What is the best course of action to prevent hackers like Snowden from further sharing our countries secrets? As mentioned in my post “A Solution to a Bigger Problem”, companies can implement security controls that block the transportation of data to and from USB ports and file integrity monitoring in an attempt to discourage potential inside threats. However, no matter how sophisticated we make our technologies, attackers always seem to dupe us with more sophisticated technologies.
Several years after Snowden’s document releases, the country’s top agencies are “pretty confident” that they could deflect an internal theft on a large scale like Snowden. The man in charge of America’s counterintelligence program, William Evanina, says that while they’re not completely able to stop someone from creating a mess if they wanted to, they are able to find out efficient ways to clean up the mess and catch the perpetrator.
Snowden’s heist exposed a huge list of espionage techniques, including the USA’s ability to hack into security and webcams, use SIM cards on cellphones to target people for drone strikes, and collect internet correspondences. The release of such data sparked a national outcry; some citizens named him a hero while others called him a traitor. The government, of course, named him a traitor and called for his immediate arrest. As for the information already ousted, those in charge were left to identity all data touched and exposed to the media. The team had to find out what effect this situation would have on our central intelligence agencies and work to fix the problem.
Information like this, once released, cannot be brought back in. As mentioned previously, the only thing left to do is set up majority security measures that track the movement of files and other confidential data. The constant reevaluation of those who hold top secret clearance is also critical in keeping our country and files safe. New orders require red flags to be addressed immediately, instead of every five years with the standard background check. Continuous evaluations and document tracking is the most efficient way that our country can maintain its security.