Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Wikileaks case puts focus on digital security challenges
by Staff Writers
Washington (AFP) July 26, 2010


Top US lawmaker: Afghan war leakers belong in jail
Washington (AFP) July 26, 2010 - A top US lawmaker on Monday blasted the source of a huge cache of leaked military documents on the Afghan war and said such leakers belong in the "orange jump suits" of jailed criminals. "It is shocking that any American, much less someone in the Pentagon, would betray his country and possibly put our soldiers at risk by leaking information on the ongoing war in Afghanistan," said the senior Republican on the Senate Intelligence Committee, Kit Bond. "The damage to our national security caused by leaks like this won't stop until we see more perpetrators in orange jump suits," Bond said in a statement.

Another senior US lawmaker, House Armed Services Committee chairman Ike Skelton, warned against judging Pakistan's role in the Afghan war by "outdated reports" from the vast disclosure. "Some of these documents implicate Pakistan in aiding the Taliban and fueling the insurgency in Afghanistan," Skelton, a Democrat, said in a statement. "It is critical that we not use outdated reports to paint a picture of the cooperation of Pakistan in our efforts in Afghanistan," he stressed, adding that Pakistan had "significantly stepped up its fight against the Taliban."

"While we still have concerns about Pakistan's efforts against the Afghan Taliban, there is no doubt that there have been significant improvements in its overall effort," said Skelton. Skelton also slammed the whistleblowing website Wikileaks for "recklessness" in making public the roughly 92,000 military files and field reports, billed as perhaps the largest leak in US military history. "Our nation's secrets are classified for a reason, and the release of classified documents could put our national security -- and the lives of our men and women in combat -- at serious risk," Skelton said in a statement.

At the same time, Skelton said the "troubling" documents seemed to support his criticism of the war effort since it began in late 2001, but insisted US President Barack Obama's troop "surge," announced in December 2009, would right the faltering campaign. "Under the new counterinsurgency strategy implemented earlier this year, we now have the pieces in place to turn things around. These leaked reports pre-date our new strategy in Afghanistan and should not be used as a measure of success or a determining factor in our continued mission there," said Skelton. But Democratic Representative Dennis Kucinich, a leading critic of the war who has called for a US withdrawal, said the leak showed "Congress must say no to war funding, bring our troops home, and invest in the American recovery." "We can no longer look the other way, or pretend that the war is something that is it not. Occupying Afghanistan does not help further the freedom of the Afghan people," Kucinich said in a statement. "It is not the leak of documents that endangers the lives of American troops and our allies, it is the belief that occupying Afghanistan will make us safer," he said.

The massive release of secret Pentagon documents by Wikileaks highlights the security challenges of the digital age, when gigabytes of stolen data can be shared in one click, analysts said Monday.

"I think about this in relationship to the Pentagon Papers," said James Lewis, a cybersecurity expert at the Center for Strategic and International Studies (CSIS), of the 1971 leak of Pentagon files about the Vietnam War.

"The difference with the Pentagon Papers is that Daniel Ellsberg took a huge sheaf of paper and gave it to a reporter," Lewis told AFP. "Now you can take even more documents and give them to the whole world."

Wikileaks has not identified the source of the classified documents it obtained but suspicion has fallen on Bradley Manning, a US Army intelligence analyst who is currently being held in a military jail in Kuwait.

Manning was arrested in May following the release by Wikileaks of video footage of a US Apache helicopter strike in Iraq in which civilians died and has been charged with delivering defense information to an unauthorized source.

The Pentagon in June said it was probing allegations that Manning supplied classified video and 260,000 secret diplomatic cables to WikiLeaks.

Lewis said the Pentagon, like any organization, is going to have "bad actors" -- insiders who turn against their employer -- "but now it's a lot easier for them to do things like this."

A former Pentagon official said the digital communications revolution, while bringing huge benefits to society overall, also raised security concerns.

"The proliferation of digital media and social software is certainly going to increase the risks of things like this happening," said the official, who declined to be identified because he still plays an active role in national security policy issues.

"Security is always going to be a balance between convenience and security," the former official told AFP. "It's always a tradeoff between functionality and security and the pendulum has swung way to the functionality side."

He cited a controversial Pentagon ban last year on the use of thumb drives by military personnel. "They've now reallowed them but with special thumb drives that are encrypted and tamper proof," he said.

"You've got to rethink how you secure information," said Lewis, who heads the technology and public policy program at the Washington-based CSIS think tank.

"In the paper world, I got a document that had top secret stamped on it and the government trusted that I wouldn't take that piece of paper and share it. Maybe in the paper world that was OK but it's not for the digital," he said.

In the Internet era "we share information by using technology so that everyone can access databases and see documents and they're all stored somewhere," Lewis said.

"But the way we control that access is based on an older model, it's pretty much personal trust," the cybersecurity expert said. "The Pentagon trusts its employees, which is good, but it's not enough."

Lewis said a "more mature system would have said 'Why is somebody downloading thousands of documents?'" and sent out red flags.

"We don't know how it worked in the Wikileaks case, but a big oil company I know, if you were downloading massive amounts of stuff they would turn off your machine," he said. "You ask 'Why is someone storing all this?'"

Don Jackson of SecureWorks said military security clearances, access and "need-to-know" requirements are "based on the analog world, where the worst you had to worry about was information like this being published in a newspaper.

"Something like Wikileaks is not something you had to worry about before the Internet," said Jackson, a security researcher with the counter-threat unit at the information security firm.

"The newspaper can't publish 90,000 documents but Wikileaks can do it in a matter of seconds," he said.

The former Pentagon official said he "deplored" the release of classified information about Afghanistan and Pakistan but said he hoped it would not result in a rollback of the military's tentative embrace of social media.

"It should not be used as justification to try to discourage people from understanding new media and finding out how to use it more effectively," the former official said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Internet warriors hone skills at Black Hat - DefCon
San Francisco (AFP) July 26, 2010
Internet warriors are gathering this week to explore chinks in the armors of computers, bank teller machines, mobile phones, power grids, and other "smart" devices intrinsic to modern life. Black Hat USA kicks off in Las Vegas on Wednesday with briefings at which security professionals from technology firms including Microsoft and Cisco will dissect ways to safeguard or foil computers. B ... read more


CYBER WARS
Caltech Team Finds Evidence Of Water In Moon Minerals

Water On The Moon Is Widespread

Two charged with stealing Neil Armstrong customs form

Scientists debate meaning of moon 'holes'

CYBER WARS
Curiosity Rover Grows By Leaps And Bounds

NASA Spacecraft Camera Yields Most Accurate Mars Map Ever

Opportunity In Good Health And Continues To Drive

Orbiter Puts Itself Into Standby Safe Mode

CYBER WARS
Iran aims to send man into space in nine years

House Committee Sets Realistic And Sustainable Path For NASA

Children Blast Off To The Moon At Summer Space Camp

Soviet, US astronauts mark 35 years since space handshake

CYBER WARS
China Contributes To Space-Based Information Access A Lot

China Sends Research Satellite Into Space

China eyes Argentina for space antenna

Seven More For Shenzhou

CYBER WARS
ISS Crew Perform Spacewalk

Astrium Will Develop The Atomic Clock Ensemble In Space (ACES) For ESA

Apollo-Soyuz: An Orbital Partnership Begins

NASA Selects Student Experiments For Space Station

CYBER WARS
Ariane 5 Is Ready For Its Payload Integration

NASA Tests Launch Abort System At Supersonic Speeds

Sea Launch Signs Launch Agreement With AsiaSat

ILS Successfully Launches The Echostar XV

CYBER WARS
Detector Technology Could Help NASA Find Earth-Like Exoplanets

NASA Finds Super-Hot Planet With Unique Comet-Like Tail

Recipes For Renegade Planets

First Directly Imaged Planet Confirmed Around Sun-Like Star

CYBER WARS
Boeing Completes Critical Design Review Of Intelsat 22 Spacecraft

Tablets may allow a 're-set' for news industry: News Corp.

e2v Delivers Over 150 Imaging Sensors For ESA's Galaxy Mapping Mission Gaia

Final Instruments On NASA Climate/Weather Satellite Integrated




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement