Agencies Boost Surveillance of Classified Networks

03.14.11 | 2 min read | Text by Steven Aftergood

In the wake of the ongoing publication of large volumes of classified U.S. government information by WikiLeaks, executive branch agencies are taking new steps to deter, detect and prevent the unauthorized transfer of information from classified government networks, officials said at a hearing of the Senate Homeland Security Committee last week.

In the majority of terminals connected to the DoD SIPRNet, the classified defense network, the capability to write to removable media has now been disabled.  (Bradley Manning is suspected of downloading State Department cables and other classified materials from SIPRNet and writing them to a compact disk.)

“For those few machines where writing is allowed [newly installed security software] will report, in real time, each write operation,” said Teresa Takai and Thomas Ferguson (pdf) of the Department of Defense.  “It will also report every attempt of an unauthorized write operation.”

“DoD has begun to issue a Public Key Infrastructure (PKI)-based identity credential on a hardened smart card… [that] will provide very strong identification of the person accessing the network and requesting data.  It will both deter bad behavior and require absolute identification of who is accessing data and managing that access,” they said.

Likewise, “the IC [intelligence community] plans to increase access control to critical IC information resources,” said Corin R. Stone (pdf) of the Office of the Director of National Intelligence.  “Technology can be used to control usage and limit user capabilities to perform activities such as copying, printing, or exporting data to a device.”

As voluminous as the WikiLeaks disclosures are, they represent only a minuscule fraction of similar records.  Even when it comes to the State Department cables, WikiLeaks didn’t get everything, Amb. Patrick Kennedy told the Senate Committee.  “During the period of time [that] we posted… some 250,000 cables… to the DOD SIPRNet, we [also] disseminated 2.4 million cables, 10 times as many, through other systems.”

The fact is that more than 99.9% of classified documents don’t leak.  Now they will all be subject to enhanced security measures.

See all publications
Nuclear Weapons
New Voices on Nuclear Weapons Fellowship: Creative Perspectives on Rethinking Nuclear Deterrence 

To empower new voices to start their career in nuclear weapons studies, the Federation of American Scientists launched the New Voices on Nuclear Weapons Fellowship. Here’s what our inaugural cohort accomplished.

11.28.23 | 3 min read
read more
Science Policy
Expected Utility Forecasting for Science Funding

Common frameworks for evaluating proposals leave this utility function implicit, often evaluating aspects of risk, uncertainty, and potential value independently and qualitatively.

11.20.23 | 11 min read
read more
Nuclear Weapons
Nuclear Notebook: Nuclear Weapons Sharing, 2023

The FAS Nuclear Notebook is one of the most widely sourced reference materials worldwide for reliable information about the status of nuclear weapons and has been published in the Bulletin of the Atomic Scientists since 1987. The Nuclear Notebook is researched and written by the staff of the Federation of American Scientists’ Nuclear Information Project: Director Hans […]

11.17.23 | 1 min read
read more
Social Innovation
Community School Approach Reaches High of 60%, Reports Latest Pulse Panel

According to the National Center for Education Statistics’ August 2023 pulse panel, 60% of public schools were utilizing a “community school” or “wraparound services model” at the start of this school year—up from 45% last year.

11.17.23 | 4 min read
read more