Wikileaks, Afghanistan & The New Rules Of Engagement


As of two days ago Wikileaks has released 92.000 documents about the war in Afghanistan, leaked (most likely) from within the US military. After discussing this with quite a few folks, we all agreed that this will be one of the biggest – if not the single biggest – story of 2010.

As a former media and political science major, as well as a former editor, this stuff is pure gold to me.

First, what I am not going to go into: the Afghanistan conflict, its sense or legitimation or political implications; or the legalities of this kind of thing: does a leak like this break US law, and would that even be applicable? That’s for US lawyers to decide.

The basics first: What happened? Wikileaks got hold of some 91.000 military documents regarding the Afghanistan conflict, from analyst papers to ground reports. (What is Wikileaks?) Before releasing these documents themselves, they gave them in advance to three traditional news media: New York Times (US), The Guardian (UK) and Der Spiegel (Germany). (All of the links go directly to the Wikileaks specials.) After these media ran their exclusives, Wikileaks went public with the leaked documents, called the Afghan War Diaries:

The reports, while written by soldiers and intelligence officers, and mainly describing lethal military actions involving the United States military, also include intelligence information, reports of meetings with political figures, and related details. (…) The reports cover most units from the US Army with the exception of most US Special Forces’ activities. The reports do not generally cover top secret operations or European and other ISAF Forces operations.

So why is the Wikileaks story so big? It’s big not just because it’s something new and a huge scoop, but because it touches on so many complex and highly relevant issues:

  • the issue at hand, the conflict in Afghanistan
  • the way the US government handles information
  • … and by extension, the bigger questions of truth & trust
  • the relationship between governments and their citizens
  • the relationship between US government and their allies, and how information flows between them
  • the way media work today
  • the (new?) role that media play today (trust center verifying information scoops rather than gathering them)
  • the way the internet changes politics and media (and how news media not bound to nation states operate under different circumstances than we are used to)
  • Is it irresponsible to leak documents?

For some great background and discussion, I recommend you jump straight to Jay Rosen and Jeff Jarvis, both who have great write-ups.

Trying not to repeat to many of Rosen’s and Jarvis’ points, there are a few things I find worth considering.

Truth & trust, governments & citizens The White House was clearly pissed off after seeing the Afghan War Logs emerge. Understandably so, after all those documents will clearly make a dent in the war effort, so to speak. However, legalities aside and assuming the documents are the real thing – the documents leaked are internal military documents. While it’s always painful to be called out on your own mistakes, it’s not job of the media to support certain policies; and it’s most certainly not the job of a whistleblower site like Wikileaks to support any policies. It’s their job to get out information so folks can make informed decisions.

It’s probably part of winning a military conflict to occasionally bluff and put a game face on. But it’s fair game to call that bluff; I’m guessing here, but I’d say that this can happen to a government just like to any poker player. These war reports seem to be such a case where the bluff (“the war is going kinda alright”) is called. The question is: Could the US government – instead of trying to clamp down on Wikileaks and the internal military source – try to make the best of the situation, for example by trying a crowdsourced effort to analyze the patterns of what has been going wrong in the conflict? (Might not work, but should be looked into by some of the smart folks within or around the US government.)

The new role of media What I found particularly interesting is the new role that media played in this case. This is not a case of investigative journalism by the media, but by a third (non-journalistic) party. We are talking about three of the most distinguished media outlets world wide. Yet, they did not get the scoop here, they did not have the sources inside. They were not the address the military sources wanted to talk to. (Why might be a moot question, but an interesting one still. Get back to that in a minute.) Instead, the media were there to a) spread the news and b) verify the information, to lend credibility. They served as a trust center for another organization’s scoop. Once they got the information, the media then did what they do best: sift through the material and make it more accessible, as well as spread the information.

As Jay Rosen put it, referring to a New York Times editor’s note:

“At the request of the White House, The Times also urged WikiLeaks to withhold any harmful material from its Web site.” There’s the new balance of power, right there. In the revised picture we find the state, which holds the secrets but is powerless to prevent their release; the stateless news organization, deciding how to release them; and the national newspaper in the middle, negotiating the terms of legitimacy between these two actors.

So, why Wikileaks not New York Times? We can only speculate why the internal source leaked the documents to Wikileaks and not to one of the major newspapers. But there are a number of considerations at play here: First, Wikileaks is much harder to subpoena than any traditional news organization that operates under US (or European) law. Second, Wikileaks is by nature very much distributed. They are a true internet-based, decentralized organization, making it harder to suppress information. Third, Wikileaks is independent, donation-funded, without anyone to report to. This can be good or bad, of course. And on certain topics, a political biased can be assumed. But again, it makes it harder to believe there could be a reason for Wikileaks to withhold this kind of information, much unlike the news organizations that also want to send their reporters into war zones as embedded journalists along the military. Fourth, Wikileaks knows about secure communications. Maybe Guardian, Spiegel and New York Times do too, but a source wouldn’t want to take any risks. Wikileaks are strong on anonymity. They are strong on crypto. They really know how to keep communication channels secure and anonymous. All of these combined make them a more secure place to go to than any single newsroom.

