Académique Documents
Professionnel Documents
Culture Documents
1
In
the
contemporary
U.S.
and
other
liberal
democracies
there
is
a
polarisation
between
ideals
of
transparency
–
borne
out
in
legislation,
freedom
of
information,
surveillance
and
confessionary
culture
–
and
what
we
might
call
a
secret
sphere,
an
institutionalised
commitment
to
covert
security
operations
that
exist
beyond
the
public
sphere.
This
module
will
consider
the
relationship
between
concealment
and
revelation
in
both
cultural
and
political
realms.
We
will
apply
sociological,
literary
and
philosophical
theories
about
the
secret
(and
related
concepts
such
as
privacy,
transparency,
the
public
sphere),
to
case
studies
and
cultural
texts.
In
terms
of
concealment,
we
may
consider
the
image
of
the
intelligence
services
in
visual
and
literary
culture,
the
U.S.
classification
system
and
practices
of
redaction,
the
secret
rituals
of
sororities
and
fraternities
at
U.S.
colleges,
the
occluding
tendencies
of
neoliberalism
(privatisation
and
outsourcing),
and
the
social
function
of
secret
societies
(from
the
KKK
to
the
Freemasons).
With
regard
to
different
forms
of
revelation,
we
will
analyse
the
modern
confessional
mode
as
evident
in
talk
shows,
reality
TV
and
blogs;
the
phenomenon
of
WikiLeaks
and
other
acts
of
virtual
transparency;
and
the
prevalence
of
conspiracy
theories
on
the
Internet.
By
looking
at
a
number
of
narrative
fictions
(literature,
television,
film,
graphic
novels)
alongside
historico-‐political
cases,
we
will
explore
Tim
Melley’s
proposition
that
such
fictions
afford
the
public
an
essential
opportunity
to
engage
with
and
fantasise
about
the
covert
state.
This
module
will
address
what
is
politically,
ethically,
socially
and
ontologically
at
stake
in
cultures
of
secrecy
at
the
personal,
national,
and
international
level.
2
Reading
You
will
need
a
copy
of
Thomas
Pynchon,
The
Crying
of
Lot
49;
and
a
copy
of
The
Circle
by
Dave
Eggers.
Please
allow
enough
time
to
read
these
novels.
Useful
Books
• Melley,
T.
(2012)
The
Covert
Sphere:
Secrecy,
Fiction
and
the
National
Security
State.
Cornell
University
Press.
• Barrett,
D.
V.
(1999)
Secret
Societies:
From
The
Ancient
And
Arcane
To
The
Modern
And
Clandestine,
Blandford
Press.
• Bok,
S.
(1989)
Secrets:
On
the
Ethics
of
Concealment
and
Revelation
Secrets,
Second
Edition,
London
and
New
York,
Vintage
Books.
• Goldman,
J.
&
S.
Maret,
(2011)
Government
Secrecy:
Vol.
19
of
Research
in
Social
Problems
and
Public
Policy,
Emerald
Group
Publishing.
• Goldman,
J.
&
S.
Maret,
(2009)
Government
Secrecy:
Classic
and
Contemporary
Readings,
Libraries
Unlimited.
• Dean,
J.
(2002)
Publicity's
Secret:
How
Technoculture
Capitalizes
on
Democracy,
Ithaca,
NY:
Cornell
University
Press.
• Fenster,
M.
(2008)
Conspiracy
Theories:
secrecy
and
power
in
American
culture,
Second
Edition,
Minneapolis:
University
of
Minnesota
Press.
• Finel,
Bernard
L.
&
Kristen
M.
Lord,
Power
and
Conflict
in
the
Age
of
Transparency
(London:
Palgrave
Macmillan,
2002).
• Packer,
J.
(2009)
Secret
Agents:
Popular
Icons
Beyond
James
Bond,
New
York:
Peter
Lang.
• Roberts,
A.
(2006)
Blacked
Out:
Government
Secrecy
in
the
Information
Age,
Cambridge:
Cambridge
University
Press.
• Simmel,
G.
(1906)
"The
Sociology
of
Secrecy
and
of
the
Secret
Societies,"
American
Journal
of
Sociology
11:
441-‐498.
• Taylor,
C.
(2009)
The
Culture
of
Confession
from
Augustine
to
Foucault:
A
Genealogy
of
the
'Confessing
Animal',
New
York
&
London:
Routledge.
• Tefft,
S.
(1980)
Secrecy:
A
Cross
Cultural
Perspective,
Human
Sciences
Press.
I
have
also
collated
a
number
of
online
readings
on
secrecy
and
transparency
at
the
following
web
address:
http://liquidbooks.pbworks.com/w/page/39188133/Transparency%20and%20Sec
recy
As
many
of
the
weekly
set
readings
as
possible
will
be
available
in
PDF
form
on
Keats.
Please
download
and
print
for
your
use.
We
will
often
refer
to
readings
in
seminars
so
please
have
them
handy
in
digital
form
or
hard
copy.
Screenings
You
are
required
to
watch
two
films
for
this
course:
both
of
them
are
in
the
Maugham
Library.
3
COURSE
STRUCTURE
1:
Course
Introduction
2:
The
Social
Functions
of
Secrecy
3:
State
Secrecy
4:
The
Covert
Sphere
and
Mediated
Spies
5:
Codebreaking:
The
Crying
of
Lot
49
6:
READING
WEEK
7:
Aesthetics
of
Secrecy
8:
Transparency,
Whistleblowing
and
WikiLeaks
9:
The
Politics
of
Privacy
and
Transparency:
The
Circle
10:
Popular
Disclosure:
Conspiracy
Theory,
Gossip,
Scandal
11:
Secrecy
Beyond
Borders
Preparation
Each
week
will
specify
a
number
of
set
readings
that
will
be
available
in
digital
form
on
Keats.
These
readings
are
compulsory.
Whilst
reading,
you
should
make
notes
about
how
each
text
fits
into
1)
that
week’s
theme;
and
2)
the
wider
questions
we
are
asking.
You
should
come
to
the
seminar
having
things
to
say
about
the
texts
you
have
read.
You
will
be
assigned
a
week
to
present
on
a
secondary
reading.
You
may
choose
any
of
the
readings
from
the
Further
Reading
to
introduce
and
summarise.
You
should
make
links
between
the
further
reading
and
set
reading
and
draw
on
real-‐world
or
cultural
examples
to
illustrate
your
reading.
Several
weeks
require
you
to
attend
a
screening.
See
the
week
by
week
course
outline
and
make
a
note
in
your
diary.
Some
weeks
require
you
to
research
a
particular
cultural
phenomenon
before
the
seminar.
See
the
week
by
week
course
outline
for
details.
Assessment
You
will
need
to
choose
a
topic
you
wish
to
write
on
and
propose
an
essay
title.
You
can
only
proceed
with
an
essay
title/question
once
it
has
been
agreed
by
me.
You
are
welcome
to
discuss
ideas
about
your
essays
with
me
during
my
office
hours
or
by
appointment.
I
cannot,
however,
look
at
or
edit
first
drafts
of
essays
–
this
has
to
be
your
own
work
that
emerges
out
of
seminar
discussions,
independent
thought
and
research,
and
a
tutorial
with
me
if
requested.
4
Material
on
Keats
Keats
is
the
name
of
an
electronic
facility
on
one
of
the
university’s
servers.
You
will
all
have
an
account
of
the
on
the
university’s
computing
system.
All
PowerPoint
slides
used
in
seminars,
a
copy
of
this
course
booklet,
electronic
copies
of
readings
and
useful
links
will
be
posted
on
Keats.
You
should
login
to
Keats
regularly
to
check
if
there
is
anything
new
there
for
you.
You
can
use
the
discussion
forum
to
tell
your
fellow
students
about
relevant
events
or
to
simply
continue
the
discussion.
I
will
use
the
Keats
‘News’
facility
to
contact
you
during
the
course,
so
you
must
check
your
university
mail
regularly.
5
6
Luhrmann,
T.
M.
(1989).
The
Magic
of
Secrecy.
Ethos,
17
(2)
June,
131-‐165.
Available
on
Scribd:
http://www.scribd.com/doc/36145485/The-‐Magic-‐of-‐Secrecy
Bellman,
B.
(1984).
The
Language
of
Secrecy.
New
Brunswick,
NJ:
Rutgers
University
Press.
Gable,
Eric.
(1997).
A
Secret
Shared:
Fieldwork
and
the
Sinister
in
a
West
African
Village.
