News / Asia

WikiLeaks Exploits Weaknesses in Technology, Human Nature

An employee of Korea Internet Security Center works at a monitoring room in Seoul, South Korea. There is no kill switch for the Internet for the White House. Yet when Congress was exploring ways to secure computer networks, a plan to give the president th
An employee of Korea Internet Security Center works at a monitoring room in Seoul, South Korea. There is no kill switch for the Internet for the White House. Yet when Congress was exploring ways to secure computer networks, a plan to give the president th

Historians, anti-war activists and armchair observers of human nature have had plenty to mull over in recent years thanks to the online group WikiLeaks.

The Web site has published hundreds of thousands of stolen U.S. military and diplomatic documents from as recently as February of this year and as far back as the 1960s. The latest round of leaks, involving diplomatic cables, has renewed efforts by the U.S. government to tighten security on its computer systems.  But cyber-security experts point out the leaks were less a breakdown of technology than of trust.

That fact now has the U.S. government scrambling to secure its computer networks. But Bruce Schneier, British Telecom's chief security technology officer, says even the most secure systems will still be vulnerable to human nature.

"You could take a computer, bury it in the ground, make sure you never turn it on," Schneier says. "Don't tell anybody where it is and it's probably pretty secure. But as soon as you turn it on and have people look at it, you have to trust the people."

Listen to Kate Woodsome's interview with Bruce Schneier


Tightening security

The U.S. Defense and State Departments say they are working to limit users' ability to download material onto removable media, like CDs and USB "thumb drives." And they are working to better track suspicious behavior.

"In general, I think reducing the capabilities of the hardware is probably not the way to go," Schneier says. "Although as a temporary measure after this has already happened, it’s seems like an okay, quick solution. But long-term, it seems kind of dumb."

He says a better solution would be to limit access to the diplomatic cables in the first place. "Make sure people who only need to know them have access to them. And make sure that people who read them, make sure an audit log record is kept."

But that wasn't the case when U.S. Army intelligence specialist Private Bradley Manning allegedly committed one of the biggest information breaches in U.S. history while listening to Lady Gaga's hit song "Telephone." Manning says he lip-synched the words to the song while downloading a quarter-million classified diplomatic cables from the Defense Department's data network onto a Lady Gaga CD.

If access was far more limited, as Schneier recommends, there's no way Private Manning and his Lady Gaga tunes could have touched the network and all the diplomatic cables it stored. But he did. Because at that time, government agencies were sharing more intelligence in the wake of the September 11 terrorist attacks in 2001.

This week, U.S. Defense Secretary Robert Gates told reporters the procedures spread information too widely.   

Demystifying state secrets

Instead of rolling back information sharing, says Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, the U.S. government instead should keep fewer secrets.

"If we kept less information classified, it would be an easier, more manageable task to protect that smaller volume of information," Aftergood says. "When you start getting into tens of millions of secrets being produced every year, you can easily swamp the system and lose control precisely of what you're trying to protect."

Listen to Kate Woodsome's interview with Steven Aftergood

The secrecy system now in place has its roots in the Cold War, when U.S. President Harry Truman signed an executive order in 1951 establishing standards to classify and control information in the name of national security.

But now the defense and intelligence bureaucracy is so massive that is has outgrown, and outdated, that Cold War-era system. "Information is produced and consumed and transferred in completely different ways from what was true 10, 20 or 30 years ago. And the classification system has not yet adapted to that," Aftergood says.

Overhauling the system

U.S. President Barack Obama says he recognizes the problem. Last year, he ordered an overhaul of how the government keeps its top secrets. In May this year, the government disclosed the size of its nuclear weapons arsenal for the first time. And in September, the director of National Intelligence and Defense Secretary Gates revealed the total intelligence budget.

Aftergood calls the changes "momentous."

"Government officials have resisted disclosure of this information literally for decades," he says. "And the fact that it is finally possible to get this information out into the open and do so as a standard practice means that the system is not totally calcified. It's not totally stuck in concrete."

Still, keeping fewer secrets will not stop hackers from trying to break into secure networks.  For about 18 minutes in April, China Telecom rerouted about 15 percent of U.S. and foreign Internet traffic through Chinese servers. According to the U.S.-China Economic and Security Review Commission, that traffic included communications from the U.S. government and military in a breach far greater than WikiLeaks. It is not clear how the information was, or will be, used.

Man versus machine?

David Gewirtz, the director of the U.S. Strategic Perspective Institute, says cyber-war is inevitable because it is just too easy and effective to ignore.

"Cyber-terrorism is much more like a cancer. It just sort of eats at you from the inside as opposed to traditional terrorism, where you can actually see flames."

Listen to Kate Woodsome's interview with David Gewirtz

Gewirtz says the U.S. is now focused on improving its cyber-defense, but it is an uphill battle because of the sheer number of vulnerabilities. Government computer networks not only need to be protected against state-sponsored cyber attacks and rogue hackers, but also against internal threats such as Private Manning. Cheap consumer electronics like USB "thumb drives," cameras and mp3 players can turn any network user into a threat.

"Everybody has these things, and so we have a million points of weakness instead of just one or two."

Private Manning now sits in military custody where he faces charges of leaking classified documents. As he awaits trial, U.S. officials are left grappling with a security problem that technology alone cannot solve.

