Information Warfare: September 30, 2004

Archives

: The U.S. Department of Defense is having a problem dealing with soldiers in combat zones who are using the Internet. One of the most accurate sources of information about military operations in Iraq and Afghanistan comes from the troops themselves, via email and blogs written by soldiers. This is nothing new, as soldiers have long been writing home about what they are seeing and doing. These messages were not censored much until World War II. But by the time the 1991 Gulf War rolled around, there was cheap international phone service, which was too difficult to censor. So the troops were just warned to be careful what they said, lest they give the enemy any useful information. That worked, not just with calls home, but also with troops talking to journalists. This was important, because in 1991, some reporters had portable satellite dishes for the first time, and could report, live, from just about anywhere. 

Between 1991 and 2003, the Internet arrived, and spread to everywhere, including battlefields. Even during the initial invasion of Iraq in 2003, some troops had Internet access, and that access grew the longer American troops were there. First came a growing flood of email, followed by bloggers and home pages updated with pictures and text from the front. Unit commanders, especially battalion commanders, found that the families of the troops liked getting letters from the boss, describing what the troops were doing, and what was being done to keep them as safe as possible. 

The only problem with all this open communication was that it was unsupervised. It was only a matter of time before someone, most likely a younger guy, said something someone in his chain of command really didnt like. Thats happening. Because there is no military regulation covering troop use of the Internet, from a combat zone, its uncertain exactly what can be done. The writers are invoking First Amendment freedom of speech issues. But their commanders have military law (the UCMJ) on their side, which is recognized as superceding some constitutional rights (at least for soldiers, who are subject to military law when on active duty). 

Troops who post, either in a blog or email, information that is obviously useful to the enemy, can quickly be arrested and court martialled. But there are even degrees of what is obviously useful, and most of what gets written up in email and blogs is nowhere close to that. In fact, the military recognizes that email and blogs are not only good for troop, and family, morale, but also provides a more accurate view of whats actually going on in the combat zone. Many media outlets report what they want to be happening, not what is happening. The emails and blogs from the front have provided an increasingly embarrassing counterpoint to the mass media version of reality over there. 

So for the moment its a standoff. Some commanders will have to deal with the aggravation of seeing blogs saying uncomfortable, but not indictable, things. Theres just too much to lose by trying to lean on troop use of the Internet. 

You can find a list of blogs by troops here (near the bottom of the left hand column.)

 


Article Archive

Information Warfare: Current 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close