Next step for Wikileaks: Crowdsourcing classified data

U.S. condemns publication, but its response to breach is uncertain

WASHINGTON - The release on Sunday by Wikileaks of more than 90,000 documents about military operations in Afghanistan may just be the start of problems for the U.S. government.

The online publication of the documents, which offer an inside -- and potentially embarrassing -- look at the war in Afghanistan between 2004 and the end of 2009, represent a failure by the U.S. to control its classified data from insider threat. And it throws open to the whole world a chance to crowdsource the information the documents contain.

With that in mind, Wikileaks' Editor-In-Chief Julian Assange on Monday urged intrepid researchers to cull the documents for information that the group -- and three publications given access to them -- have yet to uncover. Assange said that Excel, one of the formats in which the material was released, might be the best way to sort through it.

During a news conference that was webcast, he even guided would-be researchers, saying they could use a search term such as "children" to parse the data for casualty reports.

When mining the documents for information, it's important search for something "quite broad...," he said. "Don't tell the data what your prejudices are, but rather let the data tell you what it is."

Now that the secret data has been made public, Assange said he expects academics, students and computer programmers to "come in and do a better job than we have with this presentation."

The release of the documents drew a sharp response from James Jones, President Obama's National Security Advisor. In a statement, Jones said that the U.S. "strongly condemns the disclosure of classified information by individuals and organizations which could put the lives of Americans and our partners at risk, and threaten our national security."

Assange defended the release for the unfiltered picture it provides of the horrors of war. "The real story of this material is that it's war - it's one damn thing after another," he said.

At one point today, Wikileaks had 23,000 concurrent users downloading the trove of documents. At times, the main site appeared inaccessible, but a separate site set up by Wikileaks, the Afghan War Diary , appeared to be a doing a little better at keeping up with demand.

For the U.S and its information security policy, the document leaking "is quite a big deal, because it illustrates the extraordinary asymmetric power that a leaker can have -- especially when aided by an outfit like Wikileaks," said Steven Aftergood, who heads up the Project on Government Secrecy at the Federation of American Scientists.

A number of scenarios could emerge from the leak, said Aftergood. Government officials might decide that the documents are of "no great threat to national security" and that agencies should be less inclined to mark a document secret. Or the leak could lead to "growing impatience" over the government's broad classification restrictions.

Conversely, federal agencies might decide to tighten information security controls even more. "That might mean enhanced security measures, it might mean more detailed audit trails to determine who has access to certain kinds of records, and [it could mean] intensified investigations of leaks," said Aftergood.

Another possibility is that the government maintains the status quo, in which more data is classified -- and more of it eventually leaks, said Aftergood.

Jeff Addicott, director of the Center for Terrorism Law at St. Mary's University in San Antonio, a center founded after 9/11, said the Wikileaks documents are part of a "propaganda war, and that's true in every war, but particularly in this war, because the media is watching almost every move that we make," he said.

The information is "going to be used by hostile forces to paint us as the aggressors," said Addicott.

The Wikileaks release has been compared to the release of the Pentagon Papers in 1970, when a secret review of the Vietnam War -- much of it at odds with what was publicly known about that conflict -- was published by the New York Times. North Vietnam "knew they couldn't defeat us on the battlefield, but their hope was that they could destroy the will of the American people to carry on the war, which they did," said Addicott.

The Obama administration probably hopes that this incident blows over quickly, but Addicott said that as the war drags on "these kinds of leaks are going to be even more devastating."

Jonathan Askin, associate professor of clinical law at the Brooklyn Law School, said sites such as Wikileaks, "that obliterate geo-political boundaries, should logically drive governments around the world to rethink the ways in which [they] control, conceal and distribute information.

"In the Internet-enabled digital world, information will find its way into the public arena, whether government likes it or not," said Askin. "Once governments recognize this inevitability, openness and transparency should logically become government's default approach to state information and national security.

Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is pthibodeau@computerworld.com .

Read more about security in Computerworld's Security Topic Center.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Government use of ITsecurityIT in Governmentwikileaksgovernmentprivacy

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Patrick Thibodeau

Computerworld (US)
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?