Friday, May 1, 2009

Famous Oxymorons

In September of 2006, while I was parked in the headquarters of an infantry battalion in Kuwait,  the U.S. embassy in Damascus was attacked. Purely for the sake of curiosity, we spent our excruciatingly dull shift in the TOC trying to figure out who did it, why they did it, how they did it, and how successful they were. The guy sitting next to me that night worked in the S-2 shop, so he fired up the super secret squirrel computer and started reading through the classified intel reporting.

We also turned on the radio and listened to the BBC World Service. Throughout the night, we compared what we were getting from classified sources to the information we were getting from radio and cable TV. The "secret" stuff -- I didn't have a "top secret" clearance, 'cause I was just an E-5 and nobody loved me -- was well behind the open sources; we'd learn X fact from the radio, then get X fact an hour later on the magic secret box. (The running joke: "But don't tell anyone that, because it's classified." While the dude on the TV was saying it for the the fifth time.)

So this new column from William Lind made immediate sense to me.  

2 comments:

Ahistoricality said...

You've probably heard this story, too, then.

I wonder if this is inertia -- there've been stories about DOD blocking access to various sites for years -- or an actual new initiative of some sort?

Just A Guy said...

Chris,
yes I remember that incident as well the BBC had pictures of the unexploded bombs in less than 2 hours and the SIPR only acknowledged that yes something had indeed exploded. A big problem with US intelligence is that it is process oriented instead of product oriented. Also intelligence product is created in a group and outliers are thrown out even if they are credible. A lot of the times with the blocking of the computers is because of possible computer attacks and malware infections not cutting the analyst off from the outside world.
Cheers