News / Asia

WikiLeaks Exploits Weaknesses in Technology, Human Nature

An employee of Korea Internet Security Center works at a monitoring room in Seoul, South Korea. There is no kill switch for the Internet for the White House. Yet when Congress was exploring ways to secure computer networks, a plan to give the president th
An employee of Korea Internet Security Center works at a monitoring room in Seoul, South Korea. There is no kill switch for the Internet for the White House. Yet when Congress was exploring ways to secure computer networks, a plan to give the president th

Historians, anti-war activists and armchair observers of human nature have had plenty to mull over in recent years thanks to the online group WikiLeaks.

The Web site has published hundreds of thousands of stolen U.S. military and diplomatic documents from as recently as February of this year and as far back as the 1960s. The latest round of leaks, involving diplomatic cables, has renewed efforts by the U.S. government to tighten security on its computer systems.  But cyber-security experts point out the leaks were less a breakdown of technology than of trust.

That fact now has the U.S. government scrambling to secure its computer networks. But Bruce Schneier, British Telecom's chief security technology officer, says even the most secure systems will still be vulnerable to human nature.

"You could take a computer, bury it in the ground, make sure you never turn it on," Schneier says. "Don't tell anybody where it is and it's probably pretty secure. But as soon as you turn it on and have people look at it, you have to trust the people."

Listen to Kate Woodsome's interview with Bruce Schneier


Tightening security

The U.S. Defense and State Departments say they are working to limit users' ability to download material onto removable media, like CDs and USB "thumb drives." And they are working to better track suspicious behavior.

"In general, I think reducing the capabilities of the hardware is probably not the way to go," Schneier says. "Although as a temporary measure after this has already happened, it’s seems like an okay, quick solution. But long-term, it seems kind of dumb."

He says a better solution would be to limit access to the diplomatic cables in the first place. "Make sure people who only need to know them have access to them. And make sure that people who read them, make sure an audit log record is kept."

But that wasn't the case when U.S. Army intelligence specialist Private Bradley Manning allegedly committed one of the biggest information breaches in U.S. history while listening to Lady Gaga's hit song "Telephone." Manning says he lip-synched the words to the song while downloading a quarter-million classified diplomatic cables from the Defense Department's data network onto a Lady Gaga CD.

If access was far more limited, as Schneier recommends, there's no way Private Manning and his Lady Gaga tunes could have touched the network and all the diplomatic cables it stored. But he did. Because at that time, government agencies were sharing more intelligence in the wake of the September 11 terrorist attacks in 2001.

This week, U.S. Defense Secretary Robert Gates told reporters the procedures spread information too widely.   

Demystifying state secrets

Instead of rolling back information sharing, says Steven Aftergood, director of the Project on Government Secrecy at the Federation of American Scientists, the U.S. government instead should keep fewer secrets.

"If we kept less information classified, it would be an easier, more manageable task to protect that smaller volume of information," Aftergood says. "When you start getting into tens of millions of secrets being produced every year, you can easily swamp the system and lose control precisely of what you're trying to protect."

Listen to Kate Woodsome's interview with Steven Aftergood

The secrecy system now in place has its roots in the Cold War, when U.S. President Harry Truman signed an executive order in 1951 establishing standards to classify and control information in the name of national security.

But now the defense and intelligence bureaucracy is so massive that is has outgrown, and outdated, that Cold War-era system. "Information is produced and consumed and transferred in completely different ways from what was true 10, 20 or 30 years ago. And the classification system has not yet adapted to that," Aftergood says.

Overhauling the system

U.S. President Barack Obama says he recognizes the problem. Last year, he ordered an overhaul of how the government keeps its top secrets. In May this year, the government disclosed the size of its nuclear weapons arsenal for the first time. And in September, the director of National Intelligence and Defense Secretary Gates revealed the total intelligence budget.

Aftergood calls the changes "momentous."

"Government officials have resisted disclosure of this information literally for decades," he says. "And the fact that it is finally possible to get this information out into the open and do so as a standard practice means that the system is not totally calcified. It's not totally stuck in concrete."

Still, keeping fewer secrets will not stop hackers from trying to break into secure networks.  For about 18 minutes in April, China Telecom rerouted about 15 percent of U.S. and foreign Internet traffic through Chinese servers. According to the U.S.-China Economic and Security Review Commission, that traffic included communications from the U.S. government and military in a breach far greater than WikiLeaks. It is not clear how the information was, or will be, used.

Man versus machine?

David Gewirtz, the director of the U.S. Strategic Perspective Institute, says cyber-war is inevitable because it is just too easy and effective to ignore.

"Cyber-terrorism is much more like a cancer. It just sort of eats at you from the inside as opposed to traditional terrorism, where you can actually see flames."

Listen to Kate Woodsome's interview with David Gewirtz

Gewirtz says the U.S. is now focused on improving its cyber-defense, but it is an uphill battle because of the sheer number of vulnerabilities. Government computer networks not only need to be protected against state-sponsored cyber attacks and rogue hackers, but also against internal threats such as Private Manning. Cheap consumer electronics like USB "thumb drives," cameras and mp3 players can turn any network user into a threat.

"Everybody has these things, and so we have a million points of weakness instead of just one or two."

Private Manning now sits in military custody where he faces charges of leaking classified documents. As he awaits trial, U.S. officials are left grappling with a security problem that technology alone cannot solve.

You May Like

Multimedia Obama, Modi Announce Breakthrough on Nuclear Deal

Deal resolves differences over liability of suppliers to India in event of a nuclear accident, U.S. demands on tracking whereabouts of material supplied to country More

WHO's Late Efforts in Tackling Ebola Highlight Need for Reform

Health experts debate measures to reform agency’s response to global public health emergencies in special one-day session on deadly outbreak More

One Tumultuous Year in Power for CAR's President

As sectarian violence raged across Central African Republic, interim President Catherine Samba-Panza has Herculean task: to end civil war and put country back on right track More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Worldwide Photo Workshops Empower Youthi
X
Julie Taboh
January 23, 2015 11:08 PM
Last September, 20 young adults from South Sudan took part in a National Geographic Photo Camp. They are among hundreds of students from around the world who have learned how to use a camera to tell the stories of the people in their communities through the powerful medium of photography. Three camp participants talked about their experiences recently on a visit to Washington. VOA’s Julie Taboh reports.
Video

Video Worldwide Photo Workshops Empower Youth

Last September, 20 young adults from South Sudan took part in a National Geographic Photo Camp. They are among hundreds of students from around the world who have learned how to use a camera to tell the stories of the people in their communities through the powerful medium of photography. Three camp participants talked about their experiences recently on a visit to Washington. VOA’s Julie Taboh reports.
Video

Video US, Japan Offer Lessons as Eurozone Launches Huge Stimulus

The Euro currency has fallen sharply after the European Central Bank announced a bigger-than-expected $67 billion-a-month quantitative easing program Thursday - commonly seen as a form of printing new money. Henry Ridgwell reports for VOA from London on whether the move might rescue the eurozone economy -- and what lessons have been learned from similar programs around the world.
Video

Video Nigerian Elections Pose Concern of Potential Conflict in 'Middle Belt'

Nigeria’s north-central state of Kaduna has long been the site of fighting between Muslims and Christians as well as between people of different ethnic groups. As the February elections approach, community and religious leaders are making plans they hope will keep the streets calm after results are announced. Chris Stein reports from the state capital, Kaduna.
Video

Video As Viewership Drops, Obama Puts His Message on YouTube

Ratings reports show President Obama’s State of the Union address this week drew the lowest number of viewers for this annual speech in 15 years. White House officials anticipated this, and the president has decided to take a non-traditional approach to getting his message out. VOA White House correspondent Luis Ramirez reports.
Video

Video S. Korean Businesses Want to End Trade Restrictions With North

Business leaders in South Korea are calling for President Park Geun-hye to ease trade restrictions with North Korea that were put in place in 2010 after the sinking of a South Korean warship.Pro-business groups argue that expanding trade and investment is not only good for business, it is also good for long-term regional peace and security. VOA’s Brian Padden reports.
Video

Video US Marching Bands Grow Into a Show of Their Own

The 2014 Super Bowl halftime show was the most-watched in history - attracting an estimated 115 million viewers. That event featured pop star Bruno Mars. But the halftime show tradition started with marching bands, which still dominate the entertainment at U.S. high school and college American football games. But as Enming Liu reports in this story narrated by Adrianna Zhang, marching bands have grown into a show of their own.
Video

Video Secular, Religious Kurds Face Off in Southeast Turkey

Turkey’s predominantly Kurdish southeast has been rocked by violence between religious and secular Kurds. Dorian Jones reports on the reasons behind the stand-off from the region's main city of Diyarbakir, which suffered the bloodiest fighting.
Video

Video Kenya: Misuse of Antibiotics Leading to Resistance by Immune System

In Kenya, the rise of drug resistant bacteria could reverse the gains made by medical science over diseases that were once treatable. Kenyans could be at risk of fatalities as a result if the power in antibiotics is not preserved. Lenny Ruvaga has more on the story from Nairobi.
Video

Video Solar-Powered Plane Getting Ready to Circumnavigate Globe

Pilots of the solar plane that already set records flying without a drop of fuel are close to making their first attempt to fly the craft around the globe. They plan to do it in 25 flying days over a five month period. VOA’s George Putic reports.
Video

Video How Experts Decide Ethiopia Has the Best Coffee

Ethiopia’s coffee has been ranked as the best in the world by an international group of coffee connoisseurs. Not surprisingly, coffee is a top export for the country. But at home it is a source of pride. Marthe van der Wolf in Addis Ababa decided to find out what makes the bean and brew so special and how experts make their determinations.
Video

Video Yazidi Refugees at Center of Political Fight Between Turkey, Kurds

The treatment of thousands of Yazidis refugees who fled to Turkey to escape attacks by Islamic State militants has become the center of a dispute between the Turkish government and the country's pro-Kurdish movement. VOA's Dorian Jones reports.
Video

Video World’s Richest 1% Forecast to Own More Than Half of Global Wealth

The combined wealth of the world's richest 1 percent will overtake that of the remaining 99 percent at some point in 2016, according to the anti-poverty charity Oxfam. Campaigners are demanding that policymakers take action to address the widening gap between the ‘haves’ and the ‘have nots’, as Henry Ridgwell reports for VOA from London.

Circumventing Censorship

An Internet Primer for Healthy Web Habits

As surveillance and censoring technologies advance, so, too, do new tools for your computer or mobile device that help protect your privacy and break through Internet censorship.
More

All About America

AppleAndroid