PDA

View Full Version : Open Source Analysis of WikiLeaks?



BobKing
08-10-2010, 03:43 PM
What is the status of open source analytical products derived from purportedly classified sources? Specifically, many institutions and individuals are now publishing reports sourced from the WikiLeaks data sets.

Examples:

The Guardian, in the UK, published some interactive media on their Afghanistan: The War Logs (http://www.guardian.co.uk/world/datablog/interactive/2010/jul/26/ied-afghanistan-war-logs) page.

Wired Magazine's Danger Room recently published Open Source Tools Turn Afghanistan Into Illustrated Afghan Meltdown (http://www.wired.com/dangerroom/2010/08/open-source-wikileaked-docs-illustrated-afghan-meltdown/) showing how researches have produced graphical representations from the data sets.

In another article last week Danger Room wrote about this in Pentagon to Troops: Taliban Can Read WikLeaks, You Can't (http://www.wired.com/dangerroom/2010/08/pentagon-to-troops-taliban-can-read-wikileaks-you-cant/).

Would any warnings regarding WikiLeaks, as referenced in the last article, extend to products that may have resulted from that source?

Some of these products look to be very interesting and perhaps worthy of discussion. Could an instructor at (West Point, Naval Academy, Naval War College, and so on) pull up either of the first two links in the classroom to jump start a discussion? Could that instructor download the product?

Van
08-10-2010, 06:38 PM
Leaked classified material is still classified.

Reflect on the consequences of your actions, preferably before you act.

Download WikiLeaks materials onto a government UNCLAS computer, and that computer, media, drive is now classified at the level of the material. If you work for the government or a company with government contracts, think long and hard before poking around the leaked material.

This having been said, I'm still interested in accounts of this stuff that show up in the news.

BobKing
08-10-2010, 08:10 PM
Van

My root question remains - what does it mean specifically when you write "Download WikiLeaks materials...?"

If someone downloads the Flash presentation from the Guardian's site, is that "WikiLeaks materials?"

If someone saves the image in the Danger Room article (linked below) is that "WikiLeaks materials?"
REF: http://www.wired.com/images_blogs/dangerroom/2010/08/events_by_label_map.jpg

This is more than an academic question.

Vignette

The Danger Room blog writes the article linked in my original post.

Blogger A references that article, writing a post about the degrading situation in Afghanistan and "hot links" to the image or blatantly copies it without giving any credit. In his article he does not source anything and makes no reference to WikiLeaks.

Reader B (or Instructor B) finds Blogger A's post and saves it to his PC - what is the status of the image? If answers to previous questions were "Yes, it is still WikiLeaks material" - how was Reader B to have known that?

For the record, I have not, and will not, go to the WikiLeaks site from my work computer, nor would I download anything to my home computer.

jmm99
08-10-2010, 11:16 PM
but here is a thread, Efing Wikileaks (http://council.smallwarsjournal.com/showthread.php?t=6467&highlight=aipac), dealing with a 2008 Wikileak; and my post, Belated response to Cavguy post # 8 (http://council.smallwarsjournal.com/showpost.php?p=62930&postcount=21), with links to several resources.

BLUF: The issues become murkier as we go down the chain of transmission, which could involve a number of people before it reaches the Web or media outlets. The possibility of using a conspiracy charge against others in the chain becomes less likely the further removed from the original source.

The current reality is illustrated in this thread, The AIPAC Case - Redux (http://council.smallwarsjournal.com/showthread.php?p=75909&highlight=aipac#post75909), where the extensive pleadings - leading to a dismissal of charges - are at FAS, USA v. Steven Rosen and Keith Weissman ("The AIPAC Case"): Selected Case Files (http://www.fas.org/sgp/jud/aipac/index.html).

The AIPAC case was heavily politicized; but, that element aside, it does exemplify the difficulties in prosecuting downstream classified leakage under current law.

Of course, Van is correct: "Leaked classified material is still classified." - and, if you're an employee of the government or of a company with government contracts, you could get into a republication bind by DLing and then passing on the data.

