Can We Predict the Next Leaker Using Threat Profiling Techniques? – In Public Safety

By Erik Kleinsmith,Associate Vice President, Public Sector Outreach, American Military University

Intelligencewhether you look at it as a community, business, or professionis inextricably bound by secrecy and security. Not only do intelligence personnel routinely collect and analyze highly sensitive and classified information about national threats, but these professionals must also actively work to protect that information from getting into the hands of adversaries and those who wish harm upon our nation.

Security is so important to the success of intelligence that professionals who specialize in information, network, and physical security have evolved along parallel trajectories over the past decades. Yet, despite the billions of dollars spent every year on each of these areas of security, its not enough to contain 100 percent of information leaks.

As recent embarrassing news stories can attest, leakers continually plague U.S. intelligence and national security. Leakers are individuals who share sensitive or classified information on a large scale, typically using the media as a conduit for their actions. These individuals are very different than spies, who often steal information for use by a foreign government or entity.

A recent example of a leaker is 30-year old Henry Kyle Frese, a counterterrorism analyst with the Defense Intelligence Agency who was arrested for leaking classified information to an NBC and a CNBC reporter, one of whom he was in a romantic relationship with. Frese now faces up to 20 years in prison for his poor decisions and joins the ranks of other notorious leakers including:

While some interesting analysis arises from looking at each of these five prominent leakers separately, in order to predict who might be the next leaker, its important to evaluate and identify any patterns or commonalities among them.

One way to analyze the group is to apply threat profiling techniques. Threat profiling is a predictive analysis tool that can help organize information related to different threat groups, prioritize analysis, and present the analysis within a common framework so the information can be widely shared and understood.

When evaluating this group, one of the most significant outcomes is how little they have in common. The leakers share little in the way of their demographics, selected targets, or methods of operation. Theres not much commonality beyond the fact that they all leaked classified information.

In analyzing demographic information, their ages range from 22 (Manning) to 40 (Ellsberg). Each were employed in a different government agency within the U.S. Intelligence Community or Department of Defense. Two were military or government employees at the time of their leaks (Manning and Frese), while the rest were contractors in government service (Winner, Snowden, and Ellsberg). Three of the five were military veterans (Winner, Frese, and Snowden, albeit for only a few months). They differed in their education levels as well, ranging from achieving a Ph.D. (Ellsberg) to just holding a high school degree (Winner).

There is also no common pattern in their gender, with one female (Winner), three males (Snowden, Frese, and Ellsberg), and one male who now identifies as a female (Manning).

Analysts could go further into each individuals upbringing, social class, and even religion, but beyond the fact that they are all white, there are no discernable patterns that could help identify or predict which type of person may be most susceptible to becoming the next big leaker.

In analyzing other areas of the threat profile, we find that each leaker targeted different types of information and used different methods to spirit this information from inside a secure facility. Individuals used a photocopier (Ellsberg), a printer (Winner), a mobile phone (Frese), burned information to a CD (Manning), or downloaded documents to an SD card (Snowden).

In addition, they each had to find someone in the media who would be supportive of their cause and willing to broadcast the information. This was not a difficult task for any of them, especially after the creation of WikiLeaks.

To find at least one significant commonality, one must look elsewhere within the threat profile and analyze the motivations, goals, and objectives of each leaker.

Here we find that each leaker decided that their personal or political viewpoints were more important than the national security of the United States. Only one of them was politically active at the time of their leak (Ellsberg), but all of them had broadcasted their political views on social media, which was, at times, at odds with their job or position.

Whether they wanted to assist the career of their girlfriend (Frese), felt that the U.S. was doing something immoral or illegal (Snowden, Ellsberg), or simply wanted to personally affect national policy through embarrassment, each one of the leakers decided that sharing highly sensitive information with the worldincluding our enemieswas a better option than pursuing proper channels such as through an inspector general or legal office (although Snowden disputes this claim).

Identifying this commonality of motive is highly disturbing because it is the most difficult to predict, interdict, or minimize damage caused afterwards. Leakers and other insider threats only have to be successful once, while security professionals have to be successful all the time. In this regard, intelligence agencies and organizations are in a bind, having to take responsibility for leakers within their organization while at the same time being blamed for not sharing intelligence when tragedy occurs.

It is often stated over and over again that politics ruins intelligence. Leakers who choose to jeopardize national security in support of their own political viewpoints are the embodiment of that statement in the most visible and destructive way.

About the Author:Erik Kleinsmithis the Associate Vice President for Business Development inIntelligence, National & Homeland Security, and Cyber for American Military University. He is a former Army Intelligence Officer and the former portfolio manager for Intelligence & Security Training at Lockheed Martin. Erik is one of the subjects of a book entitledThe Watchers by Shane Harris, which covered his work on a program called Able Danger tracking Al-Qaeda prior to 9/11. He currently resides in Virginia with his wife and two children. To contact the authors, emailIPSauthor@apus.edu.For more articles featuring insight from industry experts, subscribe toIn Public Safetys bi-monthly newsletter.

Sign up now to receive the InPublicSafety eNewsletter.

See original here:
Can We Predict the Next Leaker Using Threat Profiling Techniques? - In Public Safety

Related Posts
This entry was posted in $1$s. Bookmark the permalink.