What should happen to NSA leaker Edward Snowden? Feel free to make comment after voting. | |
pollcode.com free polls |
The recent hoopla over the FBI/NSA analysis of cell phone patterns reminded me of an excellent resource regarding the dilemma of how we must protect ourselves from harm's way versus the need to protect our privacy and civil liberties. Edward Snowden is praised by some, cursed by others. Where's the fine line drawn between a patriotic whistleblower and a treasonous leaker of classified information?
I attempted to find this particular resource, which also covers secret intelligence leaks through Border's Books and Amazon books, but did not succeed. However, it is such a great resource I persisted and finally ferreted it out online for you. You may download it at no charge. The book is entitled, "Who Watches the Watchmen?" by Gary Ross. Enjoy!
According to the Secrecy News, this new book-length study of leaks of classified information published by the Defense Intelligence Agency's National Intelligence University contends that "the tension between maintaining national security secrets and the public right to know cannot be 'solved', but can be better understood and more intelligently managed."
"Who Watches the Watchmen?" by Gary Ross explores the phenomenon of leaks from multiple angles, including their history, their prevalence and their consequences. Most interestingly, he considers the diverse motivations of leakers and of the reporters who solicit, receive and publish their disclosures. Some of these he finds defensible, and others not. In the end, he advises that government officials should engage members of the media in a constructive dialog in order to avert the worst consequences of leaks.
"Proactively engaging with the media to examine the costs and benefits associated with unauthorized disclosures represents the greatest potential for reducing the perceived harm to national security," Mr. Ross wrote.
By contrast, "Maintaining the status quo or attempting to legislate a solution both have proven to be ineffective methods for resolving the dilemma. True change can only occur if the Executive Branch is willing to invest the time and resources necessary to implement an approach focused on engagement with the media."
This is a congenial conclusion, which implies that punitive new legislation can be avoided and that remaining differences between reporters and government officials can be fruitfully discussed. But it arguably misapprehends the harsh new policy landscape in the wake of the WikiLeaks episode (which is also discussed in the book). The status quo has been transformed in response to WikiLeaks in two ways that are unfavorable to leakers, justified or unjustified.
First, the threat of unauthorized disclosures has been elevated in the view of government officials to one of "the most menacing foreign intelligence threats in the next two to three years." During his testimony to the Senate Intelligence Committee, DNI James R. Clapper said that unauthorized disclosures of classified information had "caused significant damage to US interests." Further, he said, "We assess that trusted insiders using their access for malicious intent represent one of today's primary threats to US classified networks." Engagement with the media" will not be the main response to such threats.
And second, WikiLeaks, which targeted legitimate and illegitimate secrets with equal vigor, has inspired and accelerated the development of new forensic tools and methods to identify the sources of unauthorized disclosures. Internal surveillance of classified networks is set to grow, with new mechanisms for tracking and auditing online activity by government employees. Whatever else might be true, the status quo of a few years ago has been left behind.
A good example is this account from his book. It describes "Operation BROADSIDE", where during the 1960s and 1970s, a clandestine listening post inside the U.S. embassy in Moscow intercepted calls made from the limousines of Soviet Politburo members. Intelligence obtained from these intercepts was classified with the code name GAMMA GUPY.346.
Unfortunately, on September 16,1971, columnist Jack Anderson published an article in the Washington Post disclosing the capabilities of the program. Beyond making a veiled reference to the operation or implying a capability, Anderson entitled his article “CIA Eavesdrops on Kremlin Chiefs.” After the disclosure, the Soviets began encrypting these communications.
Akin to journalist Novak willingly taking part in the outing of CIA NOC agent Valerie Plame, journalist Anderson's selfish hunger for a good story harmed America.
Further reading:
- CIA & DEFENSE INTELLIGENCE AGENCY NEED CYBER COUNTERTELLIGENCE GROUP (CCG)
- NEW STUXNET TROJAN WORM CONCERNS INTELLIGENCE COMMUNITY
- PC HACKERS THREATEN OSINT RESEARCHERS
2 comments:
Thanks for the kinds words. Hard copies of 'Watchmen' are now available online at both Amazon and Barnes and Noble. An e-reader version can also be downloaded from the National Intelligence University website (www.ni-u.edu). I continue to lecture on the topic at academic and IC agency events in the DC area. The official website for 'Watchmen' is www.watchmenbook.com. Gary (gary.ross@ymail.com)
Appreciate the compliment. Gary R
Post a Comment