Secrecy is the practice of hiding information from certain individuals or groups who do not have the "need to know", perhaps while sharing it with other individuals. That which is kept hidden is known as the secret.
Secrecy is often controversial, depending on the content or nature of the secret, the group or people keeping the secret, and the motivation for secrecy.

Secrecy by government entities is often decried as excessive or in promotion of poor operation; excessive revelation of information on individuals can conflict with virtues of
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
and
confidentiality
Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information.
Legal confidentiality
By law, la ...
. It is often contrasted with
social transparency.
Secrecy can exist in a number of different ways: encoding or
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
(where mathematical and technical strategies are used to hide messages), true secrecy (where restrictions are put upon those who take part of the message, such as through
government security classification) and
obfuscation
Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent ...
, where secrets are hidden in plain sight behind complex idiosyncratic language (
jargon
Jargon, or technical language, is the specialized terminology associated with a particular field or area of activity. Jargon is normally employed in a particular Context (language use), communicative context and may not be well understood outside ...
) or
steganography.
Another classification proposed by
Claude Shannon
Claude Elwood Shannon (April 30, 1916 – February 24, 2001) was an American mathematician, electrical engineer, computer scientist, cryptographer and inventor known as the "father of information theory" and the man who laid the foundations of th ...
in 1948 reads that there are three systems of secrecy within communication:
# Concealment systems, including such methods as invisible ink, concealing a message in a harmless text in a fake covering cryptogram, or other methods in which the existence of the message is concealed from the enemy.
# Privacy systems, for example,
voice inversion
Voice inversion scrambling is an analog method of obscuring the content of a transmission. It is sometimes used in public service radio, automobile racing, cordless telephones and the Family Radio Service. Without a descrambler, the transmission ...
, is a special equipment required to recover the message.
# "True" secrecy systems where the meaning of the message is concealed by the cypher, code, etc. Although, its existence is not hidden. The enemy is assumed to have any special equipment necessary to intercept and record the transmitted signal.
Sociology
Animal
Animals are multicellular, eukaryotic organisms in the Biology, biological Kingdom (biology), kingdom Animalia (). With few exceptions, animals heterotroph, consume organic material, Cellular respiration#Aerobic respiration, breathe oxygen, ...
s conceal the location of their
den or
nest
A nest is a structure built for certain animals to hold Egg (biology), eggs or young. Although nests are most closely associated with birds, members of all classes of vertebrates and some invertebrates construct nests. They may be composed of ...
from
predators. Squirrels bury nuts, hiding them, and they try to remember their locations later.
Human
Humans (''Homo sapiens'') or modern humans are the most common and widespread species of primate, and the last surviving species of the genus ''Homo''. They are Hominidae, great apes characterized by their Prehistory of nakedness and clothing ...
s attempt to consciously conceal aspects of themselves from others due to
shame
Shame is an unpleasant self-conscious emotion often associated with negative self-evaluation; motivation to quit; and feelings of pain, exposure, distrust, powerlessness, and worthlessness.
Definition
Shame is a discrete, basic emotion, d ...
, or from
fear
Fear is an unpleasant emotion that arises in response to perception, perceived dangers or threats. Fear causes physiological and psychological changes. It may produce behavioral reactions such as mounting an aggressive response or fleeing the ...
of violence, rejection, harassment, loss of
acceptance
Acceptance in psychology is a person's recognition and assent to the finality of a situation without attempting to change or protest it. This plays out at both the individual and societal level as people experience change.
Types of acceptanc ...
, or loss of
employment
Employment is a relationship between two party (law), parties Regulation, regulating the provision of paid Labour (human activity), labour services. Usually based on a employment contract, contract, one party, the employer, which might be a cor ...
. Humans may also attempt to conceal aspects of their own
self
In philosophy, the self is an individual's own being, knowledge, and values, and the relationship between these attributes.
The first-person perspective distinguishes selfhood from personal identity. Whereas "identity" is (literally) same ...
which they are not capable of incorporating psychologically into their
conscious
Consciousness, at its simplest, is awareness of a state or object, either internal to oneself or in one's external environment. However, its nature has led to millennia of analyses, explanations, and debate among philosophers, scientists, a ...
being.
