Skip to Content

Wikileaks Backlash Could Mean Less Data for Soldiers

Information shared with troops may be restricted.
August 5, 2010

The disclosure of 92,000 Afghanistan war documents by Wikileaks was made possible partly by a relatively recent effort by the military to get fresh intelligence data to frontline forces. The idea was that the information would better prepare the troops for ever-changing guerilla conditions in places like Iraq and Afghanistan.

War Data: This map shows the kind of data supplied by the military’s classified Internet. The mock-up shows a hypothetical patrol route in Baghdad with icons representing intelligence reports and past hostile actions.

Defense Secretary Robert Gates has said the breach probably will lead the Pentagon to limit the distribution of such material. Although that could help prevent future leaks, it could also restrict the flow of potentially lifesaving information to soldiers.

Prior to the release of the documents, access to the network for classified information, known as the Secret Internet Protocol Router Network (SIPRNet), was quite loose. Soldiers would need a security clearance to log in. But once logged in, they might not have met any further controls–such as a brake on how many documents any individual could download. “Technical safeguards that are in place stateside were not necessarily implemented downrange,” says John Pike, director of, a defense and security think-tank.

What’s more, the dedicated SIPRNet terminals used by soldiers in the field were not necessarily available only to people with credentials. Brian Slaughter, who was a lieutenant and platoon leader in Iraq, says soldiers might log in but not log out, which meant other soldiers could go in and view data. “So who knows who is really accessing it at this point?” he says. “There is a certain level of trust at the lower tactical echelons that users accessing data via SIPRNet have the best interests of their fellow soldiers at heart.”

He added: “The nature of the environment we operate in forces leaders to place a certain amount of trust in their soldiers. With that trust comes a small amount of risk. In this case a soldier may have taken advantage of that.”

Data is subject to different classification levels. SIPRNet carries data labeled “secret” but not more sensitive “top secret” data. One application built on SIPRNet is called TIGR, or “tactical ground reporting system.” In Iraq, it is used as a mapping and visualization application that lets soldiers see the latest intelligence and incidents on a planned patrol route. A soldier can click icons to read reports, see photos, and even watch short videos or hear transcripts of interviews.

TIGR requires its own log-in system, atop the SIPRNet one, so it’s not likely that TIGR itself will be curtailed, Slaughter says. But other access points to SIPRNet are far looser, he adds. “There are numerous sites on SIPRNet that are ‘free’ sites that you can access without any permissions required,” adds Slaughter. “Unfortunately some of those sites might have value to someone looking to harm our efforts.”

Pike notes that information systems can either be ultra-secure or ultra-usable, but not both. “By definition there is a trade-off between security and operability. It’s just a question of where you want to make the trade,” he says.

It’s likely that inside the war zone, if not back in Pentagon offices, the bar on SIPRNet is set in favor of giving soldiers information that might save their lives, Pike says. “That would go to the question of why they took off technical protections of computers that are downrange. They are getting shot at, they are in the wire. ‘There’s nobody in here but us chickens, so we’re going to move the margin and move it in the direction of less secure and more operable.’ “

Bradley Manning, an Army private who served in Iraq, is a “person of interest” for investigators examining the release of the latest documents, according to the Army. Even before this episode, Manning had been arrested by military authorities and charged with releasing other classified information, including a video of a 2007 Apache helicopter attack that killed 12 people in Iraq.

Keep Reading

Most Popular

images created by Google Imagen
images created by Google Imagen

The dark secret behind those cute AI-generated animal images

Google Brain has revealed its own image-making AI, called Imagen. But don't expect to see anything that isn't wholesome.

AGI is just chatter for now concept
AGI is just chatter for now concept

The hype around DeepMind’s new AI model misses what’s actually cool about it

Some worry that the chatter about these tools is doing the whole field a disservice.

Hoan Ton-That, CEO of Clearview AI
Hoan Ton-That, CEO of Clearview AI

The walls are closing in on Clearview AI

The controversial face recognition company was just fined $10 million for scraping UK faces from the web. That might not be the end of it.

spaceman on a horse generated by DALL-E
spaceman on a horse generated by DALL-E

This horse-riding astronaut is a milestone in AI’s journey to make sense of the world

OpenAI’s latest picture-making AI is amazing—but raises questions about what we mean by intelligence.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.