THE MAGAZINE

WikiLeaks' Information-Sharing Fallout

By Joseph Straw
The legislators who passed a law requiring the intelligence community to create the type of global information sharing environment (ISE) recommended by the 9/11 Commission envisioned a world in which a junior military intelligence analyst in Iraq would have access to all the information relevant to his mission: historical background, human and signals intelligence, even diplomats’ perspectives on the country’s political circumstances. Synthesized, the data could help detect emerging threats before they materialized.
 
What they did not envision was how that world of shared information would facilitate one of the largest insider information thefts in U.S. government history, but that may be exactly what happened if in fact, as alleged, Army Private First Class Bradley Manning stole documents including roughly 260,000 classified State Department cables.
 
Manning is alleged to have then provided the stolen documents to the activist organization WikiLeaks, which has subsequently released several thousand of them, not only causing embarrassment but also endangering lives, according to leaders of the U.S. intelligence community.
 
In response, agencies have taken reactionary measures, such as the State Department’s removal of its diplomatic database from the Secret Internet Protocol Network (SIPN), which is the governmentwide nonpublic network to which Manning enjoyed full access. The ISE—never fully embraced, in particular by the intelligence community—is now viewed with renewed skepticism by member agencies throughout the government.
 
Director of National Intelligence (DNI) James Clapper, whose responsibilities include overseeing the ISE, told a conference hosted by the Bipartisan Policy Center that “the WikiLeaks episode represents what I would call a big yellow flag, and I think it’s going to have a chilling effect on the need to share.”
 
To address the problem, the White House announced a series of action items, focused primarily on technology, aimed at boosting the security of government information and increasing the confidence individuals and agencies must have before they will share data under the ISE.
 
Among the action items were directives for the U.S. Department of Defense to assess network vulnerability, institute more robust network monitoring capable of detecting large or unauthorized data transfers, and develop better staff training to increase awareness and help in detection of insider threats.
 
Major General Dale Meyerrose (USAF-ret.), former associate director of national intelligence/chief information officer and information sharing executive for the Office of the DNI, favors placing the emphasis on human, rather than technological, security.
 
Meyerrose, currently vice president and general manager of cyber integrated solutions for Harris Corporation, warns against blaming the “techies” for the Manning leak and against relying solely on them for solutions. Policy and technical controls—combined with awareness training and vigilance—will help going forward, Meyerrose says, but even they have their limits.
 
James Carafano, a defense and homeland security scholar at The Heritage Foundation in Washington, D.C., agrees that technology is not a panacea. “The security at the end of the day is only as good as the people, not the technology. Technology is so dynamic,” he says.

 

Comments

 

The Magazine — Past Issues

 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.