British Army intelligence sources suspect the mapping software is being used in some rogue attacks.
Terrorists in Basra, Iraq, have turned Google Earth into a tool for targeting attacks, according to The Daily Telegraph, a U.K. newspaper.
Citing unnamed British Army intelligence sources, the Telegraph said that documents recovered from the homes of insurgents included print-outs of Google Earth images with notations detailing the longitude and latitude of a British military camp.
The article quotes the unidentified intelligence officer as saying, "We believe they use Google Earth to identify the most vulnerable areas such as tents," and notes that one solider has been killed and several wounded in mortar attacks at the camp in question.
The implication that Google Earth bears some measure of responsibility is dubious considering the mapping software has its limitations.
Google spokesperson Rachel Whetstone said she was unable to comment on whether or not Google had spoken with British military representatives about this issue. She did say, however, that Google was receptive to such concerns when raised.
This isn't the first time that Google's avowed mission "to organize the world's information and make it universally accessible and useful" has collided with the military need for secrecy.
In December 2005, the New York Timesreported (registration required) that the governments of India, Russia, and South Korea, among others, were concerned that Google Earth images might reveal too much about their military bases.
A complicating factor in this controversy is that Google isn't actually using satellites to spy on anyone. The company buys its images from the likes of DigitalGlobe, an imagery company based in Colorado.
Whetstone said many people were aware of this. "I think there is a very clear understanding that you can get the information on Google Earth from other sources," she said. "The information all comes from third parties. Google Earth imagery, on the whole, is used for the purposes for which it was intended. Sadly, some things in life can be used for things we might not want them to be used for."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.