Page 1 of 2 12 LastLast
Results 1 to 20 of 25

Thread: Efing Wikileaks

  1. #1
    Small Wars Journal SWJED's Avatar
    Join Date
    Sep 2005
    Location
    Largo, Florida
    Posts
    3,989

    Default Efing Wikileaks

    Via Ex at Abu Muqawama - Noah at Wired's Danger Room - Wikileaks Posts Secret Bomb-Stopper Report — Did It Go Too Far?.

    In July, 2005, I asked a member of a Baghdad-based military bomb squad about the radio-frequency jammers his team was using to cut off signals to Iraq's remotely detonated explosives. His response: "I can't even begin to say the first ####ing thing about 'em." A few days later, one of those jammers seemed to save me and him from getting blown up. Months after that, David Axe was thrown out of Iraq by the U.S. military, for a blog post which mentioned the Warlock family of jammers.

    So I was more than a little surprised, when I saw that Wikileaks had posted a classified report, outlining how the Warlock Red and Warlock Green jammers work with — and interfere with — military communications systems. The report, dated 2004, gives specific information about how the jammers function, their radiated power and which frequencies they stop. That Baghdad bomb tech would've put his fist through a wall, if he saw it out in public...

  2. #2
    Council Member
    Join Date
    Oct 2007
    Posts
    1,444

    Default

    I am extremely encouraged that Aftergood of FAS did not approve of this. At least there is some sanity coming from the other side of the fence on this issue. In any case, I agree with most of the comments in the article and at Muqawama's site - this is very dated information of little to no value. In that regard, I am confident that friends of mine are in no more danger than they were before.

    On the other hand, I don't understand how people get away with this crap. Classified information is not for the public domain and I have received a fair amount of briefings that warned me about possible jail time if I were to do something like this. Why do the powers that be seem to ignore this stuff? Is it simply because the information (in this case) is harmless? This seems like a pretty straightforward case of breaking the law. I am reminded of the drug legalization thread where there was discussion about soft drugs as a "gateway" to hard drugs. Likewise, it seems that stealing FOUO is a gateway to stealing Secret, which is a gateway to stealing Secret with various caveats, and so on.

  3. #3
    Council Member Fuchs's Avatar
    Join Date
    May 2008
    Posts
    3,189

    Default

    There's in big letters written "UNCLASSIFIED" in the document.


    It could be disinformation anyway.

  4. #4
    Small Wars Journal SWJED's Avatar
    Join Date
    Sep 2005
    Location
    Largo, Florida
    Posts
    3,989

    Default

    Quote Originally Posted by Fuchs View Post
    There's in big letters written "UNCLASSIFIED" in the document.


    It could be disinformation anyway.
    The overall classification of the document - in big bold letters - is:

    SECRET//REL TO USA, AUS, CAN, GBR, AND NZL//X1
    You were most likely looking at either the individual page or paragraph markings.

  5. #5
    Council Member
    Join Date
    Oct 2007
    Posts
    1,444

    Default

    Quote Originally Posted by Fuchs View Post
    There's in big letters written "UNCLASSIFIED" in the document.
    What document are you referring to? This one, linked to in the Wikileaks article, is classified "SECRET//REL TO USA, AUS, CAN, GBR, AND NZL//X1"

  6. #6
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default He saw the blank pages and those with no

    classified data that were marked 'UNCLASSIFIED' in a total document whose contents and most pages were marked 'SECRET//REL TO USA, AUS, CAN, GBR, AND NZL//X1'

    I've seen US civilians get confused by that practice, no matter how logical it is...

  7. #7
    Council Member
    Join Date
    Jun 2007
    Location
    Newport News, VA
    Posts
    150

    Default

    Quote Originally Posted by Schmedlap View Post
    On the other hand, I don't understand how people get away with this crap. Classified information is not for the public domain and I have received a fair amount of briefings that warned me about possible jail time if I were to do something like this. Why do the powers that be seem to ignore this stuff? Is it simply because the information (in this case) is harmless? This seems like a pretty straightforward case of breaking the law. I am reminded of the drug legalization thread where there was discussion about soft drugs as a "gateway" to hard drugs. Likewise, it seems that stealing FOUO is a gateway to stealing Secret, which is a gateway to stealing Secret with various caveats, and so on.
    And yet at the same time, we have people here being put on administrative leave and under investigation for sticking a thumb drive into their NIPR. I am not condoning the practice mind you, but I have seen similar laxity in enforcing the rules on handling classified information, so this sort of thing puzzles me.
    He cloaked himself in a veil of impenetrable terminology.

  8. #8
    Council Member Cavguy's Avatar
    Join Date
    Jun 2007
    Location
    Honolulu, Hawaii
    Posts
    1,127

    Default

    Good question for JMM - what is the law for disclosing classified information?

    I know it is murky since the 'Pentagon Papers' were released.
    "A Sherman can give you a very nice... edge."- Oddball, Kelly's Heroes
    Who is Cavguy?