You May Like

Video Video Claims to Show Shi'ite Forces in Iraq Executing Sunni Boy

While not yet independently confirmed, brutal killing already has gotten attention of Islamic State followers on social media More

After Six Years, Little Change for Niger Delta's Former Militants

Nigerians who laid down arms in exchange for government amnesty subsidies fear program may end with upcoming presidential elections More

Vietnam Pushes for More Educated Drivers to Curb Road Deaths

Transportation officials hope that making a greater effort to get drivers to learn the rules of the road will reduce fatal crashes More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
NASA Spacecraft Approaches a Dwarf Planeti
X
George Putic
March 04, 2015 8:51 PM
NASA’s Dawn spacecraft will make history on Friday, March 6, when it becomes the first man-made object to orbit a dwarf planet named Ceres. It is located in the asteroid belt between Mars and Jupiter, almost 500 million kilometers from Earth. Among other objectives, Dawn will try to examine two mysterious bright white spots detected on the planet’s surface. VOA’s George Putic has more.
Video

Video NASA Spacecraft Approaches a Dwarf Planet

NASA’s Dawn spacecraft will make history on Friday, March 6, when it becomes the first man-made object to orbit a dwarf planet named Ceres. It is located in the asteroid belt between Mars and Jupiter, almost 500 million kilometers from Earth. Among other objectives, Dawn will try to examine two mysterious bright white spots detected on the planet’s surface. VOA’s George Putic has more.
Video

Video Young Muslims Radicalized Online

Young Muslims are being radicalized ‘in their bedrooms’ through direct contact with Islamic State or ISIL fighters via the Internet, according to terror experts. There are growing concerns that authorities and Internet providers are not doing enough to counter online extremism - which analysts say is spread by a prolific network of online supporters around the world. Henry Ridgwell reports from London.
Video

Video African Americans Recall 1960's Fight For Voting Rights

U.S. President Barack Obama and thousands of people will gather in the small southern U.S. city of Selma, Alabama, Saturday, March 7th to commemorate the 50th anniversary of a historic voting rights march that became known as “Bloody Sunday." VOA’s Chris Simkins traveled to Alabama and introduces us to some of the foot soldiers of the voting rights struggles of the 1960’s.
Video

Video Positive Messaging Transforms Ethiopia's Image

Ethiopia was once known for famine and droughts. Now, headlines more often point to its fast-growing economy and its emergence as a regional peacemaker. How has Addis Ababa changed the narrative? VOA's Marthe van der Wolf reports.
Video

Video Cyber War Rages Between Iran, US

A newly published report indicates Iran and the United States have increased their cyber attacks on each other, even as their top diplomats are working toward an agreement to guarantee Iran does not develop a nuclear weapon and to free Iran from international sanctions. The development is part of a growing global trend. VOA’s Al Pessin reports from London.
Video

Video Answers Elude Families of MH370 Passengers

For the families on board Malaysia Airlines flight MH370, an airline official’s statement nearly one year ago that the plane had lost contact with air traffic control at 2:40 AM is the only thing that remains confirmed. William Ide reports.
Video

Video Land Disputes Arise Amid Uganda Oil Boom

Ugandan police say there has been a sharp increase in land disputes, with 10 new cases being reported each day. The claims come amid an oil boom as investors appear to be cashing in by selling parcels of land to multiple buyers. Meanwhile, the people who have been living on the land for decades are chased away, sometimes with a heavy hand. VOA's Serginho Roosblad reports.
Video

Video In Russia, Many Doubt Opposition Leader's Killer Will Be Found

The funeral has been held in Moscow for Boris Nemtsov, the opposition leader who was assassinated late Friday just meters from the Kremlin. Nemtsov joins a growing list of outspoken critics of Russia under the leadership of President Vladimir Putin who are believed to have been murdered for their work. VOA’s Daniel Schearf reports from Moscow.
Video

Video Simulated Astronauts Get Taste of Mars, in Hawaii

For generations, people have dreamed of traveling to Mars to explore Earth's closest planetary neighbor. VOA's Mike O'Sullivan reports that while space agencies like NASA are planning manned missions to the planet, some volunteers in Hawaii are learning how humans will cope with months in isolation on a Mars base.
Video

Video Destruction of Iraq Artifacts Shocks Archaeologists

The city of Mosul was once one of the most culturally rich and religiously diverse cities in Iraq. That tradition is under attack by members of the Islamic State who have made Mosul their capital city. The Mosul Museum is the latest target of the group’s campaign of terror and destruction, and is of grave concern to archaeologists around the world. VOA’s Kane Farabaugh reports.
Video

Video Smartphones May Help in Diagnosing HIV

Diagnosing infections such as HIV requires expensive clinical tests, making the procedure too costly for many poor patients or those living in remote areas. But a new technology called lab-on-a-chip may make the tests more accessible to many. VOA’s George Putic reports.
Video

Video Afghan Refugees Complain of Harassment in Pakistan

Afghan officials have expressed concern over reports of a crackdown on Afghan refugees in Pakistan following the Peshawar school attack in December. Reports of mass arrests and police harassment coupled with fear of an uncertain future are making life difficult for a population that fled its homeland to escape war. VOA’s Ayesha Tanzeem reports from Islamabad.

All About America

Circumventing Censorship

An Internet Primer for Healthy Web Habits

As surveillance and censoring technologies advance, so, too, do new tools for your computer or mobile device that help protect your privacy and break through Internet censorship.
More