Thanks to Mickey for these thoughts on wikis.
From the New York Times (Open-Source Spying)
When Matthew Burton arrived at the Defense Intelligence Agency in January 2003, he was excited about getting to his computer. Burton, who was then 22, had long been interested in international relations: he had studied Russian politics and interned at the U.S. consulate in Ukraine, helping to speed refugee applications of politically persecuted Ukrainians. But he was also a big high-tech geek fluent in Web-page engineering, and he spent hours every day chatting online with friends and updating his own blog. When he was hired by the D.I.A., he told me recently, his mind boggled at the futuristic, secret spy technology he would get to play with: search engines that can read minds, he figured. Desktop video conferencing with colleagues around the world. If the everyday Internet was so awesome, just imagine how much better the spy tools would be.
But when he got to his cubicle, his high-tech dreams collapsed. â€œThe reality,â€ he later wrote ruefully, â€œwas a colossal letdown.â€
The spy agencies were saddled with technology that might have seemed cutting edge in 1995. When he went onto Intelink â€” the spy agenciesâ€™ secure internal computer network â€” the search engines were a pale shadow of Google, flooding him with thousands of useless results.
They decided to try wikis and blogs:
Intelligence heads wanted to try to find some new answers to this problem. So the C.I.A. set up a competition, later taken over by the D.N.I., called the Galileo Awards: any employee at any intelligence agency could submit an essay describing a new idea to improve information sharing, and the best ones would win a prize. The first essay selected was by Calvin Andrus, chief technology officer of the Center for Mission Innovation at the C.I.A. In his essay, â€œThe Wiki and the Blog: Toward a Complex Adaptive Intelligence Community,â€ Andrus posed a deceptively simple question: How did the Internet become so useful in helping people find information?
Andrus argued that the real power of the Internet comes from the boom in self-publishing: everyday people surging online to impart their thoughts and views. He was particularly intrigued by Wikipedia, the â€œreader-authoredâ€ encyclopedia, where anyone can edit an entry or create a new one without seeking permission from Wikipediaâ€™s owners. This open-door policy, as Andrus noted, allows Wikipedia to cover new subjects quickly. The day of the London terrorist bombings, Andrus visited Wikipedia and noticed that barely minutes after the attacks, someone had posted a page describing them. Over the next hour, other contributors â€” some physically in London, with access to on-the-spot details â€” began adding more information and correcting inaccurate news reports. â€œYou could just sit there and hit refresh, refresh, refresh, and get a sort of ticker-tape experience,â€ Andrus told me. What most impressed Andrus was Wikipediaâ€™s self-governing nature. No central editor decreed what subjects would be covered. Individuals simply wrote pages on subjects that interested them â€” and then like-minded readers would add new facts or fix errors. Blogs, Andrus noted, had the same effect: they leveraged the wisdom of the crowd. When a blogger finds an interesting tidbit of news, he posts a link to it, along with a bit of commentary. Then other bloggers find that link and, if they agree itâ€™s an interesting news item, post their own links pointing to it. This produces a cascade effect. Whatever the first blogger pointed toward can quickly amass so many links pointing in its direction that it rockets to worldwide notoriety in a matter of hours.
The obvious hole in this approach is security. The spooks set up several levels of access, but concern remains that someone will compromise the information. There is no perfect solution to the problem but here are two ways of making it likely that people misusing information will get caught:
1. Learn from similar situations in medicine, where doctors have wide access to medical information but their use is tracked. Misuse happens, but the people can be nailed, as illustrated in the instance of President Clinton at Columbia Presbyterian.
2. Learn from dealing with officials leaking to journalists by providing slightly different versions to different readers, as has been used to catch leakers.