Families sometimes maintain "
family secret
A family secret can be defined as "events or information that members hide from each other or those outside the family." Family secrets can be shared by the whole family, by some family members or kept by an individual member of the family. Anecdo ...
s", obliging family members never to discuss disagreeable issues concerning the family with outsiders or sometimes even within the family. Many "family secrets" are maintained by using a mutually agreed-upon construct (an official family story) when speaking with outside members. Agreement to maintain the secret is often coerced through "shaming" and reference to family
honor
Honour ( Commonwealth English) or honor (American English; see spelling differences) is a quality of a person that is of both social teaching and personal ethos, that manifests itself as a code of conduct, and has various elements such as val ...
. The information may even be something as trivial as a
recipe
A recipe is a set of instructions that describes how to prepare or make something, especially a dish (food), dish of prepared food. A sub-recipe or subrecipe is a recipe for an ingredient that will be called for in the instructions for the main r ...
.

Secrets are sometimes kept to provide the pleasure of surprise. This includes keeping secret about a
surprise party, not telling
spoilers of a story, and avoiding
exposure of a magic trick.
Keeping one's
strategy
Strategy (from Greek στρατηγία ''stratēgia'', "troop leadership; office of general, command, generalship") is a general plan to achieve one or more long-term or overall goals under conditions of uncertainty. In the sense of the " a ...
''secret''– is important in many aspects of
game theory
Game theory is the study of mathematical models of strategic interactions. It has applications in many fields of social science, and is used extensively in economics, logic, systems science and computer science. Initially, game theory addressed ...
.
In
anthropology
Anthropology is the scientific study of humanity, concerned with human behavior, human biology, cultures, society, societies, and linguistics, in both the present and past, including archaic humans. Social anthropology studies patterns of behav ...
secret sharing is one way for people to establish traditional relations with other people. A commonly used narrative that describes this kind of behavior is
Joseph Conrad's short story "
The Secret Sharer".
Government
Government
A government is the system or group of people governing an organized community, generally a State (polity), state.
In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
s often attempt to conceal information from other governments and the public. These state secrets can include
weapon
A weapon, arm, or armament is any implement or device that is used to deter, threaten, inflict physical damage, harm, or kill. Weapons are used to increase the efficacy and efficiency of activities such as hunting, crime (e.g., murder), law ...
designs, military plans,
diplomatic negotiation
Negotiation is a dialogue between two or more parties to resolve points of difference, gain an advantage for an individual or Collective bargaining, collective, or craft outcomes to satisfy various interests. The parties aspire to agree on m ...
tactics, and secrets obtained illicitly from others ("
intelligence
Intelligence has been defined in many ways: the capacity for abstraction, logic, understanding, self-awareness, learning, emotional knowledge, reasoning, planning, creativity, critical thinking, and problem-solving. It can be described as t ...
"). Most nations have some form of
Official Secrets Act
An Official Secrets Act (OSA) is legislation that provides for the protection of Classified information, state secrets and official information, mainly related to national security. However, in its unrevised form (based on the UK Official Secret ...
(the
Espionage Act in the U.S.) and classify material according to the level of protection needed (hence the term "
classified information
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
"). An individual needs
security clearancefor access and other protection methods, such as keeping documents in a
safe, are stipulated.
Few people dispute the desirability of keeping
Critical Nuclear Weapon Design Information secret, but many believe government secrecy to be excessive and too often employed for political purposes. Many countries have laws that attempt to limit government secrecy, such as the U.S.
Freedom of Information Act and
sunshine law
Freedom of information laws allow access by the general public to data held by national governments and, where applicable, by state and local governments. The emergence of freedom of information legislation was a response to increasing dissatisf ...
s. Government officials sometimes
leak
A leak is a way (usually an opening) for fluid to escape a container or fluid-containing system, such as a Water tank, tank or a Ship, ship's Hull (watercraft), hull, through which the contents of the container can escape or outside matter can e ...
information they are supposed to keep secret. (''For a recent (2005) example, see
Plame affair.'')
Secrecy in elections is a growing issue, particularly secrecy of vote counts on computerized vote counting machines. While voting, citizens are acting in a unique sovereign or "owner" capacity (instead of being a subject of the laws, as is true outside of elections) in selecting their government servants. It is argued that secrecy is impermissible as against the public in the area of elections where the government gets all of its power and taxing authority. In any event, permissible secrecy varies significantly with the context involved.
Corporations
Organizations, ranging from multi-national for profit
corporation
A corporation or body corporate is an individual or a group of people, such as an association or company, that has been authorized by the State (polity), state to act as a single entity (a legal entity recognized by private and public law as ...
s to nonprofit
charities
A charitable organization or charity is an organization whose primary objectives are philanthropy and social well-being (e.g. educational, religious or other activities serving the public interest or common good).
The legal definition of a cha ...
, keep secrets fo
competitive advantage to meet legal requirements, or, in some cases, to conceal nefarious behavior. New products under development, unique manufacturing techniques, or simply lists of customers are types of information protected by
trade secret
A trade secret is a form of intellectual property (IP) comprising confidential information that is not generally known or readily ascertainable, derives economic value from its secrecy, and is protected by reasonable efforts to maintain its conf ...
laws.
Research on corporate secrecy has studied the factors supporting secret organizations. In particular, scholars in economics and management have paid attention to the way firms participating in cartels work together to maintain secrecy and conceal their activities from antitrust authorities. The diversity of the participants (in terms of age and size of the firms) influences their ability to coordinate to avoid being detected.
The
patent
A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling discl ...
system encourages inventors to publish information in exchange for a limited time
monopoly
A monopoly (from Greek language, Greek and ) is a market in which one person or company is the only supplier of a particular good or service. A monopoly is characterized by a lack of economic Competition (economics), competition to produce ...
on its use, though patent applications are initially secret.
Secret societies use secrecy as a way to attract members by creating a sense of importance.
Shell companies may be used to launder money from criminal activity, to finance terrorism, or to evade taxes. Registers of
beneficial ownership aim at fighting corporate secrecy in that sense.
Other laws ''require'' organizations to keep certain information secret, such as
medical record
The terms medical record, health record and medical chart are used somewhat interchangeably to describe the systematic documentation of a single patient's medical history and health care, care across time within one particular health care provide ...
s (
HIPAA in the U.S.), or
financial report
Financial statements (or financial reports) are formal records of the financial activities and position of a business, person, or other entity.
Relevant financial information is presented in a structured manner and in a form which is easy to un ...
s that are under preparation (to limit
insider trading
Insider trading is the trading of a public company's stock or other securities (such as bonds or stock options) based on material, nonpublic information about the company. In various countries, some kinds of trading based on insider informati ...
). Europe has particularly strict laws about
database
In computing, a database is an organized collection of data or a type of data store based on the use of a database management system (DBMS), the software that interacts with end users, applications, and the database itself to capture and a ...
privacy.
Computing

Preservation of secrets is one of the goals of
information security
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
. Techniques used include
physical security
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks). Physi ...
and
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
. The latter depends on the secrecy o
cryptographic keys Many believe that security technology can be more effective if it itself is not kept secret.
Information hidingis a design principle in much
software engineering
Software engineering is a branch of both computer science and engineering focused on designing, developing, testing, and maintaining Application software, software applications. It involves applying engineering design process, engineering principl ...
. It is considered easier to verify software reliability if one can be sure that different parts of the program can only access (and therefore depend on) a known limited amount of information.
Military

Military secrecy is the concealing of information about martial affairs that is purposely not made available to the general public and hence to any enemy, in order to gain an advantage or to not reveal a weakness, to avoid
embarrassment
Embarrassment or awkwardness is an emotional state that is associated with mild to severe levels of discomfort, and which is usually experienced when someone commits (or thinks of) a socially unacceptable or frowned-upon act that is witnessed ...
, or to help in
propaganda
Propaganda is communication that is primarily used to influence or persuade an audience to further an agenda, which may not be objective and may be selectively presenting facts to encourage a particular synthesis or perception, or using loaded l ...
efforts. Most military secrets are tactical in nature, such as the strengths and weaknesses of
weapon systems,
tactics
Tactic(s) or Tactical may refer to:
* Tactic (method), a conceptual action implemented as one or more specific tasks
** Military tactics, the disposition and maneuver of units on a particular sea or battlefield
** Chess tactics
In chess, a tac ...
, training methods, plans, and the number and location of specific weapons. Some secrets involve information in broader areas, such as secure communications,
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, intelligence operations, and cooperation with third parties.
US Government rights in regard to military secrecy were uphold in the
landmark legal case of ''
United States v. Reynolds'', decided by the
Supreme Court
In most legal jurisdictions, a supreme court, also known as a court of last resort, apex court, high (or final) court of appeal, and court of final appeal, is the highest court within the hierarchy of courts. Broadly speaking, the decisions of ...
in 1953.
Views
Excessive secrecy is often cited
as a source of much human conflict. One may have to
lie in order to hold a secret, which might lead to
psychological
Psychology is the scientific study of mind and behavior. Its subject matter includes the behavior of humans and nonhumans, both consciousness, conscious and Unconscious mind, unconscious phenomena, and mental processes such as thoughts, feel ...
repercussions. The alternative, declining to answer when asked something, may suggest the answer and may therefore not always be suitable for keeping a secret. Also, the other may insist that one answer the question.
Nearly 2500 years ago,
Sophocles
Sophocles ( 497/496 – winter 406/405 BC)Sommerstein (2002), p. 41. was an ancient Greek tragedian known as one of three from whom at least two plays have survived in full. His first plays were written later than, or contemporary with, those ...
wrote: 'Do nothing secretly; for Time sees and hears all things, and discloses all.'.
Gautama Siddhartha said: "Three things cannot long stay hidden: the
sun, the
moon
The Moon is Earth's only natural satellite. It Orbit of the Moon, orbits around Earth at Lunar distance, an average distance of (; about 30 times Earth diameter, Earth's diameter). The Moon rotation, rotates, with a rotation period (lunar ...
and the
truth
Truth or verity is the Property (philosophy), property of being in accord with fact or reality.Merriam-Webster's Online Dictionarytruth, 2005 In everyday language, it is typically ascribed to things that aim to represent reality or otherwise cor ...
.".
See also
*
Ambiguity
Ambiguity is the type of meaning (linguistics), meaning in which a phrase, statement, or resolution is not explicitly defined, making for several interpretations; others describe it as a concept or statement that has no real reference. A com ...
*
Banking secrecy
*
Black project
*
Clandestine cell system
*
Classified information
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or ...
*
Concealment device
*
Confidentiality
Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information.
Legal confidentiality
By law, la ...
*
Conspiracy theory
A conspiracy theory is an explanation for an event or situation that asserts the existence of a conspiracy (generally by powerful sinister groups, often political in motivation), when other explanations are more probable.Additional sources:
* ...
*
Covert operation
A covert operation or undercover operation is a military or police operation involving a covert agent or troops acting under an assumed cover to conceal the identity of the party responsible.
US law
Under US law, the Central Intelligence A ...
*
Cover-up
*
Deception
Deception is the act of convincing of one or many recipients of untrue information. The person creating the deception knows it to be false while the receiver of the information does not. It is often done for personal gain or advantage.
Tort of ...
*
Don't ask, don't tell
*
Espionage
Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
*
Freedom of information legislation
Freedom of information laws allow access by the general public to data held by national governments and, where applicable, by state and local governments. The emergence of freedom of information legislation was a response to increasing dissatis ...
*
Media transparency
*
Need to know
*
Open secret
*
Secrecy (sociology)
*
Secret passage
Secret passages, also commonly referred to as hidden passages or secret tunnels, are hidden routes used for stealthy travel, escape, or movement of people and goods. They are sometimes inside buildings leading to secret rooms.
Others allow pe ...
*
Secret sharing
Secret sharing (also called secret splitting) refers to methods for distributing a secrecy, secret among a group, in such a way that no individual holds any intelligible information about the secret, but when a sufficient number of individuals c ...
*
Self-concealment
*
Somebody Else's Problem
*
Smuggling
*
State Secrets Privilege
* ''
Sub rosa''
*
WikiLeaks
WikiLeaks () is a non-profit media organisation and publisher of leaked documents. It is funded by donations and media partnerships. It has published classified documents and other media provided by anonymous sources. It was founded in 2006 by ...
References
* *
*
*
*
*
*
*
*
*
*
*
*
*
::Also available as:
Preview.
Further reading
*
External links
An Open Source Collection of Readings on SecrecySecrecy Newsfrom the
Federation of American Scientists
{{Authority control
Classified information