Independent Investigative Journalism Since 1995


donate.jpg (7556 bytes)
Make a secure online contribution


 

consortiumblog.com
Go to consortiumblog.com to post comments


Follow Us on Twitter


Get email updates:

RSS Feed
Add to My Yahoo!
Add to Google

homeHome
linksLinks
contactContact Us
booksBooks

Order Now


consortiumnews
Archives

Age of Obama
Barack Obama's presidency

Bush End Game
George W. Bush's presidency since 2007

Bush - Second Term
George W. Bush's presidency from 2005-06

Bush - First Term
George W. Bush's presidency, 2000-04

Who Is Bob Gates?
The secret world of Defense Secretary Gates

2004 Campaign
Bush Bests Kerry

Behind Colin Powell's Legend
Gauging Powell's reputation.

The 2000 Campaign
Recounting the controversial campaign.

Media Crisis
Is the national media a danger to democracy?

The Clinton Scandals
Behind President Clinton's impeachment.

Nazi Echo
Pinochet & Other Characters.

The Dark Side of Rev. Moon
Rev. Sun Myung Moon and American politics.

Contra Crack
Contra drug stories uncovered

Lost History
America's tainted historical record

The October Surprise "X-Files"
The 1980 election scandal exposed.

International
From free trade to the Kosovo crisis.

Other Investigative Stories

Editorials


   

Behind the WikiLeaks' Leak

By Charles Pena
January 19, 2011 (Corrected January 20, 2011)

Editor’s Note: In the face of the WikiLeaks release of thousands of American diplomatic cables, Official Washington is looking to toughen U.S. secrecy laws -- or at least to broaden interpretations of the old Espionage Act – in ways that would establish a sort of global secrecy regime, allowing for the arrest of even non-Americans for exposing U.S. secrets.

However, the WikiLeaks rupture of secrets was largely the fault of the Bush administration’s post-9/11 policy of granting even low-level intelligence personnel the ability to access secrets way beyond their “need to know,” as the Independent Institute’s Charles Pena notes in this guest essay. (Correction: an earlier version misattributed the authorship of this article.):

The continuing WikiLeaks controversy has focused needed attention on a number of important issues: whether, for example, Julian Assange was justified in releasing classified information in order to make government more accountable, whether the release of the information put U.S. intelligence sources and methods at risk, and whether the legitimate need for secrecy in certain government activities occasionally provides cover for government activities that public officials would have trouble justifying if they took place in the open.

Somewhat lost in the shuffle is the question of how and why the alleged leaker, Army Private Bradley Manning, could have access to so much classified information.

Part of the answer lies in the post-9/11 belief that more information shared between government intelligence agencies, federal, state, and local law enforcement, and even the military could have averted that fateful day.

So the mantra of controlling classified information shifted from “need to know” to “need to share.”

The result is that a lowly private with a “top-secret” clearance had access to the Department of Defense’s computer network for top-secret information, known as the Joint Worldwide Intelligence Communications System (JWICS), and the Pentagon’s server for such information, the Secure Internet Protocol Router Network (SIPRNet).

That access gave him entry into a State Department network called ClassNet, which in turn gave him access to diplomatic cables.

To be sure, there is a real need for government officials at all levels to share intelligence so terrorist plots can be disrupted before they materialize into actual attacks.

But “need to share” is not the same thing as granting everyone with a top-secret clearance access to everything.

Rather than allowing individuals such as Pvt. Manning to be able to “pull” whatever information they want at will, information needs to be “pushed” by those that have the information to those who need it. Presumably, those parties will have made the decision to exchange information beforehand so both parties know what kind of information is being shared and why.

But the real hidden lesson of Pvt. Manning and WikiLeaks is the false belief that the tragedy of Sept. 11, 2001, could have been prevented had our intelligence community not suffered a communication breakdown, and that broad information sharing will prevent future terrorist attacks. That’s not the source of our problem — any more than more security is the answer.

The harsh reality is that as long as our terrorist adversaries are willing to try to attack us, they will eventually succeed. So we need to understand the root causes of their hatred and how they are able to motivate and recruit those who would attack us.

The one cause we continue to ignore (and we don’t need WikiLeaks to tell us about because it’s not a secret) is America’s interventionist foreign policy, especially the stationing of U.S. military forces in Muslim countries. That is an act of war in the minds of many Muslims.

According to Secretary of State Hillary Clinton, WikiLeaks is “an attack on America’s foreign policy interests.” The sad truth is that U.S. foreign policy isn’t necessarily in America’s best interests.

Charles V. Peña is a Senior Fellow at the Independent Institute as well as a senior fellow with the Coalition for a Realistic Foreign Policy, former senior fellow with the George Washington University Homeland Security Policy Institute, and an adviser on the Straus Military Reform Project.

To comment at Consortiumblog, click here. (To make a blog comment about this or other stories, you can use your normal e-mail address and password. Ignore the prompt for a Google account.) To comment to us by e-mail, click here. To donate so we can continue reporting and publishing stories like the one you just read, click here.


homeBack to Home Page


 

Consortiumnews.com is a product of The Consortium for Independent Journalism, Inc., a non-profit organization that relies on donations from its readers to produce these stories and keep alive this Web publication.

To contribute, click here. To contact CIJ, click here.