[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register] 

Status: Not Logged In; Sign In

The Doctor is In the House [Two and a half hours early?]

Trump Walks Into Gun Store & The Owner Says This... His Reaction Gets Everyone Talking!

Here’s How Explosive—and Short-Lived—Silver Spikes Have Been

This Popeyes Fired All the Blacks And Hired ALL Latinos

‘He’s setting us up’: Jewish leaders express alarm at Trump’s blaming Jews if he loses

Asia Not Nearly Gay Enough Yet, CNN Laments

Undecided Black Voters In Georgia Deliver Brutal Responses on Harris (VIDEO)

Biden-Harris Admin Sued For Records On Trans Surgeries On Minors

Rasmussen Poll Numbers: Kamala's 'Bounce' Didn't Faze Trump

Trump BREAKS Internet With Hysterical Ad TORCHING Kamala | 'She is For They/Them!'

45 Funny Cybertruck Memes So Good, Even Elon Might Crack A Smile

Possible Trump Rally Attack - Serious Injuries Reported

BULLETIN: ISRAEL IS ENTERING **** UKRAINE **** WAR ! Missile Defenses in Kiev !

ATF TO USE 2ND TRUMP ATTACK TO JUSTIFY NEW GUN CONTROL...

An EMP Attack on the U.S. Power Grids and Critical National Infrastructure

New York Residents Beg Trump to Come Back, Solve Out-of-Control Illegal Immigration

Chicago Teachers Confess They Were told to Give Illegals Passing Grades

Am I Racist? Reviewed by a BLACK MAN

Ukraine and Israel Following the Same Playbook, But Uncle Sam Doesn't Want to Play

"The Diddy indictment is PROTECTING the highest people in power" Ian Carroll

The White House just held its first cabinet meeting in almost a year. Guess who was running it.

The Democrats' War On America, Part One: What "Saving Our Democracy" Really Means

New York's MTA Proposes $65.4 Billion In Upgrades With Cash It Doesn't Have

More than 100 killed or missing as Sinaloa Cartel war rages in Mexico

New York state reports 1st human case of EEE in nearly a decade

Oktoberfest tightens security after a deadly knife attack in western Germany

Wild Walrus Just Wanted to Take A Summer Vacation Across Europe

[Video] 'Days of democracy are GONE' seethes Neil Oliver as 'JAIL' awaits Brits DARING to speak up

Police robot dodges a bullet, teargasses a man, and pins him to the ground during a standoff in Texas

Julian Assange EXPOSED


Science/Tech
See other Science/Tech Articles

Title: t's a WikiLeaks World, Get Used to It
Source: [None]
URL Source: http://www.cato.org/pub_display.php?pub_id=12035
Published: Aug 7, 2010
Author: Jim Harper
Post Date: 2010-08-07 10:20:21 by Ada
Keywords: None
Views: 22

No matter where right or wrong lie in the posting of classified military reports on WikiLeaks.org, one lesson should be clear: This is how it's going to be. Technology will continue to undercut secrecy — not just in the military, but in all large organizations.

Government and corporate leaders who aren't ahead of this problem may already have trouble on their hands they don't know about.

When 90,000 pages of documents chronicling the Afghan war went online last week, their potential effects on military planning and security caused the White House to strongly condemn their posting as "irresponsible." Differing more than slightly, Salon commentator Glenn Greenwald praised WikiLeaks.org as "one of the most valuable and important organizations in the world."

Technology will continue to undercut secrecy — not just in the military, but in all large organizations.

While there is universal agreement that over-classification in the U.S. government is a problem, leaking government documents isn't a good way to fix it. Nevertheless, a pair of related technology trends will continue to push this "fix" in a disorderly way if it's not solved methodically.

Technology: First, individuals today have tremendous power to collect, transmit and process information. Average people have hand-held computers and phones, huge-capacity flash memory thumb drives, and so on. The tech-savvy have even more powerful information devices, familiarity with encryption, and anonymization tools. We have overcome the natural conditions that made easy-to-censor hand-written letters a minimal threat to "operational security" in World War II.

Culture: Cultural trends are coming into play as well. Military service-members today live in a culture of information sharing that might baffle their senior officers. They expect to be in touch with the outside world during their tours. Their service is long and difficult enough without quarantining them in a communications bubble for protracted periods. Indeed, doing so would undermine military effectiveness by cutting deeply into the morale of young men and women whose stateside lives are "always connected." This is the generation that knows the value and power of sharing information.

So what's to be done?

Doubling down on information security is an option, but there are better approaches than to hunker in the secrecy corner.

As Admiral Greer said in Tom Clancy's The Hunt for Red October: "The likelihood of a secret being blown is proportional to the square of the number of people who're in on it." It's a converse of Metcalfe's law, which describes the increase in value of a network as the number of participants grows.

Computer security has wisdom to share with national security and military security — indeed, with any organization that relies too heavily on secrecy: "You're doing it wrong." Secrecy should be treated as a weakness, to be avoided whenever possible.

Since at least the Vietnam-era controversy over the accuracy of U.S. government "body counts," it's been getting harder to control military information, and the difficulty will only increase. Secrecy is sometimes necessary, and propaganda is a legitimate dimension of war, but as technology and tools of transparency make their way even to remote battlefields, secrecy and propaganda that are at odds with the evidence on the ground will necessarily be less effective.

Jim Harper is director of information policy studies at the Cato Institute. More by Jim Harper

Organizations of any size should examine what information they have that is not publicly available, and how they would be harmed by its release.

Ultimately, the U.S. military and all organizations, government and corporate, should begin to plan strategy and tactics so that they don't rely on controlling information — at least not for long after it originates.

Information technology is a strong and growing adversary, and it is better to turn its strengths to one's advantage than to waste resources trying to fight against it.

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register]