Wikileaks Embasy Cables

My information is old, I was in the Air Force from 1974 to 1978 and again from 1980 to 1984 so, much could have changed since then.

The Wikileaks situation brings to mind at least two problems with what happened.

The part that seems the most obvious, to me, is the use of USB drives to transfer the information. These handy little gadgets can store information in the Gigabyte range, which is to say in the 1,000,000,000,000 of characters. Information can be download to the USB drive and then transfered to another computer, which is what the leaker seems to have done.
Even TV has dealt with this problem, and it was featured on several of the NCIS shows so, maybe the DoD should watch more TV.

What little information I had seen on the subject suggest that the easiest way to prevent this is to not install the USB ports but, since most computer have a mouse and keyboard that work off of the USB port that would render the computer useless. Something could be done to prevent the use of the USB drives on the computer but, you either have to control if in the computers system, which can be circumvented by the user, or through having the computer boot entirely through the network. I have to admit that I do not really know how much trouble it would be to have each computer, desktop or laptop, boot from a central network. I took a CCNA class at the Sarasota County Tech. Inst. some years ago and the class room computer seemed to do just that, though they did allow use of the USB ports.

That solution seems to be prohibitive, so maybe what they should have looked at was the old fashioned method of information sharing based on Clarence.

I don’t know of many jobs in the service where a person would have less that Secret, I was in the Air Force Security Police, and had Secret the whole time, with the exception of one unit I was assigned to in Korea where I was required to have a TS/SCI clearance. Even the guy who came into the building to fix the A/C had to have a TS/SCI, as there was classified equipment everywhere you looked.
In tech shool we were told that access to classified material was governed by three things, Clearance level suited to the information, need to have the information, such as a job requirement, and authorization.

I need to read some more on this and maybe it will find an explaination of why he was able to get into sensitive State Department files from a DoD network?

I know they guys on TV can get into the computers from other agencies but, I had hopped that the real government would have a little more on the ball than that.

Leave a Reply

%d bloggers like this: