[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

Scientists unlock 30-year mystery: Rare micronutrient holds key to brain health and cancer defense

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today

In Britain, they are secretly preparing for mass deaths

These Are The Best And Worst Countries For Work (US Last Place)-Life Balance

These Are The World's Most Powerful Cars

Doctor: Trump has 6 to 8 Months TO LIVE?!

Whatever Happened to Robert E. Lee's 7 Children

Is the Wailing Wall Actually a Roman Fort?

Israelis Persecute Americans

Israelis SHOCKED The World Hates Them

Ghost Dancers and Democracy: Tucker Carlson

Amalek (Enemies of Israel) 100,000 Views on Bitchute

ICE agents pull screaming illegal immigrant influencer from car after resisting arrest

Aaron Lewis on Being Blacklisted & Why Record Labels Promote Terrible Music

Connecticut Democratic Party Holds Presser To Cry About Libs of TikTok

Trump wants concealed carry in DC.

Chinese 108m Steel Bridge Collapses in 3s, 16 Workers Fall 130m into Yellow River

COVID-19 mRNA-Induced TURBO CANCERS.

Think Tank Urges Dems To Drop These 45 Terms That Turn Off Normies

Man attempts to carjack a New Yorker

Test post re: IRS

How Managers Are Using AI To Hire And Fire People

Israel's Biggest US Donor Now Owns CBS

14 Million Illegals Entered US in 2023: The Cost to Our Nation

American Taxpayers to Cover $3.5 Billion Pentagon Bill for U.S. Munitions Used Defending Israel

The Great Jonny Quest Documentary

This story About IRS Abuse Did Not Post

CDC Data Exposes Surge in Deaths Among Children of Covid-Vaxxed Mothers


Science/Tech
See other Science/Tech Articles

Title: t's a WikiLeaks World, Get Used to It
Source: [None]
URL Source: http://www.cato.org/pub_display.php?pub_id=12035
Published: Aug 7, 2010
Author: Jim Harper
Post Date: 2010-08-07 10:20:21 by Ada
Keywords: None
Views: 26

No matter where right or wrong lie in the posting of classified military reports on WikiLeaks.org, one lesson should be clear: This is how it's going to be. Technology will continue to undercut secrecy — not just in the military, but in all large organizations.

Government and corporate leaders who aren't ahead of this problem may already have trouble on their hands they don't know about.

When 90,000 pages of documents chronicling the Afghan war went online last week, their potential effects on military planning and security caused the White House to strongly condemn their posting as "irresponsible." Differing more than slightly, Salon commentator Glenn Greenwald praised WikiLeaks.org as "one of the most valuable and important organizations in the world."

Technology will continue to undercut secrecy — not just in the military, but in all large organizations.

While there is universal agreement that over-classification in the U.S. government is a problem, leaking government documents isn't a good way to fix it. Nevertheless, a pair of related technology trends will continue to push this "fix" in a disorderly way if it's not solved methodically.

Technology: First, individuals today have tremendous power to collect, transmit and process information. Average people have hand-held computers and phones, huge-capacity flash memory thumb drives, and so on. The tech-savvy have even more powerful information devices, familiarity with encryption, and anonymization tools. We have overcome the natural conditions that made easy-to-censor hand-written letters a minimal threat to "operational security" in World War II.

Culture: Cultural trends are coming into play as well. Military service-members today live in a culture of information sharing that might baffle their senior officers. They expect to be in touch with the outside world during their tours. Their service is long and difficult enough without quarantining them in a communications bubble for protracted periods. Indeed, doing so would undermine military effectiveness by cutting deeply into the morale of young men and women whose stateside lives are "always connected." This is the generation that knows the value and power of sharing information.

So what's to be done?

Doubling down on information security is an option, but there are better approaches than to hunker in the secrecy corner.

As Admiral Greer said in Tom Clancy's The Hunt for Red October: "The likelihood of a secret being blown is proportional to the square of the number of people who're in on it." It's a converse of Metcalfe's law, which describes the increase in value of a network as the number of participants grows.

Computer security has wisdom to share with national security and military security — indeed, with any organization that relies too heavily on secrecy: "You're doing it wrong." Secrecy should be treated as a weakness, to be avoided whenever possible.

Since at least the Vietnam-era controversy over the accuracy of U.S. government "body counts," it's been getting harder to control military information, and the difficulty will only increase. Secrecy is sometimes necessary, and propaganda is a legitimate dimension of war, but as technology and tools of transparency make their way even to remote battlefields, secrecy and propaganda that are at odds with the evidence on the ground will necessarily be less effective.

Jim Harper is director of information policy studies at the Cato Institute. More by Jim Harper

Organizations of any size should examine what information they have that is not publicly available, and how they would be harmed by its release.

Ultimately, the U.S. military and all organizations, government and corporate, should begin to plan strategy and tactics so that they don't rely on controlling information — at least not for long after it originates.

Information technology is a strong and growing adversary, and it is better to turn its strengths to one's advantage than to waste resources trying to fight against it.

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]