By Jim Garamone
American Forces Press Service
The website published the documents that detail private
diplomatic discussions with foreign governments. The cables are candid reports by diplomats and, seen by themselves, can give an incomplete picture of the relationship between the U.S. and the foreign governments, White House officials said. United States
The cables are not expressions of policy, nor do they always shape final policy decisions. “Nevertheless, these cables could compromise private discussions with foreign governments and opposition leaders, and when the substance of private conversations is printed on the front pages of newspapers across the world, it can deeply impact not only U.S. foreign policy interests, but those of our allies and friends around the world,” White House spokesman Robert Gibbs said in a press release.
“To be clear, such disclosures put at risk our diplomats, intelligence professionals, and people around the world who come to the
for assistance in promoting democracy and open government,” he continued. United States
The release of the documents may risk the lives of diplomats and friends living under repressive regimes. The
stands for responsible, open government at home and around the world, Gibbs said. United States
“This reckless and dangerous action runs counter to that goal,” he said. “By releasing stolen and classified documents, Wikileaks has put at risk not only the cause of human rights but also the lives and work of these individuals. We condemn in the strongest terms the unauthorized disclosure of classified documents and sensitive national security information.”
Today’s posting is the third WikiLeaks publication of sensitive
documents. The last publication included military and intelligence reports from U.S. , and another contained similar documents from Afghanistan . Newspaper and magazine journalists in the Iraq and United States Europe received and reviewed the documents from WikiLeaks and have written stories on their content.
The Pentagon has put in place methods to minimize such thefts of classified materials.
“It is now much more difficult for a determined actor to get access to and move information outside of authorized channels,” Pentagon spokesman Bryan Whitman said in a written statement following publication of news articles on the documents today.
The theft of the materials traces to the lack of sharing of information and intelligence prior to and after the Sept.11, 2001 terrorist attacks. The commission studying the environment at the time found that agencies weren’t sharing enough information with each other. While stopping short of saying better sharing could have prevented the attacks, the 9-11 Commission pointed this out as a weakness that needed to be closed.
Federal officials responded by working to push out more information and intelligence in an effort to strike a balance between the “need to know” and the need to “share to win.”
“Departments and agencies have taken significant steps to reduce those obstacles, and the work that has been done to date has resulted in considerable improvement in information-sharing and increased cooperation across government operations,” Whitman said.
The effort backfired in that it made it easier for individuals or groups inside the process to steal the information. DOD responded by putting in place policies to prevent such occurrences, while still giving information and intelligence to the people who need it most – those confronting the realities of terrorism.
Defense Secretary Robert M. Gates ordered two reviews of information and intelligence sharing in August.
The review called on DOD systems to disable all “write” capability for removable media on classified computers to mitigate the risks of personnel moving classified data to unclassified systems, Whitman said.
The reviews also direct DOD organizations to have a limited number of systems authorized to move data from classified to unclassified systems, he said.
DOD organizations are also implementing two-person handling rules for moving data from classified to unclassified systems to ensure proper oversight and reduce chances of unauthorized release of classified material, Whitman said.
DOD is also taking a page from credit card companies which monitor patterns and detect suspicious or anomalous behavior. Some 60 percent of DOD’s classified net is now using a host-based security system – an automated way of controlling the computer system with a capability of monitoring unusual data access or usage. The department is speeding deployment to the rest of the classified system, Whitman said.
In addition, the department is conducting security oversight inspections in forward-deployed areas, undertaking vulnerability assessments of DOD networks and improving awareness and compliance with information protection procedures.
U.S. Central Command, for example, has increased insider threat training for its intelligence professionals and
started multidiscipline training between traditional security, law enforcement and information assurance at all echelons.
The command also has established insider threat working groups to address the Wikileaks incident and prevent reoccurrence.