Leaking Secrets Under Social Pressure

battle tank

Here is a classic example of human nature: people on a gaming site argue that the site’s tanks don’t accurately reflect their capabilities. Participants post classified information to prove their point. Reporters have been following this story for almost a year on the game War Thunder. The first case appeared a couple summers ago regarding Britain’s Challenger 2 tank. Another case involved the French Leclerc tank. A more recent case involves a Chinese tank shell.

The count is probably behind reality: we probably don’t know how many cleared personnel fools are doing this. Discussion threads summarize the problem as people doing dumb things for dumb reasons, or for dishonest reasons.

I briefly worked for a metal-bending defense contractor in the 1980s while Tom Clancy was writing his military-oriented techno-thrillers. The VP of engineering had a personal copy of Clancy’s Red Storm Rising marked up wherever he mentioned one of the devices we were building (mostly Mark 26 missile launchers and Mark 45 gun mounts). Clancy’s book reviewers gleefully pointed out how the Secretary of the Navy accused him of publishing classified information, though he seemed smarter than that.

Some time in the ’90s, I met a struggling writer at one of my wife’s high school reunions; she took calculus from his dad. He was signing books in the bookstore and I’d just written Internet Cryptography. It turned out that his previous book was about crypto and the NSA, a techno-thriller called Digital Fortress. I found it readable, interesting, and technically unlikely. He was more successful with his later books, notably The DaVinci Code. Don’t we all wish we were so successful!

Getting back to sensitive information in the entertainment world, Tom Clancy and Dan Brown both started writing from some documented facts and extrapolated them to build an interesting story. And both diverged from documented facts on occasion.

Response

  1. timtheleonard Avatar

    In 1976, I was hired by Digital Equipment Corporation to work on the first implementation of its impending VAX architecture. It was common knowledge that a new architecture was coming, but its design was secret. My roommate (a guy by the name of Rick Smith) wanted to know all about the secret new architecture, which of course I couldn’t tell him. I asked what he thought it would look like, and he speculated. He got a lot of the overall structure right, and nailed several of the instructions perfectly. Extrapolation from a well-founded base can be suspiciously accurate in some details; but the extrapolator generally can’t know which details those will be.

    Liked by 1 person

ACSAC Android Apple attacks authentication Bitcoin Boak Calibre certificates CIA properties classified Clinton cloud computing Coursera CPU cracking crypto cybercurrency databases design principles domain names Drupal ebooks elections email encrypted messages evaluations file systems flaws Ft. Meade GUI history iOS iPhone KGB Kindle library malware memory sizes Microsoft mobile security MSSE Multics NSA NSTISSI 4011 OPDS passwords phishing President quantum Quizlet RAM risks secrecy spam SSL stream cipher TCSEC Top Secret training Trump UMN video Wordpress xor