Drowning in a Sea of Faux Secrets: Policies on Handling of Classified and Sensitive Information : Hearing Before the Subcommittee on National Security, Emerging Threats, and International Relations of the Committee on Government Reform, House of Representatives, One Hundred Ninth Congress, Second Session, March 14, 2006, Volume 4, Part 83

Front Cover

From inside the book

Other editions - View all

Common terms and phrases

Popular passages

Page 80 - This document contains neither recommendations nor conclusions of the FBI. It is the property of the FBI and is loaned to your agency; it and its contents are not to be distributed outside your agency.
Page 166 - Federal function; (4) the term "sensitive information" means any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of...
Page 192 - The Honorable Christopher Shays Chairman, Subcommittee on National Security, Emerging Threats, and International Relations Committee on Government Reform House of Representatives Dear Mr.
Page 253 - Our democratic principles require that the American people be informed of the activities of their Government. Also, our Nation's progress depends on the free flow of information. Nevertheless, throughout our history, the national...
Page 265 - Testimony Before the Subcommittee on National Security, Emerging Threats, and International Relations, Committee on Government Reform, House of Representatives...
Page 145 - As we noted in our briefings for you, al Qida is not some narrow, little terrorist issue that needs to be included in broader regional policy. Rather, several of our regional policies need to address centrally the transnational challenge to the US and our interests posed by the al Qida network.
Page 298 - The informing function of Congress should be preferred even to its legislative function. The argument is not only that discussed and interrogated administration is the only pure and efficient administration, but, more than that, that the only really self-governing people is that people which discusses and interrogates its administration.
Page 153 - Current security requirements nurture overclassification and excessive compartmentation of information among agencies. Each agency's incentive structure opposes sharing, with risks (criminal, civil, and internal administrative sanctions) but few rewards for sharing information. No one has to pay the long-term costs of overclassifying information, though these costs — even in literal financial terms — are substantial.

Bibliographic information