Next step for Wikileaks: Crowdsourcing classified data

U.S. condemns publication, but its response to breach is uncertain

WASHINGTON - The release on Sunday by Wikileaks of more than 90,000 documents about military operations in Afghanistan may just be the start of problems for the U.S. government.

The online publication of the documents, which offer an inside -- and potentially embarrassing -- look at the war in Afghanistan between 2004 and the end of 2009, represent a failure by the U.S. to control its classified data from insider threat. And it throws open to the whole world a chance to crowdsource the information the documents contain.

With that in mind, Wikileaks' Editor-In-Chief Julian Assange on Monday urged intrepid researchers to cull the documents for information that the group -- and three publications given access to them -- have yet to uncover. Assange said that Excel, one of the formats in which the material was released, might be the best way to sort through it.

During a news conference that was webcast, he even guided would-be researchers, saying they could use a search term such as "children" to parse the data for casualty reports.

When mining the documents for information, it's important search for something "quite broad...," he said. "Don't tell the data what your prejudices are, but rather let the data tell you what it is."

Now that the secret data has been made public, Assange said he expects academics, students and computer programmers to "come in and do a better job than we have with this presentation."

The release of the documents drew a sharp response from James Jones, President Obama's National Security Advisor. In a statement, Jones said that the U.S. "strongly condemns the disclosure of classified information by individuals and organizations which could put the lives of Americans and our partners at risk, and threaten our national security."

Assange defended the release for the unfiltered picture it provides of the horrors of war. "The real story of this material is that it's war - it's one damn thing after another," he said.

At one point today, Wikileaks had 23,000 concurrent users downloading the trove of documents. At times, the main site appeared inaccessible, but a separate site set up by Wikileaks, the Afghan War Diary , appeared to be a doing a little better at keeping up with demand.

For the U.S and its information security policy, the document leaking "is quite a big deal, because it illustrates the extraordinary asymmetric power that a leaker can have -- especially when aided by an outfit like Wikileaks," said Steven Aftergood, who heads up the Project on Government Secrecy at the Federation of American Scientists.

A number of scenarios could emerge from the leak, said Aftergood. Government officials might decide that the documents are of "no great threat to national security" and that agencies should be less inclined to mark a document secret. Or the leak could lead to "growing impatience" over the government's broad classification restrictions.

Conversely, federal agencies might decide to tighten information security controls even more. "That might mean enhanced security measures, it might mean more detailed audit trails to determine who has access to certain kinds of records, and [it could mean] intensified investigations of leaks," said Aftergood.

Another possibility is that the government maintains the status quo, in which more data is classified -- and more of it eventually leaks, said Aftergood.

Jeff Addicott, director of the Center for Terrorism Law at St. Mary's University in San Antonio, a center founded after 9/11, said the Wikileaks documents are part of a "propaganda war, and that's true in every war, but particularly in this war, because the media is watching almost every move that we make," he said.

The information is "going to be used by hostile forces to paint us as the aggressors," said Addicott.

The Wikileaks release has been compared to the release of the Pentagon Papers in 1970, when a secret review of the Vietnam War -- much of it at odds with what was publicly known about that conflict -- was published by the New York Times. North Vietnam "knew they couldn't defeat us on the battlefield, but their hope was that they could destroy the will of the American people to carry on the war, which they did," said Addicott.

The Obama administration probably hopes that this incident blows over quickly, but Addicott said that as the war drags on "these kinds of leaks are going to be even more devastating."

Jonathan Askin, associate professor of clinical law at the Brooklyn Law School, said sites such as Wikileaks, "that obliterate geo-political boundaries, should logically drive governments around the world to rethink the ways in which [they] control, conceal and distribute information.

"In the Internet-enabled digital world, information will find its way into the public arena, whether government likes it or not," said Askin. "Once governments recognize this inevitability, openness and transparency should logically become government's default approach to state information and national security.

Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is pthibodeau@computerworld.com .

Read more about security in Computerworld's Security Topic Center.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags governmentprivacywikileaksGovernment use of ITIT in Government

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Patrick Thibodeau

Computerworld (US)
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?