{"id":4702,"date":"2016-10-14T12:01:42","date_gmt":"2016-10-14T16:01:42","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4702"},"modified":"2020-06-04T20:52:59","modified_gmt":"2020-06-04T20:52:59","slug":"government-secrets-really-secret","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/government-secrets-really-secret\/","title":{"rendered":"Are U.S. Government Secrets Really \u201cSecret\u201d Anymore?"},"content":{"rendered":"<h2>How the NSA Has Failed to Implement Secure Procedures Post-Snowden, and the Most Recent Case of Stolen Confidential Material from The U.S. Government<\/h2>\n<p>Following the close of an investigation conducted by the Federal Bureau of Investigation (\u201cFBI\u201d) and the United States Department of Justice into the potential leak of classified national security information by Presidential nominee Hilary Clinton, the national security of the United States has once again become potentially compromised. \u00a0\u00a0The most recent leak of top-secret information from the National Security Agency is one of nearly a half dozen that have occurred in the last three years.<br \/>\nIn early June 2013, The Guardian Newspaper reported that the US National Security Agency (\u201cNSA\u201d) possessed <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.bbc.com\/news\/world-us-canada-23123964\">a secret court order directing Verizon Wireless to hand over all its telephone data to the NSA on an \u201congoing daily basis<\/a><\/span>\u201d.\u00a0 The report was followed by disclosures that the NSA had tapped directly into the servers of nine Internet firms including Google, Microsoft, Yahoo, and Facebook to track online communication through a surveillance program known as Prism.\u00a0 It didn\u2019t take long for some large floodgates to break open, exposing NSA surveillance and spying on citizens and Presidents of many other countries including China, Russia, Italy, Brazil, Germany, and EU embassies.\u00a0 Shortly thereafter, The Guardian revealed that ex-CIA systems analyst Edward Snowden was responsible for the top-secret leaks.<\/p>\n<blockquote><p><span style=\"color: #0000ff\"><span style=\"color: #000000\">\u201c<\/span><a style=\"color: #0000ff\" href=\"http:\/\/www.bbc.com\/news\/world-us-canada-23123964\">Documents leaked to the Washington Post during the course of this scandal suggested that the NSA breaks US privacy laws hundreds of times every year.\u00a0 Further, the papers revealed that US citizens were inadvertently snooped on for reasons including typing mistakes and errors in the [surveillance] system.\u201d<\/a><\/span><\/p><\/blockquote>\n<p>&nbsp;<br \/>\nThree years later, the NSA is again under intense scrutiny for its handling of government secrets, and particularly for its reliance on outside contractors employed by Booz Allen Hamilton Holding Corp, the same consulting company that employed Edward Snowden. This time, a man name Harold Martin has been <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/government-contractor-arrested-for-stealing-top-secret-data\/2016\/10\/05\/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html\">arrested and charged with the theft of classified government property and the unauthorized removal and retention of classified materials<\/a><\/span>.\u00a0 He is suspected of hoarding the top-secret material in his house and his car for more than a decade.\u00a0 Top secret is the highest level of government classification and is defined by the government as material that if disclosed, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.cnn.com\/2016\/10\/05\/politics\/intelligence-contractor-arrested-stealing-secrets\/\">\u201creasonably could be expected to cause exceptionally grave damage to the national security.\u201d<\/a><\/span><br \/>\nHowever, it\u2019s been questioned whether Martin can be said to have had the same motivations as Snowden did in the taking of confidential information.\u00a0 While Snowden stole an immense amount of documents and passed them on to journalists to shed light on massive government surveillance programs, Martin has admitted to knowingly possessing top-secret information among his possessions in his home and his car, but his intentions are still unclear.\u00a0 In August, files from high-tech hacking tools that were developed by the NSA were posted online by an anonymous group that called itself the ShadowBrokers.\u00a0 Part of that breach included 300 megabytes of tools and techniques used to infiltrate computer firewalls.\u00a0 Authorities are still unsure whether Martin, who had top secret security clearance, was responsible for this recent leak of NSA hacking tools released online, which is still an leak that has yet to be resolved.\u00a0 Martin possessed some documents that had the same date as some of those documents uploaded by the ShadowBrokers in their leak.<br \/>\nIn 2011, <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/government-contractor-arrested-for-stealing-top-secret-data\/2016\/10\/05\/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html\">President Obama created the National Insider Threat Task Force to assist in the efforts of detecting and deterring high priority leaks<\/a><\/span>.\u00a0 The Obama Administration along with the Justice Department has made it their priority to prosecute leakers, and have prosecuted more than all of its predecessors combined.\u00a0 After the Snowden disclosures, the <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/government-contractor-arrested-for-stealing-top-secret-data\/2016\/10\/05\/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html\">NSA adopted new technical measures to control information, instituted new rules on downloading sensitive data, and implemented audit trails and more frequent screenings of network access by system administrators<\/a><\/span>.\u00a0 The number of people who have access to classified information has also been reduced by seventeen percent in the last few years. However a representative from the House Intelligence Committee said Martin\u2019s arrest made it <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"https:\/\/www.washingtonpost.com\/world\/national-security\/government-contractor-arrested-for-stealing-top-secret-data\/2016\/10\/05\/99eeb62a-8b19-11e6-875e-2c1bfe943b66_story.html\">\u201cpainfully clear that the Intelligence Community still has much to do to institutionalize reforms designed to protect in advance the nation\u2019s sources and methods from insider threats.\u201d<\/a>\u00a0 Cybersecurity specialist James Lewis notes, <a style=\"color: #0000ff\" href=\"http:\/\/www.bloomberg.com\/politics\/articles\/2016-10-05\/nsa-contractor-s-arrest-renews-focus-on-risk-posed-by-insiders\">\u201cThis was not supposed to happen again.\u201d<\/a><\/span>\u00a0 Most of those who work with intelligence agencies are <span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.bloomberg.com\/politics\/articles\/2016-10-05\/nsa-contractor-s-arrest-renews-focus-on-risk-posed-by-insiders\">\u201chighly motivated and very patriotic and wouldn\u2019t do this.\u00a0 But you only need one and that\u2019s why they\u2019re having trouble.\u201d<\/a><\/span><br \/>\nMartin\u2019s case seems to be a much more subtle threat to U.S. security compared to that of Snowden, however, it is also a much harder sort of insider threat to detect when an individual keeps those documents among their own possessions.\u00a0 Even though NSA employees with top-secret security clearance are being continuously reevaluated for any possible threats, it is almost impossible to prevent an insider who is intent on stealing data from doing so.\u00a0 It is still suggested that more work can be done to reduce the chance of another Snowden case, especially in terms of the security of the people and computer networks that house some of America\u2019s most closely held secrets<span style=\"color: #0000ff\"><a style=\"color: #0000ff\" href=\"http:\/\/www.defenseone.com\/technology\/2016\/10\/data-theft-arrest-shows-insider-threat-remains-despite-post-snowden-security-improvements\/132196\/\">.\u00a0 NSA has yet to effectively implement its post-Snowden security improvements<\/a><\/span>, which if action is not taken soon in the wake of the Martin case, may lead to even more confidential information leaks with the increase in advanced technologies across the globe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How the NSA Has Failed to Implement Secure Procedures Post-Snowden, and the Most Recent Case of Stolen Confidential Material from The U.S. Government Following the close of an investigation conducted by the Federal Bureau of Investigation (\u201cFBI\u201d) and the United States Department of Justice into the potential leak of classified national security information by Presidential <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/government-secrets-really-secret\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4703,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4702"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4702"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4702\/revisions"}],"predecessor-version":[{"id":7160,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4702\/revisions\/7160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4703"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}