Cultural
Anthropology,
12
(2)
May,
213-‐233.
Piot,
C.D.
(1993)
Secrecy,
Ambiguity,
and
the
Everyday
in
Kabre
Culture.
American
Anthropologist,
95
(2)
June,
353-‐370.
Child
Development
Peskin,
J.
(1992)
Ruse
and
Representations:
On
Children’s
Ability
to
Conceal
Information.
Developmental
Psychology
28,
84-‐9
Pipe,
M.E.
and
Goodman,
G.S.
(1991)
Elements
of
Secrecy:
Implications
for
Children’s
Testimony.
Behavioral
Sciences
and
the
Law,
9,
33-‐41.
Organisation
Studies
Scott,
S.
(2013)
Anonymous
Agencies,
Backstreet
Businesses
and
Covert
Collectives:
Rethinking
Organizations
in
the
21st
Century,
Stanford
University
Press.
Further
Reading
Maret,
S.
(2011)
Introduction,
Goldman,
J.
&
S.
Maret,
(eds)
Government
Secrecy:
Vol.
19
of
Research
in
Social
Problems
and
Public
Policy,
Emerald
Group
Publishing.
pp.xi-‐xxx.
Bok,
S.
(1984)
Secrets
of
State.
Secrets:
On
the
Ethics
of
Concealment
and
Revelation.
Oxford
University
Press.
pp.171-‐190.
Rappert,
B.
(2012)
How
to
Look
Good
in
a
War.
London:
Pluto.
Roberts,
A.S
(2006)
Blacked
Out:
Government
Secrecy
in
the
Information
Age.
New
York:
Cambridge
University
Press.
7
E.
Horn,
‘Knowing
the
Enemy:
The
Epistemology
of
Secret
Intelligence,’
Grey
Room
11
(Spring
2003):
58-‐85.
Blanton,
T.
(2003)
National
Security
and
Open
Government
in
the
United
States:
Beyond
the
Balancing
Test.
In
Roberts,
A.
&
Darbishire,
H.
(eds.)
National
Security
and
Open
Government:
Striking
the
Right
Balance.
Syracuse:
Campbell
Public
Affairs
Institute.
pp.31-‐
71
Moynihan,
P.
(2000)
Secrecy:
The
American
Experience,
Yale
University
Press.
Horn,
E.
(2011)
Logics
of
Political
Secrecy.
Theory,
Culture
&
Society,
28
(7/8),
103-‐122.
Maret,
S.
(ed.)
Government
Secrecy.
Research
in
Social
Problems
and
Public
Policy
19.
Emerald.
Maret,
S.
&
Goldman,
J.
(2009)
Government
Secrecy:
Classic
and
Contemporary
Readings.
Westport,
CT.
Libraries
Unlimited.
Davis,
C.N.
&
Splichal,
S.L.
(2000)
Access
Denied:
Freedom
of
Information
in
the
Information
Age.
Ames:
Iowa
State
University
Press.
Galnoor,
I.
(1975)
Government
Secrecy:
Exchanges,
Intermediaries,
and
Middlemen.
Public
Administration
Review,
35
(1),
32-‐42.
Robertson,
K.G.
(1982)
Public
Secrets:
a
Study
in
the
Development
of
Government
Secrecy.
London:
St.
Martin's
Press.
Priest,
D.
and
Arkin,
W.M.
(2011)
Top
Secret
America:
The
Rise
of
the
New
American
Security
State.
New
York:
Little,
Brown.
Aftergood,
S.
(2010)
National
Security
Secrecy:
How
the
Limits
Change.
Social
Research,
77
(3),
pp.839-‐852.
Paglen,
T.
(2009)
B la n k
sp o ts
o n
th e
m a p
-‐
th e
d a r k
g e o g r a p h y
o f
th e
p e n ta g o n 's
se c r e t
w o r ld .
Dutton
Adult.
9
Week
6
READING
WEEK
–
NO
seminar
this
week
Key
Texts
• Lee,
P.M.
(2011)
‘Open
Secret:
On
the
Work
of
Art
Between
Disclosure
and
Redaction’,
Artforum
May.
URL
http://www.jillmagid.net/pdf/JIMA-‐
Artforum_0511.pdf
• Gustafsson,
H.