At this point, specific legal advice (from JMM) ends. Everyone else feel free to pontificate to your hearts' content.

Regards

Mike

Pete
08-11-2010, 03:11 AM
... you could get into a republication bind by DLing and then passing on the data.
What pray tell does the GOP have to do with it?

Van
08-11-2010, 04:06 AM
My personal rule of thumb is to get no closer to the compromised material than articles published in reputable, established news media (BBC, AFP, Reuters, etc; NOT blogs or organizational news postings like a corporate or academic press page).

This allows for a reasonable degree of situational awareness without getting too close to the flashing red lights. I'll admit that I might be over-cautious, but I've had some real "Margaret" type security managers over the years (from Dennis the Menace; "I'm tellin' my mom!").

The case of the Guardian's Flash presentation... I've met some security managers who would try to suspend access for that. Thankfully, they had bosses who were better endowed with common sense and perspective. Caveat lector.

Re: you linking to a naughty site -
I'd approach with caution. I think I'd be reluctant to post "THIS WAY TO CLASSIFIED DOCUMENTS, but at your own risk"; it falls under the whole "avoid even the appearence of misconduct" standard.

If you're dead set on linking to, or reposted any of the compromised material, I strongly urge you to discuss your ideas with an attorney before you do it. (Consultations without court appearances tend to be much cheaper.)

AmericanPride
08-11-2010, 03:19 PM
This whole episode reminds me of the contoversy surrounding the music industry's (failed) attempts to stop pirated music on the internet through litigation. This problem is going to persist in the digital age. Legitimate or not, that Iraq-deployed MI soldier had grievances about the war effort. That tells me somewhere in the chain of command between his immediate supervisor and the President, there is serious miscommunication about the justifications and methods of the war. It also tells me that the government and the Army need to improve how they sell what they do, not only to the population, but also to the people working for them. The MI soldier was a specialist, but he had access to thousands of documents. Either the government needs to ensure that its personnel are politically reliable, or it needs to embark on policies with greater concensus in the ranks and the population. In the arguments about domestic surveillance, proponents sometimes state that if you are not breaking the law, you have nothing to worry about. If our cause is just, and our people and soldiers believe in it, then what do we have to worry about?

BayonetBrant
08-11-2010, 06:19 PM
Either the government needs to ensure that its personnel are politically reliable

I sure you didn't mean for this to sound quite so... soviet. But it does. :o

AmericanPride
08-31-2010, 02:51 PM
I sure you didn't mean for this to sound quite so... soviet. But it does. :o

Yes, I did intend for it to sound that way. Usually (but not always), the military is employed towards some political end. If we are to maintain a reliable, all-volunteer military force to achieve the occasionally controversial political objective, then either the reliability of the volunteers needs to be a criteria for their selection, or more effort needs to be made to find consensus among the volunteers. During the Revolutionary War, unpaid volunteers simply walked off the job. Now, disgruntled volunteers can compromise national security to a surprising scope and depth. The problem isn't the soldier, his access to information, or even the fact that he released classified material to the public. The problem is that we have yet to reconcile the all-volunteer military concept (and the unique accompanying characteristic of American culture to glorify and hero-worship military service) with the increasingly expeditionary character of our military operations.

Steve Blair
08-31-2010, 09:36 PM
Yes, I did intend for it to sound that way. Usually (but not always), the military is employed towards some political end. If we are to maintain a reliable, all-volunteer military force to achieve the occasionally controversial political objective, then either the reliability of the volunteers needs to be a criteria for their selection, or more effort needs to be made to find consensus among the volunteers. During the Revolutionary War, unpaid volunteers simply walked off the job. Now, disgruntled volunteers can compromise national security to a surprising scope and depth. The problem isn't the soldier, his access to information, or even the fact that he released classified material to the public. The problem is that we have yet to reconcile the all-volunteer military concept (and the unique accompanying characteristic of American culture to glorify and hero-worship military service) with the increasingly expeditionary character of our military operations.

The glorification is actually quite recent (say after 1940 or so), and I honestly don't think you'd find a draftee force any more reliable under your criteria.

AmericanPride
09-01-2010, 04:42 AM
The glorification is actually quite recent (say after 1940 or so), and I honestly don't think you'd find a draftee force any more reliable under your criteria.

The issue isn't the all-volunteer concept itself, but the employment of a glorified all-volunteer military used in an expeditionary manner for the occasional controversial political objective. The Iraq leak could not reconcile the two, and decided to expose what he thought to be criminal and immoral behavior. Soldiers are encouraged, after all, to act with integrity and personal courage, and the Army's own values led him in that direction. There is a cognitive dissonance at the core of this issue. One solution is to screen volunteers for their political reliability.

Steve Blair
09-01-2010, 01:55 PM
The issue isn't the all-volunteer concept itself, but the employment of a glorified all-volunteer military used in an expeditionary manner for the occasional controversial political objective. The Iraq leak could not reconcile the two, and decided to expose what he thought to be criminal and immoral behavior. Soldiers are encouraged, after all, to act with integrity and personal courage, and the Army's own values led him in that direction. There is a cognitive dissonance at the core of this issue. One solution is to screen volunteers for their political reliability.

And again, if you look back, we've been here before with an all-volunteer force. You're focusing on the wrong issue. It's not so much political reliability as it is saturation of information combined with over-classification.

Ken White
09-01-2010, 04:49 PM
And again, if you look back, we've been here before with an all-volunteer force. You're focusing on the wrong issue. It's not so much political reliability as it is saturation of information combined with over-classification.Not to mention there is no way to 'enforce' political reliability. None. You can't even screen for it in hiring as many people will change in strange ways as they grow older...

Jeremy White
09-10-2010, 05:45 PM
As a graduate student my particular area of study is military propaganda and I am very interested in viewing some of the reports that Wikileaks has reportedly published. However, when on the site I click on links such as this one claiming to be a 2006 overview of Taliban Propaganda in Helmand Province (http://wardiary.wikileaks.org/afg/event/2006/12/AFG20061231n274.html). However, the site instructs me to "see attachment" but as far as I can tell there is no attachment. Can anyone help me figure this out?

Also, in case any academics are interested, I checked with the IRB board for approval to use wikileaks as a source and they responded that until the U.S. military comes out and says that anything in the Afghan War Diaries isnt true that we should consider it to be a legit source.

jmm99
09-10-2010, 08:55 PM
I'm looking at the webpage as I write - and see a database "card" and below it a photo map. The photo map can't be the "attachment" to the 31 Dec 2006 report, since the photo map is labeled: "Imagery (c) 2010 ..."

So, my guess is that the "See Attachment" ref. is to an attachment to the "card" that Wikileaks either does not have or did not link.

Welcome to the forum

Mike

Rex Brynen
09-11-2010, 04:08 PM
Also, in case any academics are interested, I checked with the IRB board for approval to use wikileaks as a source and they responded that until the U.S. military comes out and says that anything in the Afghan War Diaries isnt true that we should consider it to be a legit source.

If so, your IRB gave you a rather odd reply since they ought not to be in the business of determining the veracity of data sources, but rather the ethics of using them.

As I see it (and I serve as chair of a Research Ethics Board), the issues are as follows:

1) Since Wikileaks neither obtained informed consent from individuals named in the data nor (in most cases) redacted their names, you need to be extremely careful in using any data that could possibly identify an individual.

2) Paradoxical as it seems, even though the data is in the public domain it remains classified, and disseminating it further might be technically illegal. If you ever hoped to gain a security clearance, or if you have one that you wish to maintain, you may wish to keep this in mind.

3) In discussing use or interpretation of the Wikileaks data with others who hold current security clearances, you could potentially put their future clearances and hence employment at risk. Your informed consent procedure ought to assure that they are aware of this.

To be honest, #2 and #3 are rather remote and abstract possibilities. On the other hand #1 is a major concern to which your IRB ought to have alerted you.