  9. #9
    Council Member
    Join Date
    Oct 2007
    Location
    Sierra Vista, AZ
    Posts
    175

    Default same

    West of Balad in FEB 06, a reporter embedded with a unit we were providing convoys for was kicked off the FOB for mentioning electronic warfare details in one of his articles. We, the Soldiers, were given many warnings on not discussing any systems or capabilities that we may or may not have had. Later in the deployment, it was more than a little annoying to read a multi-page spread in newsweek discussing the counter IED battle with diagrams and such. DOD and government don't take INFOSEC seriously, except for making an occasional example. Sadly, so many people are sloppy that a good percentage of leaders would be out of positions if it was fully enforced.
    "What do you think this is, some kind of encounter group?"
    - Harry Callahan, The Enforcer.

  10. #10
    Council Member
    Join Date
    Feb 2007
    Location
    Rancho La Espada, Blanchard, OK
    Posts
    1,065

    Default If you are sufficiently high

    in the government hierarchy, there is no penalty for releasing classified info - unless you are Scooter Libby and lie about it to the FBI. When I was a junior officer assigned to the Army's current intel shop, I would often roll my eyes when reading Joe Alsop's column in the Washington Post where I would see half of a SECRET NOFORN cable that I had read yesterday! Clearly, the Administration was leaking classified - we used to jokingly ask who Alsop had lunch with. I would also often see - several days (or weeks) later - in the press stuff that I had seen in classified form. Note that the original messages were still classified but the information had moved into the open source literature.

    Later in my career, I saw classification from the other side - that is plans that were classified TS but once executed should have been UNCLAS but somebody forgot to declassify - in other cases they were declassified. So, one issue here is proper classification or its lack. Another is the appropriate response to Adminsitration leaking of only part of the story - is this disinformation? A third, is declassification - what and when? Our system has problems with all of these. IMHO many of those problems could be addressed simply by using some "common sense" and people doing the jobs they are paid to do. Unfortunately "common sense" is uncommon; people don't always do their jobs; and other people want to play the system for their own political ends.

    Cheers

    JohnT

  11. #11
    Council Member
    Join Date
    Aug 2007
    Location
    Montreal
    Posts
    1,602

    Default

    Quote Originally Posted by John T. Fishel View Post
    When I was a junior officer assigned to the Army's current intel shop, I would often roll my eyes when reading Joe Alsop's column in the Washington Post where I would see half of a SECRET NOFORN cable that I had read yesterday!
    I've seen that too (well, not NOFORN, obviously)—although in some case it is the result of the embassy (or whoever) classifying information that is already circulating in the field.

    On the issue of wikileaks and the capabilities of Warlock Red/Green et al, there's good reason to keep data on this sort of stuff classified even after the system has passed out of widespread US usage—allies or locals may still be using older systems (or might be in future). I certainly used to use comms stuff in the 1980s that Ken would have remembered from "a generation" earlier
    Last edited by Rex Brynen; 12-20-2008 at 07:36 PM.

  12. #12
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default Geriatric Abuse, Part MCXIV...

    ..........

  13. #13
    Council Member
    Join Date
    Oct 2007
    Posts
    1,444

    Default

    On my last deployment, there was 30 GB of pornography on the SIPR network, iPods hooked up to secret computers (I guess it was just to charge it; you can't download stuff from iTunes - but still a blatant OPSEC violation), and I stumbled upon a site on the SIPR that had information that had no business being accessible to just anyone with a Secret clearance (not sure if it was S or TS, but I do know that it was, in layman's terms, "need to know" information). After a few months of continually raising these issues, the latter one was solved. I guess batting .333 ain't bad?

    There is also the problem of overclassification. Most of the stuff that occurs on the SIPR network is not of a classified nature. Some that occurs via NIPR is. Much of the stuff on SIPR has no business being there, because we don't know where it originated from. Likewise with NIPR, for the opposite reason. It's a weird over/under situation that few people take seriously, including, unfortunately, many commanders.

  14. #14
    Council Member
    Join Date
    Jun 2007
    Location
    Newport News, VA
    Posts
    150

    Default

    Quote Originally Posted by Schmedlap View Post
    On my last deployment, there was 30 GB of pornography on the SIPR network, iPods hooked up to secret computers (I guess it was just to charge it; you can't download stuff from iTunes - but still a blatant OPSEC violation), and I stumbled upon a site on the SIPR that had information that had no business being accessible to just anyone with a Secret clearance (not sure if it was S or TS, but I do know that it was, in layman's terms, "need to know" information). After a few months of continually raising these issues, the latter one was solved. I guess batting .333 ain't bad?
    Geez. We took Ft. Drum off the network during a Unified Endeavor exercise due to the presence of reams of porn on their SIPR that just so happened to carry lots of malware (imagine that!).
    He cloaked himself in a veil of impenetrable terminology.

