-President
refused and in February 2002, for the first time ever,
the GAO filed suit to enforce its powers. The case
was dismissed in December 2002 after the court
found that, as there was no personal injury to the
GAO, it could not bring the case. It chose not to appeal the case.
In June 2007, the House Oversight and Government
Reform Committee released letters and other documentation showing the Vice-President asserting that
his office was not bound by Executive Order 13292
on national security classification as it was not “an
entity in the Executive Branch.” This is an odd claim
from an official asserting Executive Privilege.
The 110th Congress has sent numerous requests
for documents to the White House, on such topics
as the White House’s involvement in the hiring and
firing procedures of the Justice Department and
the warrantless surveillance program first revealed
in late 2006. The White House is responding with
assertions of executive privilege, but the new Congress does not appear inclined to back down and
accept these claims without a fight.

Accessing Presidential Records
Executive privilege is also being used to justify limiting access to the historical files of the past presidents. In 1978, following Watergate, the Congress
enacted the Presidential Records Act.68 The Act set
the principle that presidential records are owned by
the public rather than private property of the president and are to be maintained and made public by
the National Archives. The law allows records to be
kept sealed for 12 years and following that period to
be made public subject to nearly all of the exemptions of the Freedom of Information Act. Under an
Executive Order issued by President Reagan, the
President and his predecessors were given 30 days
notice when records were about to be released and
the Archives was required to identify any records
that would affect executive privilege.69 The records
would then be released unless the President or the
previous president claimed privilege. Requestors
could challenge the decision in court.
In November 2001, President Bush issued an Executive Order that restricted access to these records.70
The new order revokes the Reagan order, and in
the words of the House Committee on Government
Reform, “converts the Act’s presumption of disclosure into a presumption of non-disclosure.” Under
the new order:

Government Secrecy: Decisions Without Democracy

•		The release of information must be first approved
by both the current and previous president even
if privilege is not claimed.
•		The current president can withhold documents
even if the previous one disagrees.
•		The current president must follow the wishes of
the previous president to withhold “Absent compelling circumstances”. The Archivist must follow
the wishes of the former president and defend
the withholding even if it is without merit.
•		Persons who challenge the designation of executive privilege must show a “demonstrated, specific
need" for the records.
•		The former president can designate a friend or
relative who can claim the privilege even after the
former president is dead.
•		Requests from the public must be responded to
in 90 days but can be delayed indefinitely.
•		The claim of executive privilege was extended to
the Vice-President.
The American Historical Association and other
groups filed a lawsuit in 2002 challenging the order
as violating the law. The suit is still pending.71 Several bills were introduced in the House and Senate
in the 109th Congresses and gathered bi-partisan
support, but were not adopted.
In March 2007, the Presidential Records Act Amendments of 2007 was introduced in both the House
(H.R. 1255) and the Senate (S. 886). It passed the
House on March 14th and was passed out of the
Senate Homeland Security and Governmental Affairs Committee in June. It is awaiting a floor vote.

Closing the Courthouse Doors
Americans have a long-held presumption that trials
are to be open. The Supreme Court has described
open courtrooms as “recognized as an indispensable attribute of an Anglo-American trial” as far
back in history as could be found.72 However, the
same cloud of secrecy that has enveloped the
executive branch has been advancing on the
judicial branch.
Since 9/11, information about cases has become
increasingly difficult to obtain. Individuals have
been detained secretly, often held for months on
immigration-related charges without any notice
to their families or being given a chance to obtain
legal representation, hearings have been closed,
and filings and briefs have been sealed.

25

In September 2001, Chief Immigration Judge
Michael Creppy (an employee of the Justice
Department, not an independent judge) issued a
memorandum ordering that immigration hearings
in “special interest cases” be closed and prohibiting
disclosure of information about the cases to anyone
but employees and the person’s lawyers.73 Over 700
people were designated as “special interest cases”
and of these 500 were deported.74
The closed hearings were challenged in several
cases. The U.S. Court of Appeals for the 6th Circuit
found that the rules were unconstitutional, decreeing “Democracies die behind closed doors….When
government begins closing doors, it selectively controls information rightfully belonging to the people.
Selective information is misinformation.” 75 In the
3rd Circuit, however, the court ruled for closure of
the hearings, finding that immigration cases did
not have a long history of openness; the court gave
“great deference to Executive expertise”.
The secrecy is not limited to immigration hearings,
though. Court hearings relating to national security
or terrorism are also being regularly closed, and
gag orders are being placed on lawyers to prevent
them from discussing what is happening to their
clients. Briefs and decisions issued at the district and
appeals level are classified or redacted without any
limits. In a case involving a challenge to the PATRIOT
Act, the Justice Department even blacked out a
quote in an ACLU brief from a 1972 U.S. Supreme
Court case that said, “The danger to political dissent
is acute where the government attempts to act under so vague a concept as the power to protect domestic security. Given the difficulty of defining the
domestic security interest, the danger of abuse in
acting to protect that interest becomes apparent.”76
Many cases are not even appearing on dockets.
In 2005, People for the American Way filed a FOIA
request with the Justice Department asking how
many cases have been completely closed. The DOJ
demanded that PFAW pay almost $400,000 and
then rejected the request as too burdensome, saying that the practice was common and that it did
not keep track of the records. A DC Federal Court
ordered the DOJ to conduct the searches.
Nor is the secrecy limited to national security
related cases. The Justice Department is currently
attempting to close the hearings of the U.S. Court
of Federal Claims on whether the drug Thimerosal
causes autism. The HHS has requested that all the
evidence be sealed and not be provided to the

26

Government Secrecy: Decisions Without Democracy

families or the press.77 In a recent prosecution of
an employee of Coca-Cola, the prosecution recommending using the procedures developed to
protect classified information against the defense.

services”.78 This is especially true relating to classified information obtained while employed by the
government.79 The CIA and other agencies have the
power to review all materials that the employee or
former employee wish to publish and censor them.

Gagging The Insiders: .
Public Employees 

There has been an increase in efforts to prevent
public employees, especially scientists, from presenting to the public information which challenges
the views of the administration, especially relating
to climate change.80 At NASA, a junior political appointee with no scientific background81 ordered the
Director at the Goddard Institute for Space Studies

As secrecy in the administration has become more
severe, the importance of whistleblowers has
grown. These insiders, often government officials
who are dismayed by the activities of their fellow

officials, can be invaluable in revealing to the public
information essential to the public interest that
otherwise never would have seen the light of day.
Some of the recent important stories they have
revealed include:
•		The existence of the National Security Agency
policy of warrantless wiretapping of telephone
calls between the U.S. and foreign countries.
•		Abuses at Abu Ghraib prison.
•		The existence of CIA rendition and torture
centers.
•		The substantial no-bid contracts given to
Halliburton and other defense contractors and
price gouging by the companies.
The number of times the administration has started
investigations into leaks has also substantially increased. A recent FOIA request by the New York Sun
found that 94 investigations of leaks of classified
information were started between 2001 and 2006.

Gag rules
In general, public employees have the same First
Amendment rights of free speech as other citizens. However, these rights can be limited in some
circumstances to “promote the efficiency of public

to not speak to conferences or the media. At the
U.S. Geological Survey, scientists must obtain preapproval of all presentations, reports or other public
releases of any material that has “findings or data
that may be especially newsworthy, have an impact
on government policy, or contradict previous public
understanding”.82 The Department of State Inspector General found, at the Bureau of International
Informational Programs, a “virtual censorship” of
speakers who were vetted.83
The designation of “sensitive” information (see
above for discussion) is also being used to restrict
employees’ ability to disclose information of serious
public interest. Employees of Wackenhut Corporation, which provides Transport Security Administration screeners, were required in April 2006 to sign
non-disclosure agreements after several publicly
revealed security problems at DHS headquarters.84
A federal marshal was fired in 2003 for releasing TSA
plans to limit marshals on long distance flights. The
disclosure led to Congressional and public criticism
and a reversal of the plan. In May 2004, the DHS
proposed requiring all 180,000 employees and contractors to sign an agreement85 to not disclose any
information designated as sensitive, including even
information that could be released under FOIA.
The employees would also be subject to random
searches as a condition of employment. This order

Government Secrecy: Decisions Without Democracy

was partially repealed in January 2005 following
protests from employee unions, Congress and civil
liberties groups. The policy is still in force, however,
for contractors.

Plugging the Whistle
At the same time as the government is clamping down on employees’ speech, there has been
a substantial increase in public recognition of
the importance of whistleblowing. In 2002, Time
Magazine made three whistleblowers, including an
FBI agent, their “Persons of the Year”. However, the
protections that are given to whistleblowers are
often inadequate. Some common practices used
against whistleblowers, as noted by the Project on
Government Oversight (POGO), include:
•		Taking away job duties so that the employee is
marginalized.
•		Taking away an employee's national security
clearance so that he or she is effectively fired.
•		Blacklisting an employee so that he or she is unable to find gainful employment.
•		Conducting retaliatory investigations in order to
divert attention from the waste, fraud, or abuse
the whistleblower is trying to expose.
•		Questioning a whistleblower's mental health,
professional competence, or honesty.
•		Setting the whistleblower up by giving
impossible assignments or seeking to entrap him
or her.
•		Reassigning an employee geographically so he or
she is unable to do the job.86

Whistleblower Protection Act
Federal whistleblower protection was first adopted in 1978 in the Civil Service Reform Act and
was extended in 1989 and 1994.87 The revised Act,
now known as the Whistleblower Protection Act,
is intended to protect federal employees from
being punished when they make a disclosure of
information relating to violations of laws, rules or
regulations, gross mismanagement, gross waste of
funds, abuses of authority, or substantial dangers to
public health. Agencies are prohibited from making
“prohibited personnel practices,” such as discriminating on appointments, transfers, promotions,
pay or benefits, or changes of duties, because an
employee has blown the whistle.
Under the Act, the Office of Special Counsel (OSC)
was set up as an independent investigative agency

27

that takes complaints of “prohibited personnel
practices,” recommends corrective or disciplinary
action, and brings cases for employees before the
Merit Systems Protection Board. The OSC can also
receive reports from whistleblowers about illegal or
unlawful activities. Employees who are punished for
whistleblowing can appeal to the Merit Systems Protection Board and then to the U.S. Court of Appeals.
Most observers believe that the WPA has not worked
well at protecting public employees. Congressional
committees and the Government Accountability
Office have conducted a number of investigations
into the effectiveness of the Whistleblower Protection Act and have found serious problems with the
protections and enforcement of the Act.88
The OSC has been a major impediment to whistleblowers. It was criticized by the GAO in 2004 for
allowing a huge backlog of cases.89 During the
backlog, OSC only found for the whistleblower
in four percent of the cases. Following the GAO
report, the OSC controversially “dumped” 1,000
cases without review. When various staff members
complained, they were sent to offices far away on
short notice or were forced to resign.90 Appeals have
been less than effective as well. Since 1999, whistleblowers have won only two cases at the Board, and
the Court of Appeals has been widely criticized for
limiting rights even after successive changes in
the legislation.91
In the 109th Congress, several bills to improve whistleblower protections were discussed and approved
in committees. However, nothing was enacted
before the end of the session. Early in the 110th
Congress, the House passed the “Whistleblower Protection Enhancement Act of 2007 (H.R. 985); it was
referred to the Senate (S. 274) and passed out of the
Senate Homeland Security and Governmental Affairs Committee in June. It is awaiting a floor vote.

National security whistleblowers
Even more problematic are the cases of whistleblowers who wish to reveal classified information.
The 1999 Intelligence Community Whistleblower
Protection Act allows intelligence employees to
report misconduct by officials to the House and
Senate Intelligence Committees and the agency’s
Inspector General. It provides little protection,
however, for the employees. Threats have increased
against whistleblowers who are revealing information on mismanagement of agencies such as the
NSA and FBI and abuses by military contractors.92

28

Government Secrecy: Decisions Without Democracy

First Amendment Protections
The right of a public employee to reveal abuses
has also been undermined in the courts. The U.S.
Supreme Court ruled in May 2006 that public employees who make statements about abuses they
discovered while working were not protected by
the Constitution.93

Official Secrets? The Espionage Act and
other criminal statutes
The threat of jail for public employees and journalists who reveal information in the public interest is
the ultimate penalty. While repressive countries like
China and Russia routinely imprison citizens and
journalists for disclosing embarrassing information
that the governments claim is classified, the United
States, with its strong protections of free speech,
does not have an Official Secrets Act.
The closest law is the Espionage Act adopted in
191794. The Act prohibits the unauthorized disclosure
of classified defense information to enemy powers
with the intent to harm the United States. When the
law was being considered in 1917, the Congress
on several occasions rejected efforts to include
a broader prohibition on disclosure, expressing
concern over the restrictions on free speech and the
possible misuse of the discretionary power given to
the President to determine what was classified.95 It
is generally accepted that this law does not apply to
the publication of state secrets by newspapers and
there has never been a prosecution of a newspaper
in the history of the law.
In the nearly 90 years that the Act has been in place,
there have been only a few cases under the law for
non-espionage-related incidents. In the Pentagon
Papers case, the government attempted to prevent
the publication of a classified history of the Vietnam
War that was leaked to the Congress and newspapers.96 The Supreme Court refused to censor the papers, finding that the government had not met the
heavy burden of justification – of “direct, immediate
and irreparable damage to our Nation or its people”
in ordering the withholding. The case against Daniel
Ellsberg, the source of the material, failed due to
the illegal searches conducted against him. In 1988,
Samuel Morison, a navy intelligence analyst, was
convicted and sentenced to two years in jail for
providing satellite photographs of Soviet installations to Jane’s Defense Weekly, which he worked for
part time. He was pardoned by President Clinton in
January 2001.

In the past several years, the barriers to using this
law have been broken down. In an unprecedented
prosecution, Steven Rosen and Keith Weissman,
staff members of the American Israel Public Affairs
Committee (AIPAC) are being tried under the Espionage Act for receiving information from a Defense
Department employee.97 Following the publication of stories on the National Security Agency’s
warrantless wiretapping of telephone calls, Attorney General Gonzales, Members of Congress,
and a few conservative commentators called for
the prosecution of the New York Times under the
Espionage Act.98 In December 2006, federal prosecutors in New York City cited the Espionage Act
in demanding that the ACLU return all copies of a
leaked memo on media policy on photographing
detainees designated as “Secret”. The subpoena was
dropped following a court hearing where the judge
rejected the government’s bid to seal the hearing
and expressed skepticism that the case was strong
enough to go forward. The government subsequently declassified the document in full.
Attempts have been made in recent years to adopt
an Official Secrets Act. In 2000, the Senate Intelligence Committee included a provision in the Intelligence Authorization Act that would have criminalized any unauthorized disclosure (disclosure
by any person with authorized access to classified
information to any person not allowed to see it) of
information that the discloser could have reason to
believe might be classified. The penalty was three
years in jail. The bill was widely criticized by the media and by Democratic Senators. In November 2000,
President Bill Clinton vetoed the bill saying that
the “provision is overbroad and may unnecessarily
chill legitimate activities that are at the heart of a
democracy.”99 In 2006, the bill was reintroduced in
the Senate by Senator Kit Bond (R-Mo) but gained
little support and was not voted on before the end
of the 109th Congress.100
Not all officials support such a new law. In 2002,
Attorney General Ashcroft issued a report recommending against adopting new statutes on criminalizing disclosures finding that “current statutes
provide a legal basis to prosecute those who
engage in unauthorized disclosures, if they can be
identified” and called for strong procedures for the
identification of government employees who reveal
information.101
These current laws include laws on general theft.
The theft statutes have been used controversially to

Government Secrecy: Decisions Without Democracy

penalize employees who leak information. In 2003,
a Drug Enforcement Agency employee was convicted and sentenced to one year in prison under the
federal anti-theft statute for providing unclassified
information to the UK’s The Times newspaper on
Lord Ashcroft, the UK Conservative Party treasurer,
whose bank in Belize might have been involved in
money laundering.102

Attacking the Messenger: the Media .
and Protection of Sources
The media is a crucial partner in ensuring that
information from insiders is publicized. However, in
order for many of these sources to come forward,
reporters must promise that their identities will not
be revealed, for fear of retaliation. As Justice Potter
Stewart once wrote, “When neither the reporter
nor his source can rely on the shield of confidentiality against unrestrained use of the grand jury’s
subpoena power, valuable information will not be
published and the public dialogue will inevitably
be impoverished.”
The remedy for this situation is a legal recognition
that journalists and those who work with them
have a privilege similar to a doctor/patient or attorney/client, to not have to reveal the identities
of their sources, or provide unpublished works
and other information related the journalist’s work
when they promise their sources that they will not
do so. This right was first adopted by the Maryland
General Assembly in 1896. It is widely recognized
on the state level with 31 states and DC adopting specific “shield laws” to protect these sources.
In nearly all the other states, the courts have
recognized a right based on common law or the
state constitution.103

29

There is no recognition of this right, however, at the
federal level. The Supreme Court ruled in 1973 that
there is no constitutional right of journalists to not
testify before a grand jury.104 The court was sharply
divided and, since then, many federal courts have
found a limited privilege based on the different
opinions in the decision.
Until recently, attacks on journalists to force them
to reveal their sources or testify in court proceedings were relatively rare over the last 25 years.
Under long-standing Attorney General’s Guidelines,
federal prosecutors required the permission of the
Attorney General. It could be sought and given
only in cases where the information sought must
be essential to the investigation and not peripheral,
nonessential or speculative. Reasonable attempts
to obtain the information from alternative sources
must also be attempted.
In the last six years, there has been a boom of cases
where prosecutors have demanded that journalists disclose their sources for a variety of reasons. In
many of the cases, there has been very little point
for forcing the disclosure except as a punitive assault on the reporters who published it.105
In the 109th Congress, a number of bi-partisan bills
were introduced in the House and the Senate to
provide at least a qualified privilege. In May 2007,
the “Free Flow of Information Act of 2007” was introduced in both the House (H.R. 2102) and the Senate
(S. 1267). v

Government Secrecy: Decisions Without Democracy

31

3
Opportunities for Public
Access and Participation
in a Digital Age
The past fifteen years have seen significant changes
in how government agencies operate, due to the
widespread adoption of information and communications technologies (ICTs) such as desktop
computers and the Internet. They have improved
the way government works and opened new opportunities for citizens to follow and participate in
government activities. The technologies can also
significantly improve citizen access to government
information. Information that once was difficult and
time-consuming to collect, analyze, and distribute
can now be easily made available inexpensively to
anyone who wants it.
However, electronic government also creates new
challenges. These include ensuring that access is
available to everyone equally, and that the increased volume of information being created electronically is going to be kept for future generations
to be able to find and use.

Electronic Government 
For over a decade, electronic government (E-government) has held the promise of providing more
responsive and efficient government. There are three
major components to E-government: E-information
- the making of public information available electronically to the public; E-governance – the use of technologies to facilitate consultations, voting and other
democratic activities; and E-services – the better
providing of government services using technologies.
The use of E-government has been steadily increasing as more Americans go online. A 2004 study

by the Pew Foundation found that 77 percent of
Internet users (97 million Americans) had used the
Internet to obtain information from or to contact
government agencies. Internet users are much
more likely to contact government offices than nonInternet users and report a higher level of success
in their interaction with the government.106 Still,
the situation is not ideal; 46 percent of those who
contact the government through the Web reported
a problem.
The E-Government Act of 2002 sets a variety of
standards on electronic rulemaking, records management, digital signatures, web sites standards
and other E-government initiatives. 107 The lead
government agency for electronic government
is the Office of Management and Budget (OMB),
which through the Office of Information and Regulatory Affairs, has long been involved in information
policy. The E-Government Act created an Office of
Electronic Government at OMB and also requires
the OMB to issue policies to organize information to facilitate searching of information across
the government.108

Access to government information online
Information technologies can be extremely powerful at providing access to government information online to facilitate the understanding of
how government is working. Every Congressman,
Senator and Congressional Committee and federal
agency has a web site and many maintain multiple
sites which provide extensive information about
their activities.

32

Government Secrecy: Decisions Without Democracy

Much more needs to be done, though. Government
web sites are complex and often self-serving. Information appears and disappears. Many are formatted in such a way that access to raw information for
analysis is limited. Public access advocates have asked
for years for better management of the government’s
information, and now companies such as Google are
asking agencies to design the databases to allow for
better indexing by their search engines.109
The following are some examples of information
that is available to the public which is used to promote oversight and accountability:

Legislation and regulations
For nearly 150 years, the Government Printing Office has published and made available to the public
information such as the texts of laws, the Federal
Register, the Congressional Record and important
government documents such as the report of the
9/11 Commission. The Federal Depository Library
Program places government documents in over
1200 libraries in all 50 states to ensure that citizens
have access to the documents.
Electronic publication has steadily increased access
to the information available. In 1993, Congress

enacted the Government Printing Office Electronic
Information Enhancement Act to put an index
of documents, the Federal Register, Congressional Record and other records online and act as a
depository online.110 It now maintains thousands
of databases and government documents online,
available for free. Millions of records are accessed
each month.
In 1995, the Library of Congress launched the
THOMAS system to allow for citizens to easily and
freely obtain legislative information. The system
gives access to bills, committee and floor schedules,
votes on specific bills, hearings, reports and other
related information. It received over 150 million hits
in FY 2004.111
It is often difficult for citizens to be able to effectively follow what is going on in the government
and Congress, however, and many areas where information is still difficult to find. There has already
been some consideration in the 110th Congress
about making more information about lobbyists,
campaign financing and travel available. The Open
House Project is examining other areas such as
Congressional Research Service reports, Congressional Committee transcripts and votes, archiving
Congressional web sites, and making changes to

Government Secrecy: Decisions Without Democracy

bills available publicly in an understandable format.112 ReadtheBill.org is calling on the Congress to
enact a “72 hours online rule” to ensure that all bills
and conference reports are available before they
are voted on to give time for members of Congress
and the public to review legislation before it is
approved.113

Electronic Budget Info
In FY 2006, the total budget of the U.S. was 2.7
trillion dollars. According to the CRS, over 1 trillion
dollars per year is given in the form of contracts,
grants or loans.114 Public accountability can reduce
money spent for frivolous or wasteful projects such
as the infamous Alaskan “Bridge to Nowhere,” or
lost though mismanagement and poor contracting in Iraq and following Hurricane Katrina. The
U.S. has historically had a reasonably open process
but the complexity of procurement and spending,
increased secrecy, and attempts to limit the powers
of agency Inspectors General have lessened that.
The International Budget Project ranked the U.S.
as the sixth most open country in the world of 59
countries, below France, the United Kingdom, New
Zealand, South Africa and Slovenia.115
One of the most innovative developments in the
past five years in both access to information and
electronic government was the adoption of the
Federal Funding Accountability and Transparency
Act in 2006. The law was enacted with overwhelming bi-partisan support in the House and the
Senate and by over 150 groups from across the
political spectrum.
The Act requires that the OMB create a new online
database with a “searchable website” about organizations that receive contracts, grants or loans from
the federal government by January 2008. This is to
expand to include credit card transactions, subcontractors and subgrantees by January 2009. The
information will include a description of purpose of
the spending, the amount, and the Congressional
district benefiting.116 Any person or group will be
able to search to see who received money from the
federal government and for what purpose.
Concerns have already been expressed that the
underlying information may be unreliable. The OMB
database will use information from the Federal
Procurement Data System (FPDS), Federal Assistance Award Data System (FAADS), and Grants.
gov. The GAO in 2003 and 2005 expressed concern
over the timeliness and accuracy of the FPDS117 and
found similar problems with FAADS. There was also

33

concern over the General Services Administration
(GSA) initially blocking access to federal contracting
data.  After years of managing a database on federal
contracts, called the Federal Procurement Database
System (FPDS), the GSA contracted out the responsibility.  The GSA initially denied FOIA requests for
the data, claiming that, as the contractor also took
over collecting the data, GSA did not have the database anymore, and that, instead, the data would
have to be purchased from the private contractor. 
Eventually, GSA backed off this controversial position and began having the contractor provide raw
data to those requesting it, free of charge 118

Corporate Activities
The federal government also collects and disseminates information about activities of private corporations in many areas including the environment,
financial records and consumer protection.

Environment
In 1986, following the releases of deadly methyl
isocyanate gas in Bhopal, India killing thousands,
and in Institute, West Virginia injuring hundreds, the
U.S. Congress enacted the Emergency Planning and
Community Right to Know Act.
The law requires that companies provide information to state agencies and the Environmental
Protection Agency on toxic chemicals that they use
or release into the environment. The EPA is required
to maintain a Toxic Release Inventory (TRI) and
make that information widely public using information technology. The information is available online
and citizens can type in their zip code and obtain
information about the releases in their areas.
The data has many users: civil society groups have
combined this data with other records to create
comprehensive search engines for use by citizens
groups;119 the EPA uses the data in developing regulations; and even companies use it to determine
where they should focus their efforts on reducing
pollution. The TRI is considered to have successfully
reduced the amount of toxic materials released in
the U.S. by nearly half.120
As mentioned in the previous chapter, the EPA
decided in December 2006 to limit the usefulness
of the TRI by raising the threshold of pollution that
is to be allowed before the companies must notify
the public.

34

Government Secrecy: Decisions Without Democracy

Finances
One of the earliest efforts to use ICTs to disseminate information was the Security and Exchange
Commission’s Electronic Data Gathering, Analysis,
and Retrieval (EDGAR) system.121 The system allows
investors and others to examine filings made by
public companies. It is also used by companies
to create extended databases and tools to assist
investors. Starting in the 1990’s, the system was put
online. The SEC reports that it was searched nearly
400 million times in FY 2005. In 2005, the SEC began
releasing publicly its Staff Comment letters without
requiring a FOIA request.122

Consumer Information
Other important information that is collected and
is in some part made public includes the safety
of toys and consumer products, autos and food.
One of the first federal information laws was the
1958 Automotive Information Disclosure Act which
required car companies to place price stickers on
new cars.123 On the other hand, the FCC in 2004
overturned a ten-year-old policy and refused to
release information on how often land line and cell
phone companies have outages, claiming that the
release of the information would help terrorists
and harm the companies.124

E-Rulemaking	
One area where there has been significant progress
is in the development of using ICTs to facilitate
public participation in developing federal rules
(e-rulemaking). Each year, 8,000 rules are created by
federal agencies and departments. The standards
for rules are set by the Administrative Procedures
Act of 1946, which determines the process that the
agency must follow in developing regulations based
on the principles of information, participation, and
accountability.125 In a typical rulemaking, the agency
will publish a Notice of Proposed Rulemaking in the
Federal Register and solicit public comments for a
set period. After the period, the agency will review
the submissions and publish a final rule and response to the comments. The rule can be challenged
in court, if it is believed that the agency created it
without justification or that it failed to follow the
requirements of the enabling legislation.
There has been a gradual move to holding rulemakings online. It is generally believed that Internet
rulemakings allow people to more easily identify

rulemakings that affect them and to participate.
The development of the rules themselves benefit
from receiving input from a wider ranger of participants. The E-Government Act of 2002 requires that
agencies create “electronic dockets” and receive
comments via their websites on proposed rules.126
In 2003 the regulations.gov website which gives
access to the rulemakings published in the Federal
Register was launched.
It is not clear whether e-rulemaking substantially
improves citizen participation. The new systems
often duplicate the existing processes that do not
allow for much input into the process. In some cases, the lobby groups are the main beneficiaries.127
Electronic submissions may also be treated less
seriously by officials. The EPA decided in December 2006 to reduce the amount of information on
chemicals released to the environment even after
over 120,000 individuals, groups and state and local
governments wrote letters opposing the proposal
while only 34 supported it.128

E-participation
A more significant step would be the further
development of using electronic networks not
just to provide information, solicit comments or
provide services but to increase public participation in governance beyond rulemaking. These could
include holding online forums, running discussion
lists through electronic mail or blog-type forums.
There have been limited efforts to use these tools
by federal departments thus far.
The use of such tools should not, of course, be
allowed to circumvent the Federal Records Act,
the Presidential Records Act, the Federal Advisory
Committee Act or other accountability legislation
and regulations.

Challenges of Digital 
Government Information
Digital Divide
One barrier to e-government is adequate access
to computers and networks. While there is steadily
increasing use of the Internet, a significant portion
of the population still lacks access. The number of
adults with access to the Internet reached over 70
percent in 2006, but only 42 percent had access to
high speed broadband.129 The level of access is sig-

Government Secrecy: Decisions Without Democracy

nificantly lower for those on limited incomes. Only
53 percent of those with household incomes under
$30,000 per year had access.
Education or even willingness of individuals to use
electronic services, especially those from older
generations, is also a serious problem. Only 32
percent of those over 65 and only 40 percent of
adults with less than a high school education use
the Internet.130 Language may also be a problem.
There are also privacy and security concerns that
cut across demographics and may limit demand for
some services.
Digital-only access may also limit understanding.
There has been a growing move toward only providing access in electronic form. In 2006, the EPA
closed five libraries including its main library at EPA
headquarters, and reduced the times at four others. There is concern that many of the resources in
these libraries will not be converted to digital form
to maintain access and will disappear.131 It addition,
the expert help provided by professional librarians
may also be limited. Also in 2006, the Library of
Congress also stopped collecting certain documents such as dissertations in exchange for access
to a more limited commercial database.132
Thus, for the foreseeable future, any government
information or services should ensure that all persons have equal and equitable access. The role of
libraries, particularly public libraries, is very important here. According to a 2006 survey, nearly 100
percent of all libraries in the U.S. provide some form
of public Internet access, up from on 20 percent in
ten years.133 The libraries are now often taking on
the role of assisting people with using e-government sites. However, these libraries are funded
usually by state budgets and are under constant
financial pressures.

Disappearing documents and web sites
While electronic dissemination of information can
facilitate the release and access to information, it
can also make the job of making it disappear easier.
Following 9/11, many agencies removed information from their web sites or blocked public access to
information that was designated as “sensitive”.
These included:134
•		The United States Geological Survey ordered
librarians to destroy a CD-ROM on water supplies.

35

•		The Federal Aviation Administrative removed
information on enforcement actions.
•		The Environmental Protection Agency removed
Risk Management Plans, chemical hazards,
emergency contingency plans, and access to the
largest database of environmental information.
A review in 2004 by the Rand Corporation of information removed from federal web sites found that
most of the information was of little use to terrorists
and was widely available elsewhere. It also found
that the possible dangers needed to be balanced
against the interests in pubic access such as informing people of potential dangers.135
In other cases, the government has been using
expanded excuses of commercial confidentiality
to justify the removal of information. In 2006, the
Small Business Administration began pulling data
from the Central Contractor Registry on the size of
revenue of small companies after investigations
using the data showed that many of the businesses
given government contracts under the program
were not eligible.136

Managing “Born Digital” Information
Each year, billions of electronic documents are created in federal agencies. More data than ever before is created or collected in email, databases and
other electronic systems. Websites are developed,
updated and merged. Previously physical archives
are being converted to digital form. Document
formats are increasing in number and complexity;
the National Archives has found over 4,500 different
types of files.137 Many different programs and different systems are used to operate and manage them.
Determining what should be preserved and ensuring that it is maintained and indexed in a form that
will be useful both for agencies now and for future
generations are crucial problems. The entire “life
cycle” of the information, from its creation to its
disposal or permanent archiving, must be ensured.
This must be understood to include the ability to
access and use the data in its original format, or in
other ways, over time.
Previously, letters and files were routinely kept
based on a long-standing understanding on how
to handle paper documents. But electronic documents have changed that. Archival systems of
paper-based documents are designed to ensure
that the documents will last at least 100 years. In

36

Government Secrecy: Decisions Without Democracy

comparison, it is estimated that the typical life cycle
for the technologies – the formats and systems on
which the record or our government exists -- is now
only 18 months. Management of these systems is
still evolving, with very little consistency government-wide and virtually no oversight within the
executive branch or from Congress. The challenges
are monumental and they do not decrease if and as
we ignore them. Popular Mechanics magazine has
described this as a potential future “Digital Ice Age”.

What the Public Can Do
Activism/ organizing	
The role of the Internet as a tool to promote grassroots democracy can be extremely powerful. Its
developments has come more from private efforts
then from government bodies. The web has allowed
new groups such as MoveOn to better organize
citizens in ways that were not possible before.
Many websites have emerged to assist citizens in
better tracking the activities of government and
Congress. It is now possible to track new legislation through GovTrack138 or congressional travel139
or spending.140 Sites such as DocuTicker, beSpacific
and the Federation of American Scientists locate
and publish government documents and related
reports on major issues.
Websites, blogs and Wikis are used by millions every
day to share, comment and advocate. The Federal

Funding Accountability and Transparency Act in
2006 was enacted due to citizen and public interest
groups from a wide spectrum using the Internet
to coordinate lobbying efforts to identify which
Senators had placed secret holds on the law and
pressure them to remove them. The use of networks
of plane spotters allowed journalists to be able to
track the flights of CIA aircraft used for “rendition” of
prisoners to secrets prisons.141
Video is now widely available outside of the mainstream media or official channels though services
such as YouTube and MySpace. The availably of
these video sites makes it easier for citizen journalists to show abuses. During the 2006 political campaign, the video of Senator George Allen commenting on the race of his opponent’s campaign worker
seriously changed the tenor of the campaign and
led to his defeat. The widely disseminated video of
an UCLA student being Tasered and other videos
of the LAPD using pepper spray on suspects forced
the police and FBI to address abuses.142
Beyond sharing information, though, the public
can join organizations and coalitions that promote
openness and accountability. A partial list of such
organizations is provided at the end of this report.
The public needs to hold the government’s feet to
the fire – through letters and meetings, in public
forums, and at the ballot box. v

Government Secrecy: Decisions Without Democracy

Appendix – List of Relevant Legislation
Atomic Energy Act of 1946
Classified Information Protection Act
Critical Infrastructure Information Act of 2002
Data Quality Act
E-Government Act of 2002
Espionage Act
The Federal Advisory Committee Act (FACA)
Emergency Planning & Community Right to Know Act
The Federal Funding Accountability and Transparency Act
Freedom of Information Act
Government in the Sunshine Act
Intelligence Community Whistleblower Protection Act
Intelligence Identities Protection Act
Invention Secrecy Act of 1951
Military Whistleblower Protection Act
National Security Act of 1947
Nazi War Crimes Disclosure Act of 1998 (PL 105-246)
NoFEAR Act of 2002
The President John F. Kennedy Assassination Records Collection Act of 1992
Presidential Records Act of 1978
Public Interest Declassification Act of 2000
Whistleblower Protection Act

37

38

Government Secrecy: Decisions Without Democracy

Appendix - Resources
Books and Reports
Report of the Commission on Protecting and Reducing Government Secrecy, 1997
http://www.fas.org/sgp/library/moynihan/index.html
Hammitt et al, Litigation under the Federal Open Government Laws 2004 (EPIC 2004)
Alasdair Roberts, Blacked Out: Government Secrecy in the Information Act (Cambridge University Press 2006)
Louis Fisher, In the Name of National Security: Unchecked Presidential Power and the Reynolds Case (Kansas
University Press 2006)
Patrice McDermott, Who Needs to Know? The State of Public Access to Federal Government Information
(Bernan Press 2007)
David Banisar, Freedom of Information Around the World 2006, Privacy International.
http://www.privacyinternational.org/foi/survey
Susan Maret, On Their Own Terms: A Lexicon with an Emphasis on Information-Related Terms Produced by
the U.S. Federal Government, October 2006.
http://www.fas.org/sgp/library/maret.pdf
Secrecy Report Card 2006, OpenTheGovernment.org
http://www.openthegovernment.org/otg/SRC2006.pdf
U.S. House Committee on Government Reform. Citizen’s Guide on Using the Freedom of
Information Act (2005)
http://www.fas.org/sgp/foia/citizen.html