(2013)
‘Foresight,
Hindsight
and
State
Secrecy
in
the
American
West:
The
Geopolitical
Aesthetics
of
Trevor
Paglen’,
Journal
of
Visual
Culture
12(1):
148-‐
164.
Further Reading/Listening
• Beck,
J.
(2011)
‘Photography
as
Double
Agent,’
Theory
Culture
and
Society
28
(7-‐8)
December:
123-‐139.
• Blas,
Z.
(2014)
‘Informatic
Opacity’,
The
Journal
of
Aesthetics
and
Politics
http://www.joaap.org/issue9/zachblas.htm
• Loock,
U.
(2013)
‘Opacity,’
Frieze
d/e.
http://frieze-‐
magazin.de/archiv/features/opazitaet/?lang=en
• Jill
Magid
at
The
Modern
Art
Museum
in
Fort
Worth,
https://itunes.apple.com/gb/podcast/tuesday-‐evening-‐at-‐
modern/id318956683?i=111565516&mt=2
• Jill
Magid
at
the
Tate,
https://itunes.apple.com/gb/podcast/exhibition-‐jill-‐magid-‐
authority/id497703772?i=109887293&mt=2
• Trevor
Paglen,
Spark,
https://itunes.apple.com/gb/podcast/trevor-‐paglen-‐
photographer/id404285019?i=93918736&mt=2
• Weiner,
J.
(2012)
‘Prying
Eyes:
Trevor
Paglen
makes
art
out
of
government
secrets,’
The
New
Yorker,
October
22:
54-‐61.
• GERRITY,
J.
(2009)
‘Secret
Agency:
Jill
Magid
at
Yvon
Lambert’,
Rhizome,
Oct
15.
http://rhizome.org/editorial/2009/oct/15/secret-‐agency/
• Mirzeoff,
N.
(2011)
‘The
Right
to
Look’,
Critical
Inquiry,
Vol.
37,
No.
3
(Spring
2011),
pp.
473-‐496
http://nicholasmirzoeff.com/RTL/wp-‐content/uploads/2011/06/RTL-‐
from-‐CI.pdf
• Paglen,
T.
(2010)
Invisible:
Covert
Operations
and
Classified
Landscapes,
Aperture.
• Magid,
J.
(2010)
Becoming
Tarden,
New
Museum
of
Contemporary
Art.
10
Week
8:
The
Politics
of
Privacy
and
Transparency:
The
Circle
For
this
seminar,
you
should
read
The
Circle
by
Dave
Eggers.
Through
this
novel,
we
will
discuss
the
concepts
of
privacy
and
transparency
and
Eggers’
critique
of
them.
Key
Texts
Eggers,
D.
(2013)
The
Circle,
Hamish
Hamilton.
Further
Reading
Cohen,
J.
(2013)
The
Private
Life.
London:
Granta.
Nippert-‐Eng,
C.E.
(2010)
Introduction.
Islands
of
Privacy.
Chicago:
University
of
Chicago
Press.
pp.
1-‐18.
Fairfield,
P.
(2005)
Negotiating
a
Distinction.
Public/Private.
Lanham:
Rowman
and
Littlefield.
pp.
1-‐34.
Agre,
P.
E.
(1994)
‘Surveillance
and
Capture:
Two
Models
of
Privacy,’
Information
Society
10(2),
April
-‐
June:
101
-‐
127.
Fairfield,
P.
(2005)
Political
Philosophy
in
the
Bedroom.
Public/Private.
Lanham:
Rowman
and
Littlefield.
pp.
65-‐99.
Pateman,
C.
(1993).
Feminist
Critiques
of
the
Public/Private
Dichotomy.
In
Public
and
Private
in
Social
Life,
edited
by
S.I.
Benn
and
G.
F.
Gauss.
London:
Croom
Helm.
Arendt,
H.
(1958).
The
Human
Condition.
Chicago:
University
of
Chicago
Press.
Habermas,
J.
(1991)
The
Structural
Transformation
of
the
Public
Sphere:
an
Inquiry
into
a
Category
of
Bourgeois
Society.
Cambridge:
MIT
Press.
Warren,
C.
&
Laslett,
B.
(1980)
Privacy
and
Secrecy:
A
Conceptual
Comparison.
In
Tefft,
S.K.
(ed.)
Secrecy:
A
Cross-‐Cultural
Perspective,
Human
Sciences
Press.
pp.25-‐34.
Morton,
H.
(1982)
The
History
of
the
Public/Private
Distinction.
University
of
Pennsylvania
Law
Review,
130,
1423-‐1428.
Mills,
J.
L.
(2008).
Privacy:
The
Lost
Right.
New
York:
Oxford
University
Press.
Privacy
and
Digital
Culture
Brin,
D.
(1998)
The
Transparent
Society:
Will
Technology
Force
Us
to
Choose
Between
Privacy
and
Freedom?
New
York:
Basic
Books.
Boyd,
D.
(2010)
Making
Sense
of
Privacy
and
Publicity.
SXSW.
Austin,
Texas,
March
13.
Available
at:
http://www.danah.org/papers/talks/2010/SXSW2010.html
You
can
also
watch
a
Youtube
of
this
talk
at
http://www.youtube.com/watch?v=daqq5_xMjIo
Debatin,
B.
et
al.
(2009)
Facebook
and
Online
Privacy:
Attitudes,
Behaviors,
and
Unintended
Consequences.
Journal
of
Computer-‐Mediated
Communication,
15
(1),
83-‐108.
Available
http://onlinelibrary.wiley.com/doi/10.1111/j.1083-‐6101.2009.01494.x/full
(See
Week
9’s
reading
list
for
sources
on
transparency.)
12
Collins,
C.
(2007)
Seeing
Through
the
Dogma
of
‘Transparency’.
Spiked,
7,
November,
http://www.spiked-‐online.com/index.php/site/reviewofbooks_article/4135/
Garsten,
C.
and
M.L.
Montoya
(2008)
Introduction.
Transparency
in
a
New
Global
Order:Unveiling
Organizational
Visions.
Cheltenham:
Edward
Elgar.
Birchall,
C.
(2011)
“There’s
been
too
much
secrecy
in
this
city”:
The
false
choice
between
secrecy
and
transparency
in
US
politics.
Cultural
Politics,
7
(1),
133-‐56.
Birchall,
C.
(2011)
The
Politics
of
Opacity
and
Openness.
Theory,
Culture
&
Society,
28
(7-‐8),
1-‐19.
Birkinshaw,
P.
(2006)
Transparency
as
a
Human
Right.
In
C.
Hood
&
D.
Heald
(Eds.)
Transparency:
The
Key
to
Better
Governance?
Oxford:
Oxford
University
Press.
Fung,
A.,
Graham,
M.
&
Weil,
D.
(2007).
Full
disclosure:
The
perils
and
promise
of
transparency.
Cambridge:
Cambridge
University
Press.
Strathern,
M.
(2000).
The
Tyranny
of
Transparency.
British
Educational
Research
Journal,
26
(3),
310.
Boyd,
D.
(2010)
Transparency
Is
Not
Enough.
Gov2.0
Expo.
Washington
DC,
May
26.
http://www.danah.org/papers/talks/2010/Gov2Expo.html
ALSO
ON
YOUTUBE:
http://www.youtube.com/watch?v=1nNgXBIMass
Florini,A.
(ed.)
(2007)
The
Right
to
Know:
Transparency
for
an
Open
World.
New
York:
Columbia
University
Press.
Graham,
M.
(2002)
Democracy
by
Disclosure:
the
Rise
of
Technopopulism.
Washington:
Brookings
Institution
Press.
Hood,
C.
(2006)
Transparency
in
Historical
Perspective.
In
C.
Hood
and
D.
Heald
(eds)
Transparency:
The
Key
to
Better
Governance?
Oxford:
Oxford
University
Press.
pp.
3-‐23
Fenster,
M.
(2010)
Seeing
the
State:
Transparency
as
Metaphor.
Administrative
Law
Review,
62
(3),
617-‐72.
Lathrop,
D.
and
L.
Ruma
(eds)
(2010)
Open
Government:
Collaboration,
Transparency,
and
Participation
in
Practice.
Sebastopol,
CA:
O’Reilly
Media.
Schmitt,
M.
(2010)
Transparency
for
What?
The
American
Prospect,
15
February,
URL:
http://www.prospect.org/cs/articles?article=transparency_for_what
Lessig,
L.
(2009)
Against
Transparency.
The
New
Republic,
October
9.
http://www.tnr.com/print/article/books-‐and-‐arts/against-‐transparency
13
Key
Texts
• West,
H.
&
Sanders,
T.
(eds.)
(2003)
Power
Revealed
and
Concealed
in
the
New
World
Order.
Transparency
and
Conspiracy:
Ethnographies
of
Suspicion
in
the
New
World
Order.
Durham
&
London:
Duke
University
Press.
pp.
1-‐37.
• Comaroff,
J.
&
Comaroff,
J.
(2003)
Transparent
Fictions;
or
The
Conspiracies
of
a
Liberal
Imagination:
An
Afterward.
In
West,
H.
&
Sanders,
T.
(eds.)
Transparency
and
Conspiracy:
Ethnographies
of
Suspicion
in
the
New
World
Order.
Durham
&
London:
Duke
University
Press.
pp.
287-‐299.
Further
Reading
Gossip
Bok,
S.
(1984)
Gossip.
Secrets:
On
the
Ethics
of
Concealment
and
Revelation.
Oxford
University
Press,
1984.
pp.
89-‐101.
Turner,
P.
(1993).
I
Heard
it
Through
the
Grapevine:
Rumor
in
African-‐American
Culture.
Berkeley,
CA:
University
of
California
University
Press.
Spacks,
P.
(1985).
Gossip.
Chicago
and
London:
University
of
Chicago
Press.
R.
F.
Goodman
and
A.
Ben-‐Ze’ev
(Eds.),
Good
Gossip
(pp.
139-‐153).
Kansas:
University
of
Kansas
Press.
Conspiracy
Theories
Olmsted,
K.S.
(2011)
Government
Secrecy
and
Conspiracy
Theories.
In
Maret,
S.
(ed.)
Government
Secrecy.
Research
in
Social
Problems
and
Public
Policy
19.
Emerald.
pp.91-‐100.
Sunstein,
C.
&
Vermuele,
A.
(2008).
Conspiracy
Theories.
University
of
Chicago
Law
School
Public
Law
&
Legal
Theory
Research
Paper
Series,
Paper
No.
199.
URL:
http://ssrn.com/abstract=1084585
Birchall,
C.
(2006)
Knowledge
Goes
Pop:
From
Conspiracy
Theory
to
Gossip.
Oxford:
Berg.
Melley,
T.
(2000)
Empire
of
Conspiracy.
New
York:
Cornell
University
Press.
Knight,
P.
(2000)
Conspiracy
Culture:
From
Kennedy
to
the
X-‐Files.
London
and
New
York:
Routledge.
Wheen,
F.
(2004)
How
Mumbo-‐jumbo
Conquered
the
World.
London,
Fourth
Estate.
Scandal
Adut,
A.
(2008).
On
scandal.
Cambridge:
Cambridge
University
Press.
Lull,
J.
&
Hinerman,
S.
(Eds)
(1997)
Media
Scandals:
Morality
and
Desire
in
the
Popular
Market
Place.
Cambridge:
Polity
Press.
Week
11:
Secrecy
Now:
Us,
the
U.S.,
and
the
World
This
will
be
our
final
session
and
the
one
where
we
try
to
bring
together
all
of
the
different
strands
of
the
course.
To
do
so,
we
will
look
inwards
and
outwards.
In
other
words,
we
will
both
take
a
self-‐reflexive
approach
to
secrecy
to
ask
how
academic
work
and
cultural
analysis
itself
resembles
the
revelation
of
textual
secrets;
and
also,
think
about
the
role
of
secrets
and
secrecy
in
an
increasingly
globalised
world
which
relies
on
standards
of
transparency.
What
is
at
stake,
academically,
personally,
nationally
and
globally,
when
we
invest
in
secrets?
14
Key
Texts
• Roberts,
A.S
(2006)
Blacked
Out:
Government
Secrecy
in
the
Information
Age.
New
York:
Cambridge
University
Press.
pp.
231-‐238.
• Ahmed,
S.
(2010)
Secrets
and
Silence
in
Feminist
Research.
In
Ryan-‐Flood,
R.
&
Gill,
R.
Secrecy
and
Silence
in
the
Research
Process;
Feminist
Reflections.
London:
Routledge.
pp.
xvi-‐xxi.
15