Hostname: page-component-cd9895bd7-7cvxr Total loading time: 0 Render date: 2024-12-27T14:08:56.541Z Has data issue: false hasContentIssue false

Estimating the Severity of the WikiLeaks U.S. Diplomatic Cables Disclosure

Published online by Cambridge University Press:  04 January 2017

Michael Gill*
Affiliation:
Department of Government, Harvard University, 1737 Cambridge Street, Cambridge, MA, 02138
Arthur Spirling
Affiliation:
Department of Government, Harvard University, 1737 Cambridge Street, Cambridge, MA, 02138, e-mail: [email protected]
*
e-mail: [email protected] (corresponding author)

Abstract

In November 2010, the WikiLeaks organization began the release of over 250,000 diplomatic cables sent by U.S. embassies to the U.S. State Department, uploaded to its website by (then) Private Manning, an intelligence analyst with the U.S. Army. This leak was widely condemned, including by then Secretary of State Hillary Clinton. We assess the severity of the leak by considering the size of the disclosure relative to all diplomatic cables that were in existence at the time—a quantity that is not known outside official sources. We rely on the fact that the cables that were leaked are internally indexed in such a way that they may be treated as a sample from a discrete uniform distribution with unknown maximum; this is a version of the well-known “German Tank Problem.” We consider three estimators that rely on discrete uniformity—maximum likelihood, Bayesian, and frequentist unbiased minimum variance—and demonstrate that the results are very similar in all cases. To supplement these estimators, we employ a regression-based procedure that incorporates the timing of cables' release in addition to their observed serial numbers. We estimate that, overall, approximately 5% of all cables from this timeframe were leaked, but that this number varies considerably at the embassy-year level. Our work provides a useful characterization of the sample of documents available to international relations scholars interested in testing theories of “private information,” while helping inform the public debate surrounding Manning's trial and 35-year prison sentence.

Type
Letters
Copyright
Copyright © The Author 2015. Published by Oxford University Press on behalf of the Society for Political Methodology 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

Authors' note: Jonathan Bennett and Michael Egesdal provided helpful comments on an earlier draft. The authors are grateful to the Office of the General Counsel at Harvard University for legal advice. Replication materials (code, not data) for the estimators they describe can be found in the Political Analysis DVN archive: see Gill and Spirling (2015).

References

Christensen, Thomas. 2006. Fostering stability or creating a monster? The rise of China and U.S. policy toward East Asia. International Security 31:81126.Google Scholar
Durbin, James. 1961. Some methods for constructing exact tests. Biometrika 48(1): 4165.Google Scholar
Fearon, James. 1994a. Domestic political audiences and the escalation of international disputes. American Political Science Review 88:577–92.Google Scholar
Fearon, James. 1994b. Signaling versus the balance of power and interests: An empirical test of a crisis bargaining model. Journal of Conflict Resolution 38:236–69.Google Scholar
Fearon, James. 1995. Rationalist explanations for war. International Organization 49:379414.Google Scholar
Gibbs, David. 1995. Secrecy and international relations. Journal of Peace Research 32:213–28.Google Scholar
Gill, Michael, and Spirling, Arthur 2015. Replication data for: Estimating the severity of the WikiLeaks United States diplomatic cables disclosure. Dataverse [Distributor]. URL: http://dx.doi.org/10.7910/DVN/28729.Google Scholar
Goemens, Hein. 2000. War and punishment: The causes of war termination and the first world war. Princeton, NJ: Princeton University Press.Google Scholar
Goodman, Leo. 1954. Some practical techniques in serial number analysis. Journal of the American Statistical Association 49:97112.Google Scholar
Goodman, Leo A. 1952. Serial number analysis. Journal of the American Statistical Association 47:622–34.Google Scholar
Hawkes, A. G. 1971. Spectra of some self-exciting and mutually exciting point processes. Biometrika 58:8390.Google Scholar
Höhle, Michael, and Held, Leonhard 2006. Bayesian estimation of the size of a population. Technical report Discussion Paper 499, Ludwig-Maximilians-Universität München.Google Scholar
Lake, David. 2010. Two cheers for bargaining theory: Assessing rationalist explanations of the Iraq war. International Security 35:752.Google Scholar
Larsen, Richard, and Marx, Morris. 2011. Introduction to mathematical statistics and its applications. Upper Saddle River, NJ: Pearson.Google Scholar
Lewis, Peter. 1965. Some results on tests for Poisson processes. Biometrika 52:6777.Google Scholar
Ogata, Yosihiko. 1988. Statistical models for earthquake occurrences and residual analysis for point processes. Journal of the American Statistical Association 83:927.Google Scholar
Ramsay, Kristopher. 2008. Settling it on the field: Battlefield events and war termination. Journal of Conflict Resolution 52:850–79.Google Scholar
Reed, William. 2003. Information and economic interdependence. Journal of Conflict Resolution 47:5471.Google Scholar
Reiter, Dan. 2009. How wars end. Princeton, NJ: Princeton University Press.Google Scholar
Ruggles, Richard, and Brodie, Henry. 1947. An empirical approach to economic intelligence in World War II. Journal of the American Statistical Association 42:7291.Google Scholar
Sagar, Rahul. 2013. Secrets and leaks: The dilemma of state secrecy. Princeton, NJ: Princeton University Press.Google Scholar
Schultz, Kenneth. 1999. Do democratic institutions constrain or inform? Contrasting two institutional perspectives on democracy and war. International Organization 53:233–66.Google Scholar
Shapiro, Jacob, and Siegel, David. 2010. Is this paper dangerous? Balancing secrecy and openness in counterterrorism. Security Studies 19:6698.Google Scholar
Slantchev, Branislav. 2006. Politicians, the media, and domestic audience costs. International Studies Quarterly 50:445–77.Google Scholar
Smith, Alastair. 1998. International crises and domestic politics. American Political Science Review 92:623–38.Google Scholar
Smith, Alistair, and Stam, Allan. 2004. Bargaining and the nature of war. Journal of Conflict Resolution 48:783813.Google Scholar
Snyder, Jack, and Borghard, Erica D. 2011. The cost of empty threats: A penny, not a pound. American Political Science Review 105:437–56.Google Scholar
Werner, Suzanne. 1999. The precarious nature of peace: Resolving the issues, enforcing the settlement, and renegotiating the terms. American Journal of Political Science 43(3): 912–34.Google Scholar
Supplementary material: PDF

Gill and Spirling supplementary material

Appendix

Download Gill and Spirling supplementary material(PDF)
PDF 209.8 KB