  15. #15
    Council Member
    Join Date
    Aug 2007
    Location
    Montreal
    Posts
    1,602

    Default

    Quote Originally Posted by Schmedlap View Post
    iPods hooked up to secret computers (I guess it was just to charge it; you can't download stuff from iTunes
    Pretty much every iPod doubles as a USB (or, in the earlier models, Firewire) hard disk. Indeed, its not at all unusual for them to be used by academics to carry sensitive interview notes across borders in places where border guards don't know this (but otherwise do examine or seize laptops, USB keys, CDs, etc).

  16. #16
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Quote Originally Posted by Rex Brynen View Post
    Pretty much every iPod doubles as a USB (or, in the earlier models, Firewire) hard disk. Indeed, its not at all unusual for them to be used by academics to carry sensitive interview notes across borders in places where border guards don't know this (but otherwise do examine or seize laptops, USB keys, CDs, etc).

    Ditto.

    Though Google Docs has fixed some of that. Or Mobile Me.

    On a second or tertiary note I think I've mentioned before that stuff I've written has been grabbed by entities and classified. Though the documents reside on my computer outside the walls the context of what I wrote to others had them classify it.

    An entity from ODNI and another from DHS when briefed on my dissertation research asked to read it before I publish. Jokingly the person from ODNI suggested they would just have my work classified under the national secrets act which I guess was never actually passed. Ha!

    Though I have not had a clearance in 2 decades nor am I currently seeking one I have been shown classified information. I think they call is "special access" or some such type thing. Entities wanted my opinion about something so they let me read some stuff and I gave an opinion. All I had to do was sign an non-disclosure-agreement and those were only for three years. Though I use that as an example of breaches in standard Bell-Lapadula security models there was a certain amount of trust.

    Even though the entities likely couldn't care less years later I don't discuss the topics involved. Trust is a form of respect. The public need to know is not more important than my respect for the entities involved or their respect for me. Though I think wikileaks serves some purpose I wonder if it is more about people with no respect for their country acting like fools.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  17. #17
    Council Member
    Join Date
    Dec 2005
    Posts
    489

    Default

    Interesting thread and discussion.

    I have been in classified briefings inside the 5 Sided Puzzle Palace and have read about them the next day in the Washington Post AND Washington Times to my amazement.

    Overclassification is a MAJOR problem and bogs down the system. Anyone who has been deployed to OIF or OEF and used SIPR understands the mind-numbing stupidity that has become the norm. The system was so abused in Afghanistan that the J3 on our staff called in all the team leaders and read us the riot act on classification standards...people were either overclassifiying information, or misclassifying information.

    And now that SIPR has become the medium of choice for anything significant - to include scads of unclassified info - and more people than ever have access to it, I suspect the confusion is only going to get worse.
    "Speak English! said the Eaglet. "I don't know the meaning of half those long words, and what's more, I don't believe you do either!"

    The Eaglet from Lewis Carroll's Alice in Wonderland

  18. #18
    Council Member Mark O'Neill's Avatar
    Join Date
    Feb 2007
    Location
    Canberra, Australia
    Posts
    307

    Default It gets really dopey

    As a Coalition (Australian) member at the COIN CFE I was not 'allowed' (not by US COIN CFE staff) but by the the TF doing the business advice at our centre to the incoming Bde to sit in on the briefings.

    Albeit I had a higher clearance than many of the US guys in the room and had already been briefed on the capability before arriving at Taji.

    one of those things I guess....

  19. #19
    Council Member bismark17's Avatar
    Join Date
    Mar 2006
    Location
    Seattle, Wa
    Posts
    206

    Default

    We need as a country to do a better job of determining what is truly secret and what is just operational knowledge that should be passed on to the end user. While I understand the sources and methods argument, I think at least on the methods end, it's over rated. There is so much information out there that it doesn't take much to put the pieces together in a lot of cases. This obsession on security is more a problem than assistance in the big scheme of things. The bad guys are exploiting every means of commo out there and are a smart adversary. They are sharing what they know. Jails, Prison or Juvenile Detection are like colleges for the miscreants. They pass out information. Another example is the hacker forums on the net. 2600 and another one that escapes my memory are like text books. While there is some misinformation, I would bet money they are more accurate in most cases than the major media outlets.

    Some of this secret squirrel nonsense just creates stovepipes in information sharing. The bad guys don't worry about bureaucratic classification levels, they just give the end user what they need to know to accomplish the mission. I could go on with various TTPs that get people up in arms that are common knowledge in novels, TV shows like the Wire, or Film. To repeat once again, the bad guys are sharing what they know. It would be great if we could figure out a system where we could, without worrying about getting into trouble.

  20. #20
    Council Member bismark17's Avatar
    Join Date
    Mar 2006
    Location
    Seattle, Wa
    Posts
    206

    Default

    [QUOTE=Ski;62829]Interesting thread and discussion.

    "I have been in classified briefings inside the 5 Sided Puzzle Palace and have read about them the next day in the Washington Post AND Washington Times to my amazement."

    I had the same experience on a lesser scale when I reported out in a compstat like briefing and watched the news the next day and saw several of my topics on the local evening news.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •