Close Menu
    Facebook X (Twitter) Instagram
    Community Updates
    • Quick Custom Intelligence Marks 6 Years of Transforming the Future of Casino Gaming
    • SkyCity Entertainment Group Expands Strategic Partnership with Quick Custom Intelligence
    • G2E Asia and Asian IR Expo Return This May, Driving Digital Innovation Across Gaming, Entertainment, and Integrated Resorts
    • QCI Introduces New Operational Solutions at IGA 2026
    • QCI Advances Dispatch Capabilities with Modernized, Fully Integrated Platform
    • QCI to Showcase AGI56.1 at IGA 2026, Accelerating Performance Across Tribal Gaming Operations
    • QCI Launches QCI RV, Turning Casino RV Parks into High-Value Revenue Engines
    • QCI to Showcase Agentic Platform Capabilities at IGA 2026
    Gaming & Leisure
    • Archives
      • Gaming & Leisure Magazine Archives
    • Employment Dashboard
    • Research
    • News
      • G & L Community
      • Gaming
      • Hospitality
      • Travel
      • Restaurants
    • Awards
      • Annual Gaming & Hospitality Industry Awards Entry Packet
      • G&L Platinum Award
      • G&L Transformation Award
      • G&L Partner Award
      • G&L Innovation Award
    • G&L Roundtable
      • Overview
      • Exec. Attendee Registration
      • Property Attendee Golf Only
      • Sponsor Information
      • Sponsor Registration
      • NBP Sponsor Registration
      • NBP Special Registration
      • Industry Roundtable Insights
      • Photos
      • G&L’s Health & Safety
    • G&L Forum
      • Executive Registration
      • Sponsor Registration
      • Photos
        • G&L Forum Photos
        • G&L Forum Reception Photos
        • G&L Forum Executive Document
    • About
      • About G&L Business Partners
      • G&L Business Perspectives
      • Contact Us
      • G&L Board
      • G&L Business Partners
      • G&L CEO
      • G&L Editorial Residents
      • G&L Overview Media Kit
      • G&L Privacy Notices
      • Resources
    • G&L Portals
      • Business Partner Portal
        • Submit G&L Social Post
        • Submit G&L Voice Ad
        • Submit Web Banner Ad
        • Submit G&L Magazine Ad
        • Submit For G&L Monthly
        • Submit G&L Business Package
        • Submit Your Positions Available
        • Submit Press Release
        • Submit to Calendar of Events
        • Add/Update Your Logo
        • Payments & Terms
      • Editorial Portal
        • Step 1: Please Confirm You’ll Submit for the Upcoming Edition or the New & Cool Advertorial.
        • Step 2: Submit for the Upcoming Edition
        • New Writer Onboarding
    • Calendar
    • Subscribe
    Gaming & Leisure
    You are at:Home»Security»The Afghanistan War Diary Wiki Leak

    The Afghanistan War Diary Wiki Leak

    August 8, 2013 Security
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In my last installment I gave two examples of some outstandingly bad IT decisions: failing to include sanitizing copier disk drives in INFOSEC policies, and a gloriously idiotic approach to data redaction by the TSA. Award contenders, all, these are the surreal examples of the CIOs art. Some of these stories found their way to become top downloads on YouTube.

    Just after I submitted my last column, another egregious violation of IT security best practices came to light – the recent WikiLeaks scandal popularly called the “Afghan War Diary, 2004-2010.” According to Wikileaks.org, on July 25, 2010 it released over 91,000 reports during this period, both on their website and to the press. These reports were accumulated by the U.S. Military on defense department servers from military and intelligence personnel. By all accounts they contained classified information (apparently at the “secret” level) on U.S. activities in Afghanistan on topics as far ranging as GPS maps, situation reports, political assessments, and embarrassing videos of helicopter attacks. As is fashionable, objective media coverage of the event quickly disintegrated into political bias and blame, with little professional journalism devoted to printing stories of enduring value. No Pulitzer to be found here, folks.

