Feeds

Rumsfeld: US govt insufficiently tech-savvy

Administration's PR 'a five-and-dime store' in an 'eBay world'

The Power of One Infographic

US Defence Secretary Donald Rumsfeld has made a speech lamenting the US government's lack of technology in its media operations. He described the administration's PR as "a five-and-dime store" in an "eBay world".

His main point in the four-page soliloquy is that the US Government is less new media-savvy than its detractors. Ironically, many of the administration's detractors have been pointing that out in the media for some time.

In the speech to the Council on Foreign Relations, Rumsfeld complained that while terrorists and such like hate the States 24/7, the Pentagon's PR office only works nine to five.

Here's Rummy's bleeding-edge shopping list of what he sees as the main battlegrounds in the propaganda struggle: Email, blogs, Blackberries, instant messaging, digital cameras, a global internet with no inhibitions, mobile phones, handheld video cameras, talk radio, 24-hour news broadcasts and satellite television.

Whether Mr Rumsfeld is aware of the impending injunction that threatens to bring down the Blackberry network this week is unclear.

To illustrate the "dangerous deficiency" in technologies, Rumsfeld points to last year's deadly riots in the Muslim world over an inaccurate Newsweek report of soldiers flushing a copy of the Koran down a Guantanamo Bay john: "Once aware of the story, the US Military, appropriately, and of necessity, took the time needed to ensure that it had the facts before responding - having to conduct interviews and pore though countless documents, investigations and log books. It was finally determined that the charge was false. But in the meantime the lives had been lost and great damage had been done."

The Pentagon's propaganda machinery needs a little technogrease to compete with the bloggers, reckons Rummy. "In this environment, the old adage that 'a lie can be half way around the world before the truth has its boots on' becomes doubly true with today's technologies," he said. ®

Seven Steps to Software Security

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.