Defense on the Inside

What is the best course of action to prevent hackers like Snowden from further sharing our countries secrets? As mentioned in my post “A Solution to a Bigger Problem”, companies can implement security controls that block the transportation of data to and from USB ports and file integrity monitoring in an attempt to discourage potential inside threats. However, no matter how sophisticated we make our technologies, attackers always seem to dupe us with more sophisticated technologies.

Several years after Snowden’s document releases, the country’s top agencies are “pretty confident” that they could deflect an internal theft on a large scale like Snowden. The man in charge of America’s counterintelligence program, William Evanina, says that while they’re not completely able to stop someone from creating a mess if they wanted to, they are able to find out efficient ways to clean up the mess and catch the perpetrator.

Snowden’s heist exposed a huge list of espionage techniques, including the USA’s ability to hack into security and webcams, use SIM cards on cellphones to target people for drone strikes, and collect internet correspondences. The release of such data sparked a national outcry; some citizens named him a hero while others called him a traitor. The government, of course, named him a traitor and called for his immediate arrest. As for the information already ousted, those in charge were left to identity all data touched and exposed to the media. The team had to find out what effect this situation would have on our central intelligence agencies and work to fix the problem.

Information like this, once released, cannot be brought back in. As mentioned previously, the only thing left to do is set up majority security measures that track the movement of files and other confidential data. The constant reevaluation of those who hold top secret clearance is also critical in keeping our country and files safe. New orders require red flags to be addressed immediately, instead of every five years with the standard background check. Continuous evaluations and document tracking is the most efficient way that our country can maintain its security.


3 thoughts on “Defense on the Inside

  1. laurenwillins says:

    Although tracking is the most efficient way, couldn’t it be seen as a continuation of what the NSA did? The companies are tracking what we do and comparing our actions to previous ones. Our “data” is being mined by companies. Could we possibly regret this in the long run?


    1. bstpierre says:

      I totally agree with this statement. However, don’t you think this is the price we have to pay in order to ensure the secret documents remain secret? I’m going to touch on this in another post, I think. Good point made!


  2. laurenwillins says:

    Whether or not sacrifices have to be made is an ongoing debate. As American citizens who have had our information monitored, we have to think very carefully on what we want. We can’t have both.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s