intelligence, um, technician have access to? there are different places like the joint worldwide intelligence communications system. it s one of the ways to network that the pentagon uses. to share amongst itself but also remember after the attacks of 9 11 1 of the things that the 9 11 commission concluded. was that a lack of intelligence sharing lead to not the right people knowing about this imminent attack, so the momentum went in the other way, put it on these worldwide networks that are shared amongst the state department, the pentagon, other intelligence services, so that say, you re chasing a terrorist suspect. you can almost google this data and see what everybody else has on the same person. now then the question becomes, when you have things like, um chelsea manning leak and now this one. how much access do we allow? which technician? at what level? um it
gets much more complicated. but those are the kinds of questions that investigators will be looking at. you know, it s interesting, too, as we were talking about the fallout earlier this week, ukrainian officials i was struck by the fact that ukrainian officials initially said they weren t overly concerned because they ve been pretty careful about what they re putting out there, citing concerns about washington s ability to actually keep these secrets safe. and kim, i find that interesting, too, in the context of what we heard from the president just a short time ago this afternoon, essentially downplaying this, saying it wasn t contemporaneous information that he was concerned not concerned about the leak, but is cern that it happened. how damaging is all of this overall? how damaging have these past few days been. every single u. s ally will right now be looking at what did we share with the u. s and might it be exposed by this leak? and one of the things that investigators will be l
example, after robert hansen was arrested inside, the fbi officials learned that not only was he able to print out documents and carry them out the front door of fbi headquarters, but he also had free range access to both the fbi s classified network as well as the state department s classified network, and he could sit in his office all day with the door, closed and browse and troll for secrets. we ve seen a shift since that. time for instituting what s called you a m user access monitoring, and it s essentially the u. s government the security divisions in each of the respective intelligence agencies monitoring their own people looking at their keystrokes, looking at what they re searching for looking down to even what they re clicking print on what they re, you know, downloading and taking out of that machine, and in fact, whenever you log into a classified system in the u s government, you actually get a banner that pops up that says you are being monitored you as an employee acces
manning, who of course, was the army private who was arrested in iraq associated with the wikileaks disclosures, there was this question about removable media and using thumb drives to put into the system we know on her computers, at least, according to an army forensic examiner who testified in her case that they found hundreds of thousands of documents the source code on her computer. and of course, there was a question about how can some one just so easily put a thumb drive in and then cart away all of these documents and so they continue to lock down the systems over time after they learn from each new vulnerability will have to wait and see exactly here. how this suspect actually got access to these top secrets. this top secret information there. officials are alluding to it. we know based on cnn s reporting, and as the pentagon spokesman said, a short time ago, there s this issue of distribution list so every morning for those who are working in intelligence, you get intelligence