IDG News Service - U.S. Army Private Bradley Manning allegedly was able to copy hundreds of thousands of classified documents from a U.S. Department of Defense network because military officials were more focused on getting critical information to troops quickly than on security, witnesses told a U.S. Senate committee Thursday.
U.S. intelligence and defense officials took a risk in not locking down the classified information in war zones, said Thomas Ferguson, principal deputy under secretary for intelligence at the U.S. Department of Defense. The DOD allowed soldiers to transfer data between its own systems and allied networks so they could "rapidly" respond to conditions in Iraq, he said.
"The focus in the [Iraq] theater was speed and agility," he said. "We took that risk to allow not just Private Manning, but many people who are serving there, to move at that pace."
Manning, who worked in intelligence support in Iraq, allegedly gave hundreds of thousands of classified military and diplomatic documents to WikiLeaks during 2010. He was arrested last May and is awaiting trial on more than 20 charges.
Manning's access to DOD and U.S. Department of State documents came from a "complete breakdown of command authority," said Senator Scott Brown, a Massachusetts Republican.
Brown and other members of the Senate Homeland Security and Governmental Affairs Committee questioned how the DOD could allow a low-level private to allegedly burn hundreds of documents from the DOD's Secret Internet Protocol Router Network (SIPRNet) onto disks from his work computer without being detected. "That baffles me," said Senator Susan Collins, a Maine Republican.
In 2007, Congress passed a law requiring military and intelligence agencies to install audit capabilities and access controls on classified systems, Collins noted. "Those technologies ... are not new," she said. "They're widely used. The serious cyber risk associated with removable media devices, such as thumb drives, has been known for many years."
The DOD began installing host-based security systems on its computers in the U.S in 2008, but it was more difficult to install those security measures on computers in Iraq because of the variety of equipment, Ferguson said. "A lot of the systems there are, for lack of a technical term, cobbled together," he said. "It's sort of a family of systems there."
Collins also asked how Manning had access to classified State Department diplomatic cables about countries that weren't involved in the Iraq war. Several years ago, the DOD asked for State Department documents to be included on SIPRNet as a resource for military members, said Patrick Kennedy, under secretary for management at the State Department.
"We believe, in the interest of information sharing, that it would be a grave mistake and danger to national security for the State Department to try to define" which workers in other agencies should see the diplomatic analysis, Kennedy said. The State Department shares diplomatic information with 65 other agencies, he said.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts