Quick Study

By Brian Robinson

Blog archive

Could WikiLeaks story put a damper on battlefield intell?

Most of the reaction to the dumping of classified Afghan war documents at the WikiLeaks whistleblower Web site has so far focused on the broader damage the release might cause to the U.S. in that fight. But might the affair also impact the future ability of frontline troops to do their job?

A story published in MIT’s Technology Review implies that it could. The story said the WikiLeaks data dump was made possible by recent efforts in the military to deliver the freshest possible intelligence to frontline fighters. A probable restriction on the distribution of that material in the future could throttle the flow of potentially lifesaving information to those soldiers.

Technology Review links this to a clampdown on information flowing across DOD’s Secret IP Router Network (SIPRNet), which carries secret information and was presumably where Bradley Manning, the Army private and intelligence analyst who has been charged with an earlier release of documents to WikiLeaks and could be implicated in the latest Afghan affair, got much of that data.

The problem for the military is not only that up-to-date intelligence is becoming more vital for warfighters, particularly in the urban environments they are now fighting in, but it’s central to the way the military intends to use technology to fight wars in the future. Army Chief Information Officer Lt. Gen. Jeffrey Sorenson says the Army is “net-dependent” in carrying out its mission, and Air Force CIO Lt. Gen. William Lord says the network is crucial to making up for the reduced size of future armed forces.

The recent WikiLeaks debacle poses a big problem for DOD. The point of the network is to get good information to the warfighter as quickly as possible, while keeping the data as secure as possible. You could keep it secure by strictly limiting access to data, but what does that do to its availability?

Another Technology Review piece suggests that the bird has already flown when it comes to putting a lid on leaks. Maybe the focus should be more on tracking down leakers and prosecuting them, leaving the data to flow to where it will do the most good. Maybe we also need a rethink what secret and secure really means these days.

Posted on Aug 06, 2010 at 12:20 PM


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.