Kaveh Waddell | The Atlantic | March 3, 2017 | 0 Comments

The Government’s Secret Wiki for Intelligence

Patrick Semansky/AP file photo

During the final weeks of the Obama administration, officials began to worry that the results of ongoing investigations into Russia’s election-related hacking might get swept under the rug once President Trump took office. They decided to leave a trail of breadcrumbs for congressional investigators to find later, according to a report from The New York Times.

In another age, the paper trail may have taken the form of notes stuffed into a box in a forgotten archive. But this being the 21st century, some of the breadcrumbs were submitted to an online wiki. According to the Times, intelligence officers in various agencies rushed to complete analyses of intelligence about Russian hacking and file the results, at low classification levels, in a secret Wikipedia-like site for intelligence analysts. There, the information would be widely accessible among the intelligence community.

That site, called Intellipedia, has been around for more than a decade. It’s made up of three different wikis, at different classification levels: one wiki for sensitive but unclassified information, another for secret information, and a third for top secret information. Each wiki can only be accessed by employees in the U.S. intelligence community’s 17 agencies who have the appropriate clearance level.

Intellipedia was formally launched in 2006, but grew slowly at first. “It was received skeptically by most,” said Carmen Medina, the former CIA director for the study of intelligence and one of the first officials to green-light the project. “Analysts were not really rewarded for contributing to Intellipedia.”

Since then, the wikis have grown steadily. According to a release celebrating the site’s second anniversary, the system housed nearly 50,000 articles by March 2008. In January 2014, the National Security Agency responded to a Freedom of Information Act request with the latest statistics: The three domains had just over 269,000 articles, more than 40 percent of which were found on the top secret wiki. (It’s not clear whether articles are duplicated across the wikis.)

Built on the same software platform as Wikipedia, Intellipedia's articles are often cribbed directly from the free encyclopedia, but with sensitive classified information added by analysts. “About everything that happens of significance, there’s an Intellipedia page on,” Sean Dennehy, one of the site’s founders, told The Washington Post in 2009. An article about the terrorist attack in Mumbai was filled with sensitive information before it was reported in the popular press, Dennehy said.

In 2009, Dennehy and Don Burke, both CIA analysts, won a Service to America Medal for their work on Intellipedia.

Their site is meant to help analysts collaborate across agencies: Improving cross-agency communication was one of the main recommendations set forth by the 9/11 Commission, which led to the establishment of the Office of the Director of National Intelligence in 2005. That’s the agency that now has custody of Intellipedia.

Unlike on Wikipedia, Intellipedia edits are tied to analysts’ identities. “We want people to establish a reputation,” said Thomas Fingar, the former Deputy Director of National Intelligence for Analysis at ODNI, at an event at the Council of Foreign Relations in 2008. “If you’re really good, we want people to know you’re good. If you’re making contributions, we want that known. If you’re an idiot, we want that known too.”

A number of Intellipedia pages have been declassified or made available to the public through FOIA requests. Some are silly, like the entry for Area 51, which, for some reason, briefly describes a cafeteria in Fort Bliss, Texas. Others, like the entry for the Nevada nuclear test site or for the Bay of Pigs invasion, are mostly filled with information from Wikipedia, but have short redacted passages that may contain classified details. A request for the page on Edward Snowden only turned up an empty placeholder. (A website called The Black Vault has compiled dozens of these FOIA requests and responses.)

Perhaps the best real-world example of how analysts use Intellipedia came in a recent story about Palantir, the secretive tech contractor led by Peter Thiel, published last month in The Intercept. Documents leaked by Snowden included pages from an internal wiki maintained by GCHQ, the NSA’s British counterpart, which included a link to a page about Palantir on Intellipedia. Other Intellipedia pages in Snowden’s leaks included links to other Palantir programs that the NSA uses, suggesting that the wiki is sometimes used for sharing technical information about intelligence software.

Intellipedia may have seen its traffic spike this week: If nothing else, the shoutout to the wiki in the Times might have sent curious analysts combing through the pages to see what intelligence was scattered there for safekeeping.


Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.