    Our challenge is to find the “real story” behind the leaking of these documents – or, at the very least, to get pointed in the right direction.

    Ben Franklin and Wikileaks

    To get at the real story, we begin with the words of the great military strategist and eyeglass manufacturer, Benjamin Franklin, who said “Two people can keep a secret if one of them is dead.” In so saying,

    Ben became the progenitor of the modern digital- intelligence operative. Ben anticipated Wikileak’s popularity by several hundred years – perhaps some- time between his discoveries that lightning was in fact electricity, and the cooling effect of evaporation. In any case, people who hold secrets don’t always keep them. Ben got that. While not as familiar as the golden rule, its truth is unassailable. Maybe the military and intelligence community should make it their “silver rule” or “bronze rule.” But I’m getting ahead of myself.

    According to the Guardian, the Wikileaks documents are “a devastating portrait of the failing war in Afghanistan….” The New York Times said the leaks are “an unvarnished … picture of the war in Afghanistan that is in many respects grimmer than the official portrayal.” This has been a very leaky year, secret-wise. Last year, some of Ambassador Karl Eikenberry’s confidential communiqués to the U.S. State Department were leaked. He opined that “President Karzai is not an adequate strategic partner.” I’ve got a news flash for the Guardian, Times, and Eikenberry: a lot of folks figured this out without the help of the leaks. As a heads-up, there is no need to speculate that there isn’t always a clear distinction between the Mexican government and the Mexican drug car- tels. The toothpaste is out of that tube as well.

    However, the leaks are deserving of close scrutiny because we can’t afford to minimize the potential harm to people, citizens and military and increased risk to families and friends due to retaliation as a result of the leaks. If there were names named, persons identified, plans spoiled, etc. we need to know the details. So while the press assessment of the leaks mentioned above may not be newsworthy, the details behind the leaks might be.

    So it’s appropriate to ask, if this is a serious breach of security, how did it happen and who is to blame? As near as I can tell, the journalists have completely missed this point as well. The real problem isn’t in focus. Let me explain.

    Who Dunnit?

    According to the news reports, the likely source of the leaks is a U.S. Army private named Bradley Manning (cf, bradleymanning.org) in his early 20s and currently incarcerated in Kuwait pending an Article 32 investigation of 12 counts of violating U.S. secrecy laws. Pfc. Manning is also accused of leaking the classified video of the very controversial helicopter strike in Baghdad in 2007 that is easily recovered on the Internet with the search string, “Collateral Murder.” The primary witness is appar- ently a former hacker with a colorful and somewhat checkered legal past named Lamo in whom the Army private placed confidence before and/or dur- ing the alleged leaks. This part of the story can be found via any search engine and, so far as I can tell, are not disputed. The received scenario seems to be something like this: private has access to secret data, claims crisis-of-conscience, and releases secret data to media for greater good.

    But the “real” story is no more about this private than the real story of Watergate is about Daniel Ellsberg.

    “Need to Know” Gone Wild

    The real story is in the search for the “source of the problem” not the “source of the leak.” At this writing, the media just doesn’t seem to get this. By the way, this “real story” is what ties this col- umn to my previous on truly stupid IT decisions. The source of the problem is not an Army private, but some really idiotic military INFOSEC policies that allow Army privates unrestricted access to potentially dangerous or embarrassing secret data. Any competent executive will confirm that risk management is not about finding perfect solutions

    to problems. Risk management is the art of bal- ancing risks against rewards. There is at least one very highly placed military officer somewhere who failed to comprehend this basic principle. Fortunately for the officer(s), the press doesn’t understand it either.

    Something broke down either at the level of  INFOSEC policy or the implementation thereof. I suspect the fault is the policy itself. There’s a reason that reporters keep the identities of their sources to themselves. Same with cops and snitches. They’re mindful of BenF ranklin’s admonition. If sources are disclosed – e.g., on servers accessed by privates – it won’t be long before there are no more sources. This isn’t rocket science. You can figure this out by watching the Sopranos. So *if* there was sensitive information in the raw files, the real story is the exposure of the person who authorized privates to have access to them without first redacting (aka scrubbing) the data?

    Try as I may, my military friends cannot explain this egregious breach of IT common sense. I’ve asked several career officers at what level in the chain of command a clearance like this would be approved, but none of them seem know (at least that’s what they’re telling me). What’s worse they apparently don’t know who to ask. That’s an even bigger problem. If senior career officers in several branches of the military have no idea what position in the chain of command would authorize access to sensitive raw data, leaks are inevitable.

    Couched in your terms, if a regulator or SOX compliance consultant asks one of your executives where in your organization one could find the per- son who oversees PCI security policy and implementation, would it be acceptable for the executive to say “I haven’t a clue.?” It doesn’t matter whether the executive is CEO or VP for International Marketing, if they can’t associate a name or title with the responsibility for keeping tabs on revenue security, the organization has some serious issues. Because IT is ubiquitous in the modern organization, when it comes to cyber security compliance, if everyone isn’t on board, the organization by definition will never be compliant.

    So this Wiki leak event might serve well as a wake up call for all of us to revisit our “need to know” philosophy for file access. Who knows, there may be a potentially embarrassing Wiki leak in your organization’s future.

    Hal Berghel is Director of both the UNLV School of Informatics and the Identity Theft and Financial Fraud Research and Operations Center (itffroc.org). His consultancy, Berghel.Net, provides security and management services to government and industry.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    The Bigger Risk After a Breach Isn’t Data Loss — It’s Lawsuits

    December 11, 2025

    AI in Gaming – Cybersecurity Considerations

    December 11, 2025

    Why Is There an @ Symbol?

    December 11, 2025

    Comments are closed.

    G&L VOICE

    Listen and/or watch industry influencers sharing insights in your car, office, home or while traveling. You’re going to love it!

    Sponsored by: Agilysys + ITRG
    David Ting CTO, Bespin Global

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wMTYxQzVBRDI1NEVDQUZE

    David Ting CTO, Bespin Global

    March 24, 2026 12:21 pm

    Agilysys + ITRG
    Adam Lopez, President CMIT Solutions

    Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC4wNEU1MTI4NkZEMzVBN0JF

    Adam Lopez, President CMIT Solutions

    February 23, 2026 10:15 am

    Sponsored by: Agilysys + ITRG
    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    Sponsored by: Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5CQkEwRDA0MDkwNUM2MDY1

    Mark Fancourt, Principal Consultant & Co Founder, TRAVHOTECH

    January 22, 2026 3:22 pm

    Sponsored by Agilysys + ITRG
    Benjamin Bohman, Founder & CTO of Stratishield AI

    Sponsored by Agilysys + ITRG

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC5GNjAwN0Y0QTFGOTVDMEMy

    Benjamin Bohman, Founder & CTO of Stratishield AI

    December 29, 2025 12:43 pm

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz
    Fred Brown CTO, Virtual Procurement Services

    This episode of G&L Voice is sponsored by: Agilysys and Bepoz

    YouTube Video UExlVmFLSm9vTVFkZDZ5YlR5WFBDNjVnZC1KU1gtTE9sMC41NTZEOThBNThFOUVGQkVB

    Fred Brown CTO, Virtual Procurement Services

    November 18, 2025 3:54 pm

    View More

    Click here to subscribe to Apple podcast.

    Gaming & Leisure
    Connect with our CEO Jeannie Caruso
    Jeannie Caruso
    Connect with the G&L Community
    • Twitter
    • Facebook
    • LinkedIn
    Copyright © 2026 Gaming & Leisure. Site managed by PixelMongers LLC.

    Type above and press Enter to search. Press Esc to cancel.

    • Sign in
    • New account

    Forgot your password?

    Lost your password? Please enter your email address. You will receive mail with link to set new password.

    Back to login

    This website uses cookies to improve your experience. By continuing to browse this site you are agreeing to our use of cookies and our privacy policy. G&L Privacy Policy
    Privacy & Cookies Policy

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT