IDG News Service - U.S. Army Private Bradley Manning allegedly was able to copy hundreds of thousands of classified documents from a U.S. Department of Defense network because military officials were more focused on getting critical information to troops quickly than on security, witnesses told a U.S. Senate committee Thursday.
U.S. intelligence and defense officials took a risk in not locking down the classified information in war zones, said Thomas Ferguson, principal deputy under secretary for intelligence at the U.S. Department of Defense. The DOD allowed soldiers to transfer data between its own systems and allied networks so they could "rapidly" respond to conditions in Iraq, he said.
"The focus in the [Iraq] theater was speed and agility," he said. "We took that risk to allow not just Private Manning, but many people who are serving there, to move at that pace."
Manning, who worked in intelligence support in Iraq, allegedly gave hundreds of thousands of classified military and diplomatic documents to WikiLeaks during 2010. He was arrested last May and is awaiting trial on more than 20 charges.
Manning's access to DOD and U.S. Department of State documents came from a "complete breakdown of command authority," said Senator Scott Brown, a Massachusetts Republican.
Brown and other members of the Senate Homeland Security and Governmental Affairs Committee questioned how the DOD could allow a low-level private to allegedly burn hundreds of documents from the DOD's Secret Internet Protocol Router Network (SIPRNet) onto disks from his work computer without being detected. "That baffles me," said Senator Susan Collins, a Maine Republican.
In 2007, Congress passed a law requiring military and intelligence agencies to install audit capabilities and access controls on classified systems, Collins noted. "Those technologies ... are not new," she said. "They're widely used. The serious cyber risk associated with removable media devices, such as thumb drives, has been known for many years."
The DOD began installing host-based security systems on its computers in the U.S in 2008, but it was more difficult to install those security measures on computers in Iraq because of the variety of equipment, Ferguson said. "A lot of the systems there are, for lack of a technical term, cobbled together," he said. "It's sort of a family of systems there."
Collins also asked how Manning had access to classified State Department diplomatic cables about countries that weren't involved in the Iraq war. Several years ago, the DOD asked for State Department documents to be included on SIPRNet as a resource for military members, said Patrick Kennedy, under secretary for management at the State Department.
"We believe, in the interest of information sharing, that it would be a grave mistake and danger to national security for the State Department to try to define" which workers in other agencies should see the diplomatic analysis, Kennedy said. The State Department shares diplomatic information with 65 other agencies, he said.
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!