.

Thursday, January 24, 2019

Bradley Manning Responsible For the Largest Intelligence Leak in the History of the United States Essay

Bradley Manning Responsible For the Largest Intelligence Leak in the History of the coupled utters (Your Name Here)UMUC CSIA 301Bradley Manning may be responsible for the bangingst cognizance leak in the history of the United States . The U.S. Government alleges that Bradley Manning was responsible for leaking class give-and-take, causing it to be published on the internet which make it available to the enemy. The Government has aerated Manning with 22 charges under the Uniformed Code of Military Justice, UCMJ, to include espionage. If convicted, Manning could face confinement for life or the death penalty . In an reference with Frontline, Adrian Lamo, a convicted hacker, states that Manning contacted him via online converse and confessed that he had leaked hundreds of documents to Julian Assange, the editor of a website called WikiLeaks. flake of BreachBradley Manning is an example of the most dangerous type of enemy, an insider. Insiders pose ane of the greatest securi ty threats. The main aspect that makes insiders such a buckram threat is the amount of data they lay down approaching to . In an interview with Adrian Lamo, Manning boasted about the amount of information he leaked to WikiLeaks. He claimed to know leaked, 250,000 State segment diplomatic cables and 500,000 classified field reports from the wars in Iraq and Afghanistan . Being charged with espionage, Bradley Manning is one of the most dangerous types of insiders, because the information he leaked potentially be sick American lives in danger and caused harm to our nation.Bradley Manning was not driven by the same motivation that drives most people who commit crimes such as the ones that Manning has been accused of. Manning was not motivated by financial gain. He claims that he leaked the information because the information needed to be in public view. He has expressed an extreme dislike for the US troops and the way the US Government conducts its self in the global arena. He cl aims that he could pay off sold this information to the Chinese or Russians, but instead chose to book it to WikiLeaks via Julian Assange . How the Breach OccurredThe question arises how Bradley Manning gained access to such a large quantity of countersign. Since September 11, 2001, the 9/11 Commission has changed the way intelligence agencies handle information sharing. Agencies now share keen intelligence with each other, because it is believed that if that policy had been in place earlier then the tragedy on September 11 could have been avoided. Manning had access to the network know as the Secrete Internet Protocol Router Network, or SIPRNet. SIPRNet is where Manning downloaded most of the information he leaked. Manning was an intelligence analyst. His job was information aggregation. He would analyze large amounts of crank intelligence and form it into smaller, more concise reports . This is not what Manning leaked, he leaked raw intelligence.Some of this raw intellige nce was uploaded to WikiLeaks via the internet, however the majority of the data was downloaded onto jam disks. Manning recalls one instance to Lamo about downloading data to a disk labeled Lady Gaga. In an online communication with Lamo, Manning wrote, No one had ever interpreted note of him, and no one did now everyone just sat at their workstations watching music videos / car chases / buildings exploding and writing more stuff to CD/DVD. In order to download large amounts of raw pertinent data, Manning uploaded data digging software. This software allows one to sort or index number files on a computer or network. Then a try for key words will select the information based on desired parameters .Lamo suggests this implicates Julian Assange as a coconspirator in espionage with Manning. He claims that Assange gave Manning the parameters for the information that would be the most useful. If it can be proven that WikiLeaks coached or persuaded Manning to steal classified informat ion then everyone involved can be charged with espionage. WikiLeaks operates under the unique model that all sources are mystical to them and the information they are given is unsolicited. If these two conditions are met, WikiLeaks is not blameworthy of collusion . The Information Security TriadThe primary point of alter to the Information Security Triad by Manning is Confidentiality. By downloading raw intelligence from SIPRNet Manning did not damage the integrity or the availability of the data. This would have been remote to his goal. Manning planned to release the information. The information would have been useless if it had been altered or made unavailable, and this could have potentially made it easier for him to get caught. He neer planned to get caught. Manning was arrested as a direct result of the online chat conversations he had with Lamo, not from the Army discovering what he had been up to. Technological Improvements that Would economic aid Prevent Recurrence Some technological improvements that could have prevented Manning from stealing classified information would be to disable USB ports through the BIOS and password harbor the BIOS. If computers had CD ROMs not burners then it would not be possible to download all information from a network onto a disk using Department of Defense, DOD, computers. It has not been clearly published how Manning was able to upload data mining software on his computer or on the SIPRNet. These points were brought up in a congressional hearing where Senator Collins brought up the point that the intelligence community was already required to have audit capabilities installed by 2007.This could have helped expose the fact that more than a quarter of a cardinal classified documents were downloaded in less than two months. Role-based access to secure systems is withal another possible solution. This would mean that all information of a accredited clearance level would not be accessible to everyone with that same clearance. Role-based access would be used in conjunction with the mandatory access work that is currently in place. This would have limited the amount of information that Manning would have had access to .The extent of damage Bradley Manning has done to intelligence sharing or US operations overseas cannot be quantified. The effects are similarly far reaching and still ongoing. Bradley Manning is still being held in prison awaiting trial. Many are calling Manning a whistle-blower. Whistle blowers release specific information of an embarrassing, illegal or negligent nature to right some(a) wrong. Manning potentially put American lives in danger by purgative vast amounts of data from unnamed sources. Manning was operating on the hacker presumptuousness that all information should be free. There are people that protect our freedom and rely on confidentiality of information to stay alive. Manning is not a whistle-blower or a hero as many online publications would sugges t. He is a sad case of an individual given to much state we can only hope our intelligence community moves forward and not backward as a result of Bradley Mannings actions.Works CitedAffairs, M. P. (2011, bunt 3). Manning faces more charges for classified leaks. Retrieved from The Official Home Page of the United States Army http//www.army.mil/article/52773/ Fishman, S. (2011, July 3). Bradley Mannings Army of One How a lonely, five-foot-two, gender-questioning soldier became a WikiLeaks hero, a traitor to the U.S., and one of the most unusual revolutionaries in American history. Retrieved from New York News & Features http//nymag.com/news/features/bradley-manning-2011-7/ INFORMATION SHARING IN THE ERA OF WIKILEAKS BALANCING SECURITY AND COLLABORATION, S. Hrg. 112-219 (ONE HUNDRED TWELFTH CONGRESS premier(prenominal) SESSION March 10, 2011). Retrieved from http//www.gpo.gov/fdsys/pkg/CHRG-112shrg66677/html/CHRG-112shrg66677.htm Lamo, A. (2011, May 24). WikiSecrets. Frontline. PBS. Retrieved from http//video.pbs.org/video/1946795242/ Miles, D. (2012, June 6). News American Forces Press Service. Retrieved from U.S. Department of Defense http//www.defense.gov/news/newsarticle.aspx?id=116654 Miller, B. H. (2011, September).The Death of Secrecy inquire to Knowwith. Studies in Intelligence, 55(3), 13-18. Retrieved from https//www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csistudies/studies/vol.-55-no.-3/pdfs/Studies%2055-3%20-7-Oct-2011.pdf Pfleeger, C. P., & Pfleeger, S. L. (2006). Security in reckon (4th Edition). Upper Saddle River, NJ, USA Prentice Hall PTR. Wendy, G. (2011, April). Aggregation the underground risk. Computer Fraud & Security, 2011(4), 18-20. Retrieved from http//dx.doi.org.ezproxy.umuc.edu/10.1016/S1361-3723(11)70043-4 Zetter, K. (2011, April 4). Army Manning Snuck Data-Mining Software Onto Secret Network. Retrieved from equip http//www.wired.com/threatlevel/2011/04/manning-data-mining/

No comments:

Post a Comment