Feeds

Of Wikileaks and data theft

Maladroit is as maladroit does

High performance access to file storage

Private First Class Bradley Manning may be one of the most celebrated whistleblowers ever but he is also, if he really is the Wikileaks source, a damn fine data thief. The corollary of that is that the United State military is a an awful guardian of classified data.

Manning, a US army intelligence analyst, is believed to have delivered more than 150,000 State Department documents and possibly more than a quarter of a million diplomatic cables, to Julian Assange's Wikileaks. He caused immense embarrassment to the United States  military and government establishments by showing the military's machine gunning of Iraqi  civilians by a helicopter gunship and revealing thousands of other things dozens of government around the world would prefer to be remain secret.

We don't know if Manning really is the source. He hasn't appeared in court yet and certainly hasn't been tried and convicted. So, until proved otherwise he is innocent. But there certainly was a source, perhaps more than one. For the purposes of argument, we'll call him Jim Leaks.

He started off from a lucky base; diplomatic cables and secret files are now in digital format, not paper, as in the days of the Pentagon Papers.

Put yourself in Jim Leaks' place. Your task, Jim, should you accept it, is to deliver 150,000-plus US State Department documents and videos to Wikileaks. Let's say that they take up 500GB of storage capacity. We are not going to email this stuff. Such a massive transmission or series of transmissions would leave a huge tell-tale footprint behind and take an age to organise.

If we can't digitally transmit the data then we have to physically carry it out of the place where we access it. That means, doesn't it, that either a CD, DVD, or an external hard drive must have been used, maybe one of those high-capacity, pocket-sized, 2.5-inch ones.

Jim obviously had access rights and privacy to copy this 500GB of data from a system he used, a desktop or laptop, onto an optical disk or simple USB-connected external drive, leave the premises and ship the disks or drive to Wikileaks. Simple enough in concept, deadly effective in execution, and totally, utterly, completely preventable.

What Jim did would only be possible if the IT infrastructure he used was designed and run by ineffective people. Here we have classified and secret files and cables and Jim was able to spend a lot of time collecting them and copying them to an optical disk or hard drive which he then walked away with, in his brief case presumably. He had system access rights and privileges enabling him to do this. Who organised and was responsible for the security of this data?

Data Loss Prevention (DLP) is a well known body of technology. It looks at data in use, in motion across a network, and at rest in a storage device. The technology can inspect data to find out if it contains sensitive information that should not leave the system, such as credit card numbers. That level of sophistication would not have been needed in this case. Whole folders could have been classed as secret, highly secret and top secret; whatever levels of security are used in these cases.

Then host-based DPL agent software could have been used to monitor what Joe Leaks was doing and simply prevented the copying of files from the computer he was use using to any external storage device, or its being emailed outside the firewall. Secondly it could have sent an alert to a security policy compliance officer and, thirdly, locked down the files and prevented further access.

It's the Pentagon Papers all over again. The US government and military are lashing out at Assange when, instead of shooting the messenger, they should lock the metaphorical doors through which his source entered their IT infrastructure and pillaged it. The US government and military establishment has been shown to be laughably inept at looking after classified information. It beggars belief that one of the most technically accomplished countries on Earth should be so maladroit. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.