[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

If Trump Cared About Israel, He would Stop the Genocide

Why do you think Henry Ford was such a hardcore Antisemite?

In Case you miss Bad Journalism

Bobby K Jr was Exiled For Saying This:

Quantum Meets AI: Morgan Stanley Maps Out Next Tech Frontier

670,000+ Swept Away as Dams Burst in Canton China, Triggering Deadly Flood!

Senate Version Of Trump Tax Bill Adds $3.3 Trillion To Deficit, $500BN More Than The House; Debt Ceiling Raised By $5 Trillion

Iran Disables GPS, Joins China’s Beidou — The End of U.S. Satellite Dominance?

Ukraine's Withdrawal From Anti-Personnel Landmine Treaty Could Haunt Generations

71 killed in Israeli attack on Iran's Evin Prison

Practice Small, Daily Acts Of Sabotage Against The Imperial Machine

"EVERYONE'S BEEN SHOT UP HERE": Arsonists Set Wildfire In Northern Idaho, Open Fire On Firefighters, Police In Ambush

Trump has Putin trapped, and the Kremlin knows it

Kamala's comeback bid sparks Democrat donor meltdown amid fears she'll sink party in California

Russia's New Grom-A1 100 KM Range Guided Bomb- 600 Kilo

UKRAINIAN CONSULATE IN ITALY CAUGHT TRAFFICKING WEAPONS, ORGANS & CHILDREN WITH THE MAFIA

Andrew Cuomo to stay on ballot for NYC mayor in November general election

The life of the half-immortal who advised CCP (End of CCP in 2026?)

Millions Flee China’s Top Cities

Violence begets violence: IDF troops beaten, choked, rammed by Jewish settlers in West Bank

Netanyahu Says It's Antisemitic For Israeli Soldiers To Describe Their Own Atrocities

China's Economy Spirals With No End In Sight, Says Kyle Bass

American Bread Cannot Be Sold in Most Countries

Woman Spent Her Life To Prove 796 Babies were buried under Catholic Home

Japan Got Rich Without Getting Fat

US Spent $495.3 million to fire 39 THAAD Missiles

Private Mail Back Online

Senior Israeli officials tell Israeli media that they intend to attack Iran after ceasefire.

Palestinian Woman Nails Israeli

Tucker Carlson: Marjorie Taylor Greene:


Science/Tech
See other Science/Tech Articles

Title: t's a WikiLeaks World, Get Used to It
Source: [None]
URL Source: http://www.cato.org/pub_display.php?pub_id=12035
Published: Aug 7, 2010
Author: Jim Harper
Post Date: 2010-08-07 10:20:21 by Ada
Keywords: None
Views: 24

No matter where right or wrong lie in the posting of classified military reports on WikiLeaks.org, one lesson should be clear: This is how it's going to be. Technology will continue to undercut secrecy — not just in the military, but in all large organizations.

Government and corporate leaders who aren't ahead of this problem may already have trouble on their hands they don't know about.

When 90,000 pages of documents chronicling the Afghan war went online last week, their potential effects on military planning and security caused the White House to strongly condemn their posting as "irresponsible." Differing more than slightly, Salon commentator Glenn Greenwald praised WikiLeaks.org as "one of the most valuable and important organizations in the world."

Technology will continue to undercut secrecy — not just in the military, but in all large organizations.

While there is universal agreement that over-classification in the U.S. government is a problem, leaking government documents isn't a good way to fix it. Nevertheless, a pair of related technology trends will continue to push this "fix" in a disorderly way if it's not solved methodically.

Technology: First, individuals today have tremendous power to collect, transmit and process information. Average people have hand-held computers and phones, huge-capacity flash memory thumb drives, and so on. The tech-savvy have even more powerful information devices, familiarity with encryption, and anonymization tools. We have overcome the natural conditions that made easy-to-censor hand-written letters a minimal threat to "operational security" in World War II.

Culture: Cultural trends are coming into play as well. Military service-members today live in a culture of information sharing that might baffle their senior officers. They expect to be in touch with the outside world during their tours. Their service is long and difficult enough without quarantining them in a communications bubble for protracted periods. Indeed, doing so would undermine military effectiveness by cutting deeply into the morale of young men and women whose stateside lives are "always connected." This is the generation that knows the value and power of sharing information.

So what's to be done?

Doubling down on information security is an option, but there are better approaches than to hunker in the secrecy corner.

As Admiral Greer said in Tom Clancy's The Hunt for Red October: "The likelihood of a secret being blown is proportional to the square of the number of people who're in on it." It's a converse of Metcalfe's law, which describes the increase in value of a network as the number of participants grows.

Computer security has wisdom to share with national security and military security — indeed, with any organization that relies too heavily on secrecy: "You're doing it wrong." Secrecy should be treated as a weakness, to be avoided whenever possible.

Since at least the Vietnam-era controversy over the accuracy of U.S. government "body counts," it's been getting harder to control military information, and the difficulty will only increase. Secrecy is sometimes necessary, and propaganda is a legitimate dimension of war, but as technology and tools of transparency make their way even to remote battlefields, secrecy and propaganda that are at odds with the evidence on the ground will necessarily be less effective.

Jim Harper is director of information policy studies at the Cato Institute. More by Jim Harper

Organizations of any size should examine what information they have that is not publicly available, and how they would be harmed by its release.

Ultimately, the U.S. military and all organizations, government and corporate, should begin to plan strategy and tactics so that they don't rely on controlling information — at least not for long after it originates.

Information technology is a strong and growing adversary, and it is better to turn its strengths to one's advantage than to waste resources trying to fight against it.

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]