Research QuestionResearch Question How did the US analyze and mitigate the risk of leaked confidential information in the aftermath of the Chelsea Manning.

Slides:



Advertisements
Similar presentations
National History Day.
Advertisements

The Department of Energy Enterprise Risk Management Model
Social Responsibility of Journalism & Media: The WikiLeaks Controversy Professor Eric Freedman 29 September 2011 Ericinlithuania.wordpress.com.
Producer Risk Assessment in Plant Biosecurity Management.
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
Chubaka Producciones Presenta :.
2012 JANUARY Sun Mon Tue Wed Thu Fri Sat
Wikileaks By Ruth & Becca. Overview Of Wikileaks Wikileaks is a non profitable online organization that publishes private and secret information. The.
Edward Snowden vs The U.S. Government By Nicholas Pace.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Human Investigation Committee  Is it research?  If yes, does it involve human subjects?  If yes, can it be exempt?  If no, will a Request for.
1 Creating a Joint Personnel Adjudication System (JPAS) Analysis Report Michael S. Campbell Industrial Security Specialist Defense Security Service San.
OSHA Occupational Safety & Health Administration Heriberto Holguin Oscar Marin Juana Martinez Larese Walker.
Data Backup WebQuest Section 14. Introduction We read about system failures in our newspapers all the time. What causes these failures? We are aware of.
We build strong children strong families strong communities Presented By: Brad Lawrence Kent Starling Treasa McLean Why Secure the Y?
Social and New Media and Persuasion. Social media is pervasive Facebook has over 1.15 billion users Twitter has over 550 million registered users Google+
Risk Management (Risk Identification)
TODAY  Whistle Blowers  Espionage Act of 1917 (Schenk v. US)  The Pentagon Papers  WikiLeaks  Review for tomorrow’s exam  HOMEWORK:  Submit interview.
IDENTITY THEFT. RHONDA L. ANDERSON, RHIA, PRESIDENT ANDERSON HEALTH INFORMATION SYSTEMS, INC.
Dr. Benjamin Khoo New York Institute of Technology School of Management.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
Space Systems Engineering Database (SSED) Seminar on Aerospace Mishaps and Lessons Learned 2004 MAPLD Conference 8 September 2004 Jon Binkley (310) 336.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Stanford University Emergency Exercise ‘06 Satellite Operations Center Briefing.
Creating an Insider Threat Program.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
HIPAA History March 3, HIPAA Ruling Health Insurance Portability Accountability Act Health Insurance Portability Accountability Act Passed by Congress.
Integrative Studio 2 Spring 2015 February 11, 2015 Wk 3 Anezka Sebek.
Mandatory Declassification Review and the Interagency Security Classification Appeals Panel Society of American Archivists, Austin, Texas Session 603:
2011 Calendar Important Dates/Events/Homework. SunSatFriThursWedTuesMon January
The American Press and the Government during War.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Managing a “Data Spill”
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
LEAKERS AND WHISTLEBLOWERS _______________________ HERO OR MENACE? An editorial by J. Jonah Jameson ______________________________________________________________________.
TEMPORAL VISUALIZATION OF DATA FROM THE FRENCH SENTINEL NETWORK.
July 2007 SundayMondayTuesdayWednesdayThursdayFridaySaturday
FIMS FY16 Year-End Schedule FIMS Annual Training May 10-12, 2016 PREPARED BY: GAYLE SMITH.
By: Emily Port. Overview Some History Publish Analyze Receive How it works.
Principles of Information Security, Fourth Edition Risk Management Ch4 Part I.
Wikileaks. WikiLeaks is an international non-profit organization that publishes submissions of private, secret, and classified media from anonymous news.
Module 18 National Preparedness. Postmaster, Levels Module 18Slide - 2 Facility, Personal & Vehicle Security Workroom Floor Access Keys Arrow Keys.
The CED’s & DED’s role in the Tenure & Promotion of Agents
NRC’s 10 CFR Part 37 Program Review of Radioactive Source Security
Auditing Concepts.
GEOGRAPHY Maps, Charts, and Graphs.
A guide for teachers and students Thursday, November 14, 2013 
Medina District Safety Plan.
Security and Privacy Consideration of aq
eStar Medical Student Training
Joining the Crowd Data – Asset – Method Network Workshop – So you think you’re an expert?, University of Nottingham, January 15, 2013 Associate Professor.
Communications Timeline
Dwarf planets Comets Pluto?.
Audit Planning Presentation - Disaster Recovery Plan
Information Security and Travel-related Security
College of Alameda Integrated Planning and Budgeting Process
Identity Theft Prevention Program Training
Problem Gambling Clicks to Opgr.org
2016 Attachment O True-Up Customer Meeting August 22, 2017
(Information) Privacy
Circle Chart Template Process Name.
Secrecy, part 2.
Corruption Risk Assessment
2015 January February March April May June July August September
Principles of the Constitution Limited Government
Crisis Protection Ariel V
Presentation transcript:

Research QuestionResearch Question How did the US analyze and mitigate the risk of leaked confidential information in the aftermath of the Chelsea Manning WikiLeaks? What were the lasting effects of the leaks?

Wikileaks ● Motto: “We Open Governments”(Denver 2014) ● non-profit journalism website ● founded in 2006 by Julian Assange ● leaks private/classified information

Figure 1: Timeline of Events Surrounding WikiLeaks

Impact of WikileaksImpact of Wikileaks Figure 2: DDOS and Security Reports Graphic (Labovitz, 2010)

Information Leaks of the Future Figure 3: Google Search History for Julian Assange and Edward Snowden (Leetaru, 2013)

Risk ContextRisk Context ● Protector: US government and its associated agencies ● Threat: Julian Assange and Wikileaks access ● Asset: Classified US information

Risk ScenariosRisk Scenarios ● Guantanamo ● Chelsea Manning’s leaks ● Deaths of US government employees

Guantanamo o Likelihood: Low o Impact: High

Chelsea ManningChelsea Manning ● Likelihood of getting information: high o Secret Classification o Over 500,000 documents ● Likelihood of sharing information: low o Extensive background checks are performed before an employee is allowed to work for the US government ● Impact: High

Death of US Government EmployeesDeath of US Government Employees ● Likelihood: Moderate ● Impact: Very High

Risk Treatment: Likelihood/Impact Analysis

Risk TreatmentRisk Treatment ● Avoidance o increase security on government documentation o change classification system o don’t allow USBs or writeable CDs into government facilities that work with classified information ● Mitigation o better prepare for leaks o evacuation systems for undercover agents o plausible deniability

Classification of U.S. DocumentsClassification of U.S. Documents Figure 4: Information Security Oversight Office Classification Chart (No Author, 2012)

Conclusion

References (August 21, 2013). Bradley Manning Sentenced to 35 Years in Wikileaks Case. BBC News. Retrieved from Information Security Oversight Office (ISOO) 2011 Annual Report to the President. (2012, January 1). Retrieved November 30, 2014, from _President.pdf&page=12 Nicks, Denver (September 23, 2014). Wikileaks Source Chelsea Manning Sues Govt Over Hormone Treatment Request. Times. Retrieved from (August 21, 2013). Bradley manning Sentenced to 35 Year in Prison for Wikileaks Disclosures. Huffington Post. Retrieved from Labovitz, C. (2010, December 14). DDoS & Security Reports: The Arbor Networks IT Security Blog. Retrieved November 30, 2014, from Leetaru, K. (2013, December 31). King Snowden and the Fall of Wikileaks. Retrieved November 30, 2014, from