Newsletters
Access Reports. http://www.accessreports.com
Policy and News Updates. http://www.openthegovernment.org
Privacy Times. http://www.privacytimes.com
Secrecy News. http://www.fas.org/blog/secrecy
The FOI Advocate. http://nfoic.org/advocate

Websites of FOI related Organizations and blogs
beSpacific. http://www.bespacific.com
The Brechner Center for Freedom of Information. http://brechner.org

Government Secrecy: Decisions Without Democracy

Coalition of Journalists for Open Government. http://www.cjog.net
Cryptome. http://www.cryptome.org
Electronic Frontier Foundation FLAG Project. http://www.eff.org/flag
Electronic Privacy Information Center Open Government Page. http://www.epic.org/open_gov
Federation of American Scientists Secrecy Project. http://www.fas.org
The Freedom of Information Center. http://foi.missouri.edu
Government Accountability Project. http://www.whistleblower.org
The Memory Hole. http://www.thememoryhole.org
National Freedom of Information Coalition. http://nfoic.org
National Security Archive. http://www.gwu.edu/~nsaarchiv
OMB Watch. http://ombwatch.org
OpenTheGovernment.org http://www.openthegovernment.org
Project on Government Oversight. http://pogo.org
Public Citizen FOI Clearinghouse. http://www.citizen.org/litigation/free_info
The Reporters Committee for Freedom of the Press. http://www.rcfp.org
The Right-to-Know Network (RTK NET). http://rtknet.org
Society of Professional Journalists. http://spj.org/foi.asp
Sunlight Foundation http://www.sunlightfoundation.com
Sunshine in Government Initiative. http://www.sunshineingovernment.org
Transactional Records Access Clearinghouse (TRAC). http://trac.syr.edu

Federal Government Sites
Department of Justice Office of Information and Privacy. http://www.usdoj.gov/oip/oip.html
The Information Security Oversight Office (ISOO). http://www.archives.gov/isoo
U.S. Government Portal. http://www.usa.gov
GPO Access. http://www.gpoaccess.gov
Thomas. http://thomas.loc.gov
PACER. http://pacer.psc.uscourts.gov

39

40

Government Secrecy: Decisions Without Democracy

Endnotes
John Adams, A Dissertation on the Canon and Feudal Law, 1765. http://teachingamericanhistory.org/library/index.asp?document=43
1	

	Patrick Henry, The Debates in the Convention of the Commonwealth of Virginia, on the Adoption of the
Federal Constitution, June 9, 1788.
2

	Letter from James Madison to W. T. Barry, Aug. 4, 1822, in The Complete James Madison (Harper and Brothers, 1953). Cited in Wiggens, Freedom or Secrecy (Oxford University Press, 1956).
3

	Executive Order 11652 - Classification and Declassification of National Security Information and Material,
June 8, 1972.
4

Woodrow Wilson, The New Freedom: A Call For the Emancipation of the Generous Energies of a People
1913
5

	Louis D. Brandeis, “What Publicity Can Do,” Other People’s Money, p. 92 (1932). Quoted in Respectfully
Quoted: A Dictionary of Quotations. 1989.
6

	See Gary Bass and Sean Moulton, The Public’s Right to Know: A Case Study from the United States, in Calland and Tilley, The Right to Know, the Right to Live (ODAC, South Africa, 2002); OECD PRTR pages: http://
www.oecd.org/env/prtr
7

Reporters Committee for Freedom of the Press, Open Government Guide:
Wisconsin, 5th Edition. http://www.rcfp.org/ogg/index.php?op=browse&state=WI
8

	The Office of the Federal Register. “A Brief History Commemorating the 70th Anniversary of the Publication
of the First Issue of the Federal Register, March 14, 1936.” http://www.archives.gov/federal-register/the-federal-register/history.pdf
9

	Panama Refining Co. v. Ryan, 293 U.S. 388 (1935).

10

	For a detailed review, see Lotte E. Feinberg, Mr. Justice Brandeis and the Creation of the Federal Register,
Public Administrative Review, Vol 61, No 3, May/June 2001.
11

	United States Senators Daniel Patrick Moynihan and Ron Wyden, Secrecy in International and Domestic
Policy Making: The Case for More Sunshine, October 2000. http://www.fas.org/sgp/library/wyden.html
12

	Report of the Commission on Protecting and Reducing Government Secrecy, Sen Doc 105-2. 1997. http://
www.fas.org/sgp/library/moynihan/index.html
13

	GAO, Managing Sensitive Information: DOJ Needs a More Complete Staffing Strategy for Managing Classified Information and a Set of Internal Controls for Other Sensitive Information. GAO-07-83, October 2006;
GAO, Managing Sensitive Information: DOD Can More Effectively Reduce the Risk of Classification Errors,
GAO-06-706.
14

Too Many Secrets: Overclassification as a Barrier to Critical Information Sharing, Hearing before the Subcommittee on National Security, Emerging Threats and International Relations, August 24, 2004.
15

16

Secrecy News, Volume 2003, Issue No. 45, May 27, 2003.

	Executive Order 13292.

17

	Secrecy News, FAS Project on Government Secrecy. Volume 2004, Issue No. 42, May 5, 2004.

18

Government Secrecy: Decisions Without Democracy

41

	President John F. Kennedy Assassination Records Collection Act of 1992, PL 102-526.

19

Japanese Imperial Government Disclosure Act of 2000 December 6, 2000; Nazi War Crimes Disclosure Act.
PL 105-246.
20

	Final Report of the Kennedy Assassination Records Review Board, 1998.

21

	Bush Ordered Declassification, Official Says, NY Times, April 10, 2006.

22

	John Prados, “Declassifixation,” The New Republic, April 21, 2004.

23

24	

S. 2660.

U.S. House of Representatives, Permanent Select Committee on Intelligence, Oversight Plan for the 110th
Congress, February 7, 2007.
25	

	U.S. Reclassifies Many Documents in Secret Review, NY Times, February 21, 2006; National Security Archive,
Declassification in Reverse: The U.S. Intelligence Community’s Secret Historical Document Reclassification
Program, February 21, 2006, http://www.gwu.edu/~nsaarchiv/NSAEBB/NSAEBB179/index.htm
26

	Information Security Oversight Office, Audit of the Withdrawal of Records from Public Access at the National Archives and Records Administration for Classification Purposes, April 26, 2006. http://www.archives.
gov/isoo/reports/2006-audit-report.html
27

	Press Release National Archives Releases Second Declassified MOU, April 17, 2006.

28

	The National Defense Authorization Act for Fiscal Year 1999, Public Law 105-261.

29

	William Burr, How Many and Where Were the Nukes?”, National Security Archive Electronic Briefing Book
No. 197, August 18, 2006. http://www.gwu.edu/~nsaarchiv/NSAEBB/NSAEBB197/index.htm
30

	Title VII, FY 2001 Intelligence Authorization Act. It was amended in 2004 to hear appeals from Congressional committees on classification.
31

	U.S. v Reynolds, 245 US 1 (1953).