Is Wikileaks acting irresponsibly? One could make the case for either the value of keeping information secret, or for absolute transparency. In a military conflict, that’s a tough one. But it seems to be like Wikileaks is going to great lengths to be as careful and responsible as the overall context allows (once it’s decided to publish leaked info, that is). They are holding back a significant number of documents until further review and clean up (think removing names etc):

We have delayed the release of some 15,000 reports from the total archive as part of a harm minimization process demanded by our source. After further review, these reports will be released, with occasional redactions, and eventually in full, as the security situation in Afghanistan permits.

Giving the documents to some trusted traditional newspapers of making sure the information is getting a decent journalistic treatment, followed by full disclosure of all the source material for extra vetting.

In other words, it’s a perfect example of getting it all right: Responsible dealing with the information as well as working the media right.

Jeff Jarvis raises an interesting point in his post: Will leaks like this incentivize organisations not to write down as much because they fear leaks, leading in the long run to less transparency? I certainly hope not, but it’s not a fear I share. Large-scale organizations need documentation, and where there is documentation there is a chance of leaks.

What I’d hope for instead is that the mere chance of leaks alone will lead to more transparency up front. After all, if an organization is more transparent the chance of getting called out on grounds of hiding information is a lot lower.

We’ll have to wait and see. Until then, if you do appreciate this kind of document leak, I do recommend you consider donating for Wikileaks.

Tech year 2009 wrap up: cloud computing, Android, privacy discussions


retro future

A couple of days ago I’ve given a short look back at the year 2009 from a personal point of view. Right after, I realized there were a couple more things with a wider tech perspective that I’d like to include – again, more for personal documentation than anything else. So here goes.

Everything went to the cloud We had been talking about cloud computing for a few years, but for me, 2009 clearly was the year The Cloud took off. I moved practically everything to the cloud, and cloud often equals Google these days. My email has been living inside gMail for years, but in 2009 I’ve ditched my email client altogether. Now I’m IMAP-ing browser-based between my computers and my phone.

Everything but my most sensitive documents live in the cloud, especially most collaborative docs. (Again, Google Docs or Etherpad, but Etherpad has also been acquired by Google recently.) My calendars are 100% up in Google Calendar.

Am I happy about this focus on Google? Far from it. But at this point, I see no equally well-executed alternative. For an overview of just how googley 2009 was, head over to Gina Trapani. Also, I recommend This Week In Google, a great weekly podcast with Leo Laporte, Jeff Jarvis and, again, Gina Trapani.

Still all this is clearly just the beginning. It should be interesting to watch where cloud computing goes in 2010.

Android killed the iPhone (for me) Ok, ok, Android may not have killed the iPhone officially. But ever since I switched to an Android-based phone (HTC Hero), I haven’t felt the urge to get an iPhone. Not a single time. Before I had been playing with the idea, and had always restrained. (I really don’t like the product policy behond the iPhone.) Android is a gorgeous, stable, powerful platform, and it’s all open source. It’s clear to me that while I might change phones a few times over the next couple of years, it’s not likely I’ll be leaving Android anytime soon.

Speaking of open source, 2009 is also the year I ditched Windows for good. I now live a Windows-free live (with a mix of Mac OSX, Ubuntu and Android), and boy, it’s feeling good.

The fight for our data 2009 has also been a year of intense battles in the digital realm, although certainly it’s not the last (or worst) to come. These fights have been along many different fronts, and not all have been going well at all.

In politics, Europe has been covered in conflicts regarding data retention. (German government introduced excessive data retention laws which are now under court review as far as I know.) Also in Germany, the basis for government-run censorship was laid under the pretense of fighting child abuse, search for #zensursula for details. The best German-language resource for these topics is certainly netzpolitik.org, so check them out for more details and updates. Good news, if not a solution to the problem: President Köhler has so far refused to sign the law.

In the corporate world, the conflict lines have been a lot more fragmented and twisted. However, one thing has become clear: Internet consumers will have to make a clear point regarding their expectations in terms of privacy and data control in digital contexts. Be it Facebook and its privacy settings, be it data ownership in other social networks. Important keywords in this field are: Data Portability identification systems like OAuth, microformats or the decentralized social web. (Like so often, Chris Messina is right in the middle of it. Check out the DiSo Project.) The same goes for End User License Agreements (EULA for short). Everybody is so used to just clicking those pages upon pages of legalese away that we’re bound to have a discussion about their use and legitimacy sometime soon. This isn’t new, but hasn’t been solved either, so maybe 2010 will bring some news there.

But worry not, it’s not all lost – these topics seemed to be very niche, and maybe still are. However, everybody in their right mind will come to the conclusion that there’s a line to what consumers have to bear before just moving on to another brand or product. (Even my mom was asking about the insanity of DRM the other day!) It looks like these topics, obscure as they may seem, are getting more publicity and more people to help out. Hopefully we can all collaboratively take some of the load off of the few individuals that have been doing such a tremendous job of raising awareness so far. (You know who you are.)

Obviously I’m happy to be able to end this post on a happy note.

So, again in short: the tech year of 2009 the way I perceived it = year of privacy discussions, cloud computing, Android.

Did I forget anything important? Let me know…

(image source)