32

See Chesney, Robert, “State Secrets and the Limits of National Security Litigation”. George Washington Law
Review, 2007 Available at SSRN: http://ssrn.com/abstract=946676	
33

For a very detailed analysis, see Louis Fisher, In the Name of National Security: Unchecked Presidential
Power and the Reynolds Case, University Press of Kansas 2006.	
34

William G. Weaver and Robert M. Pallitto, State Secrets and Executive Power: Political Science Quarterly, Vol
120 No 1, 2005. p86.
35

Memo from WH Chief of Staff Andrew Card on Action to Safeguard Information Regarding Weapons of
Mass Destruction and Other Sensitive Documents Related to Homeland Security, March 19, 2002.	
36

CRS “sensitive but Unclassified” Information and Other Controls: Policy and Options for Scientific and Technical Information, November 4, 2006. p35.	
37

38

Ibid p58.	

39

Ibid p64.	

42

Government Secrecy: Decisions Without Democracy

Jason Program Office, MITRE, Horizontal Integration: Broader Access Models for Realizing Information
Dominance”, December 2004. p5. http://www.fas.org/irp/agency/dod/jason/classpol.pdf	
40

Government Accountability Office, Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information, GAO-06-385,
March 2006.
41

GAO, Managing Sensitive Information: DOJ Needs a More Complete Staffing Strategy for Managing Classified Information and a Set of Internal Controls for Other Sensitive Information. GAO-07-83, October 2006.
42

National Security Archive, Pseudo-Secrets: A Freedom of Information Audit of the U.S. Government’s
Policies on Sensitive Unclassified Information, March 2006. http://www.gwu.edu/~nsarchiv/NSAEBB/
NSAEBB183/press.htm	
43

CRS “Sensitive but Unclassified” Information and Other Controls: Policy and Options for Scientific and Technical Information, November 4, 2006.	
44

45

NSA report ibid p. 21.	

46

Steve Aftergood, The Secrets of Flight, Slate, Nov. 18, 2004.	

47

“No-Fly” Doesn’t Fly, GovExec.com, June 24, 2004.	

White House, Memorandum for the Heads of Executive Departments and Agencies: Guidelines and Requirements in Support of the Information Sharing Environment, December 16, 2005.	
48

49

CRS Ibid, p16.	

50

The Homeland Security Act of 2002, PL 107-296 s 892.

51

Department of Homeland Security Appropriations Act, 2007, PL 109-295, s. 525	

EPA Office of Inspector General, EPA’s Response to the World Trade Center Collapse: Challenges, Successes,
and Areas for Improvement, Report No. 2003-P-00012. http://www.epa.gov/oig/reports/2003/wtc/toc.htm
52

53

EPA, NYC Blamed for 9/11 Health Problems, AP, September 8, 2006.	

54

Death by Dust, The Village Voice, November 28, 2006.	

55

See Fisher p23.	

See GAO, Principles of Federal Appropriations Law: Third Edition: Volume I http://www.gao.gov/special.
pubs/3rdEditionVol1.pdf
56

57

U.S. Military Covertly Pays to Run Stories in Iraqi Press, Los Angeles Times, November 30, 2005.	

58

5 U.S.C. 552

	

Every state, the District of Columbia and most federal territories have their own FOIA laws. See The Reporters Committee for Freedom of the Press, Open Government Guide. http://www.rcfp.org/ogg/index.php
59

Attorney General’s October 12, 2001 Memorandum on the Freedom of Information Act. http://www.usdoj.
gov/oip/011012.htm	
60

Government Secrecy: Decisions Without Democracy

61

43

GAO, Information Management: Implementation of the Freedom of Information Act, May 11, 2005.	

S. 394, OPEN Government Act approved by the Senate Judiciary Committee Sept 21, 2006; S 589, Faster
FOIA Act of 2005, Approved by the Senate Judiciary Committee March 17, 2005, S. 1181, Approved by Senate June 24, 2005.
62

Executive Order 13,392, on improving Agency Disclosure of Information, December 15, 2005. http://www.
whitehouse.gov/omb/memoranda/fy2006/m06-04.pdf	
63

64

Letter from National Security Archive to Attorney General Gonzales, October 19, 2006.	

65

Secrecy News, Volume 2002, Issue No. 21, March 14, 2002.	

Mark J. Rozell, Executive Privilege Revived?: Secrecy and Conflict During the Bush Presidency, 52 Duke L. J.
403 (2002).	
66

67

US v. Nixon, 418 U.S. 563 (1974); Nixon v GSA, 433 U.S. 425 (1977).	

68

Public Law 95-591, codified at 44 U.S.C. 2201-2207	.

69

Executive Order 126.

Executive Order 13233 of November 1, 2001 Further Implementation of the Presidential Records Act.
http://www.fas.org/irp/offdocs/eo/eo-13233.htm	
70

71

See National Security Archive Page. http://www.gwu.edu/~nsarchiv/news/20040430/index.htm

72

Richmond Newspapers, Inc. v. Virginia, 448 U.S. 555 (1980).

Memorandum from Michael J. Creppy to Immigration Judges and Court Administrators on “Cases requiring special procedures”, Sept. 21, 2001. http://news.findlaw.com/hdocs/docs/aclu/creppy092101memo.pdf
73

Statement of Lily Fu Swenson Deputy Associate Attorney General Before the House Judiciary Subcommittee on Immigration, Border Security and Claims, Concerning Immigration Removal Procedures Implemented
in the Aftermath of the September 11th Attacks, June 30, 2005.	
74

75

Detroit Free Press v. Ashcroft 303 F.3d 681 (August 26, 2002).	

See The Memory Hole. Justice Department Censors Supreme Court Quote http://www.thememoryhole.
org/feds/justice_redaction.htm	
76

77

David Kirby, The Other Secret Bush Court?, The Huffington Post, Nov. 15, 2006. 	

78

Pickering v. Board of Education of Township High School District, 391 U.S. 563 (1968).

	Snepp v United States, 444 U.S. 507 (1980).

79

	Union of Concerned Scientists and Government Accountability Project, Atmosphere of Pressure: Political
Interference in Federal Climate Science, February 2007.
80

81

The New Gag Rules, Science 17 February 2006: Vol. 311. no. 5763, p. 917.

	New Publishing Rules Restrict Scientists, AP, December 2006.

82

	United States Department of State and the Broadcasting Board of Governors Office of Inspector General

83

44

Government Secrecy: Decisions Without Democracy

Report of Inspection U.S. Speaker and Specialist Program Review Bureau of International Information Programs, Report Number ISP-C-06-52, September 2006. http://oig.state.gov/documents/organization/75589.
pdf
	Yost, Guards Say Non-Disclosure Agreements Were Used to Hide Security Flaws at DHS, CQ Homeland
Security – Industry & Contracting, April 19, 2006.	
84

85

DHS Non-Disclosure Agreement. http://www.fas.org/sgp/othergov/dhs-nda.pdf

86

ibid. 82.	

87

5 USC 2302; PL 95-454, 101-12.

88	

Congressional Research Service, National Security Whistleblowers, December 30, 2005.	

General Accounting Office, U.S. Office of Special Council, Strategy for Reducing Persistent Backlog of Cases
Should be Provided to Congress GAO-04-36.	
89

Joint POGO, PEER, GAP letter to members of Congress regarding U.S. Special Counsel, Scott Bloch’s retaliation against employees, January 10, 2005. http://www.pogo.org/p/government/gl-050101-whistleblower.
html. See also PEER, Special Counsel Tags Interns to Close Out Whistleblower Cases; Staff Resignations Leave
Agency Short-Handed, March 9, 2005. http://www.commondreams.org/news2005/0309-07.htm
90

See Project on Government Oversight, Homeland and National Security Whistleblower Protections: The
Unfinished Agenda, April 28, 2005.	
91

92

ibid.88	

93

Garcetti v. Ceballos, No 04-473. May 30, 200689.

94

18 USC 793 et sec.

	Edgar and Schmidt, The Espionage Statutes and Publication of Defense Information, 73 Columbia L.R. 929
(1973).
95

	New York Times Co. v. United States, 403 U.S. 713, (1971).

96

	See FAS page on Selected Judicial Branch Documents on Secrecy, Security, Intelligence and Freedom of
Information for briefs and decisions on the case. http://www.fas.org/sgp/jud/index.html
97

	See e.g. Gabriel Schoenfeld, Has the New York Times Violated the Espionage Act? Commentary, March
2006.
98

99

Statement by the President, November 4, 2000.	

S. 3774. A bill to amend title 18, United States Code, to prohibit the unauthorized disclosure of classified
information; to the Committee on the Judiciary.	
100

Attorney General’s Task Force Report on Unauthorized Disclosures of Classified Information, October 15,
2002. Available at http://www.fas.org/sgp/othergov/dojleaks.html	
101

18 USC 641. See R. Robin McDonald, DEA Employee Gets Prison Term for Leaking to Reporter, Fulton
County Daily Report January 15, 2003; Dmitrieva, Stealing Information: Application of a Criminal Anti-Theft
Statute to Leaks of Confidential Government Information, 55 Florida Law Review, 1043 (2003).	
102

Government Secrecy: Decisions Without Democracy

45

(CRS, Journalists’ Privilege to Withhold Information in Judicial and Other Proceedings: State Shield Statutes, March 8, 2005. Available at http://www.fas.org/sgp/crs/secrecy/RL32806.pdf , Reporters Committee
for Freedom of the Press, The Reporter’s Privilege. http://www.rcfp.org/privilege/index.htm. It should also
be noted that the right of journalist’s confidentiality has been adopted in over 80 countries and has been
recognized by the European Court of Human Rights and the Organisation of American States.).	
103

104

Branzburg v. Hayes, 408 U.S. 665 (1972).	

RCFP, Special Report: Reporters and Federal Subpoenas As reporters facing contempt charges in a number of federal cases around the country, Congress is taking its first serious look at a reporter’s shield law in
decades. Current as of: 11/29/06 http://www.rcfp.org/shields_and_subpoenas.html 	
105

106

Pew Internet and American Life, How Americans Get in Touch with Government, May 24, 2004.	

107

E-Government Act of 2002, PL 107-347.

See OMB, Memorandum on Improving Public Access to and Dissemination of Government Information
and Using the Federal Enterprise Architecture Data Reference Model, December 16, 2005.	
108

109

Google seeks better access to government information, GovExec.com, October 25, 2006.

110

Government Printing Office Electronic Information Enhancement Act of 1993, PL 103-40.

111

Annual Report of the Librarian of Congress, 2004.

112

http://www.theopenhouseproject.com

113

http://www.readthebill.org

See CRS, The Federal Funding Accountability and Transparency Act: Background, overview and Implementation Issues, October 6, 2006.108.	
114

115

The International Budget Project, Open Budget Initiative 2006.	

116

For a detailed review of the legislation, see CRS, Ibid.	

GAO letter to OMB Director Joshua Bolten on Reliability of Federal Procurement Data, December 30, 2003.
http://www.gao.gov/new.items/d04295r.pdf. GAO letter to OMB Director Joshua Bolten on Improvements
Needed to the Federal Procurement Data System-Next Generation, Sept. 27, 2005. http://www.gao.gov/new.
items/d05960r.pdf	
117

Letter from 11 non-project groups to GSA, August 9, 2004. http://www.pogo.org/p/government/gl040801-foia.html
118

119

See the Right-to-Know-Network http://www.rtknet.org	

See Gary Bass and Sean Moulton, The Public’s Right to Know: A Case Study from the United States, in Calland and Tilley, The Right to Know, the Right to Live (ODAC, South Africa, 2002).
120

121

http://www.sec.gov/edgar.shtml	

US Securities and Exchange Commission, SEC Staff to Publicly Release Comment Letters and Responses,
June 24, 2004.	
122

123

Richard L Smith, The 1958 Automotive Information Disclosure Act: A Study of the Impact of Regulation,

46

Government Secrecy: Decisions Without Democracy

Jnl of Industrial Economics, June 1980.
	
124
Christopher Stern, FCC Cuts Public Line To Phone Outage Data, The Washington Post, August 28, 2004.
125

RFF paper. p3	

126

PL 107-116 (December 17, 2002).	

John M. De Figueiredo, E-Rulemaking: Bringing Data to Theory at the Federal Communications Commission, 55 Duke L. J. 969 (2006).	
127

See OMB Watch, Against the Public’s Will, December 2006. http://www.ombwatch.org/info/TRICommentsReport.pdf
128

129

Pew Internet and American Life Project, Internet penetration and impact, April 2006.	

130

Ibid, Pew report.	

131

CRS, Restructuring EPA’s Libraries: Background and Issues for Congress, January 3, 2007.	

132

Thomas Mann, What is Going on at the Library of Congress?, June 19, 2006.	

133

Bertot et al, Public Libraries and the Internet 2006: Study Result and Findings, September 2006.

See OMB Watch, Access to Government Information Post September 11th,http://www.ombwatch.org/article/articleview/213/1/1/; Reporters Committee for Freedom of the Press, Homefront Confidential: How the
War on Terrorism Affects Access to Information and the Public’s Right to Know.
134

Mapping the Risks: Assessing the Homeland Security Implications of Publicly Available Geospatial Information, Rand Corporation (2004). http:www.rand.org/pubs/monographs/2004/RAND_MG142.pdf	
135

136

Small Business, Miami Herald, Dec. 16, 2006.	

137

The Digital Ice Age, Popular Mechanics, November 21 2006.	

138

http://www.govtrack.us

139

http://www.opensecrets.org/travel/index.asp

140

http://www.fedspending.org

141

How planespotters turned into the scourge of the CIA, The Guardian, December 10, 2005.	

142

LA Times, A third incident, a new video, November 16, 2006.	

Government Secrecy: Decisions Without Democracy

47

Credits
Page 8, 24, 32
Dwane Powell Editorial Cartoon ©2005 Dwane Powell. Printed originally in the Raleigh NewsObserver. Reprinted with the permission of Dwane Powell and Creators Syndicate
 
Page 26
Frank and Ernest ©2005 Thaves. Used with the permission of the Thaves and the Cartoonist Group.
 
Page 23
Matt Wuerker Editorial Cartoon ©2006 Matt Wuerker. Used with the permission of Matt Wuerker and the
Cartoonist Group.
 
Page 10
Nick Anderson Editorial Cartoon ©2005 Nick Anderson. Published originally in the Louisville Courier-Journal. 
Used with the permission of Nick Anderson and the Washington Post Writers Group in conjunction with the
Cartoonist Group.
 
Page 17
Signe Wilkinson Editorial Cartoon ©2006 Signe Wilkinson. Published originally in the Philadelphia Daily
News. Used with the permission of Signe Wilkinson and the Washington Post Writers Group in conjunction
with the Cartoonist Group.