What’s the bigger threat to national security?
When the New York Times published stories about the Bush administration’s efforts to track terrorist financing via the SWIFT consortium, a lot of the conservative blogosphere got on the NYT’s case about publishing national secrets on the front page of the paper of record. And, for the record, I suspect that the publication probably disrupted ...
When the New York Times published stories about the Bush administration's efforts to track terrorist financing via the SWIFT consortium, a lot of the conservative blogosphere got on the NYT's case about publishing national secrets on the front page of the paper of record. And, for the record, I suspect that the publication probably disrupted the program because of the backlash it created in Europe, where SWIFT is headquartered. And yet, I'd take the Bush administration's umbrage about the publication of classified information more seriously if the government demonstrated anything close to competence when to comes to protecting the computerized data currently in its possession. The Energy Department and the Department of Veteran Affairs have already had problems with lost data. Now Eric Weiss reports in the Washington Post that the FBI has had a little bit of a problem in this area: A government consultant, using computer programs easily found on the Internet, managed to crack the FBI's classified computer system and gain the passwords of 38,000 employees, including that of FBI Director Robert S. Mueller III. The break-ins, which occurred four times in 2004, gave the consultant access to records in the Witness Protection Program and details on counterespionage activity, according to documents filed in U.S. District Court in Washington. As a direct result, the bureau said it was forced to temporarily shut down its network and commit thousands of man-hours and millions of dollars to ensure no sensitive information was lost or misused. The government does not allege that the consultant, Joseph Thomas Colon, intended to harm national security. But prosecutors said Colon's "curiosity hacks" nonetheless exposed sensitive information. Colon, 28, an employee of BAE Systems who was assigned to the FBI field office in Springfield, Ill., said in court filings that he used the passwords and other information to bypass bureaucratic obstacles and better help the FBI install its new computer system. And he said agents in the Springfield office approved his actions. The incident is only the latest in a long string of foul-ups, delays and embarrassments that have plagued the FBI as it tries to update its computer systems to better share tips and information. Its computer technology is frequently identified as one of the key obstacles to the bureau's attempt to sharpen its focus on intelligence and terrorism.... What Colon did was hardly cutting edge, said Joe Stewart, a senior researcher with Chicago-based security company LURHQ Corp. "It was pretty run-of-the-mill stuff five years ago," Stewart said. Asked if he was surprised that a secure FBI system could be entered so easily, Stewart said, "I'd like to say 'Sure,' but I'm not really. They are dealing with the same types of problems that corporations are dealing with." To be fair to the Bush administration, a lot of this stuff might have happened regardless of who was running the White House. That said, the administration seems to be obsessed with protecting data from journalists. I'd much prefer it if they were obsessed with protecting their data from hackers. UPDATE: On the other hand, the FBI has done an excellent job protecting Coca Cola's secret formula!!
When the New York Times published stories about the Bush administration’s efforts to track terrorist financing via the SWIFT consortium, a lot of the conservative blogosphere got on the NYT’s case about publishing national secrets on the front page of the paper of record. And, for the record, I suspect that the publication probably disrupted the program because of the backlash it created in Europe, where SWIFT is headquartered. And yet, I’d take the Bush administration’s umbrage about the publication of classified information more seriously if the government demonstrated anything close to competence when to comes to protecting the computerized data currently in its possession. The Energy Department and the Department of Veteran Affairs have already had problems with lost data. Now Eric Weiss reports in the Washington Post that the FBI has had a little bit of a problem in this area:
A government consultant, using computer programs easily found on the Internet, managed to crack the FBI’s classified computer system and gain the passwords of 38,000 employees, including that of FBI Director Robert S. Mueller III. The break-ins, which occurred four times in 2004, gave the consultant access to records in the Witness Protection Program and details on counterespionage activity, according to documents filed in U.S. District Court in Washington. As a direct result, the bureau said it was forced to temporarily shut down its network and commit thousands of man-hours and millions of dollars to ensure no sensitive information was lost or misused. The government does not allege that the consultant, Joseph Thomas Colon, intended to harm national security. But prosecutors said Colon’s “curiosity hacks” nonetheless exposed sensitive information. Colon, 28, an employee of BAE Systems who was assigned to the FBI field office in Springfield, Ill., said in court filings that he used the passwords and other information to bypass bureaucratic obstacles and better help the FBI install its new computer system. And he said agents in the Springfield office approved his actions. The incident is only the latest in a long string of foul-ups, delays and embarrassments that have plagued the FBI as it tries to update its computer systems to better share tips and information. Its computer technology is frequently identified as one of the key obstacles to the bureau’s attempt to sharpen its focus on intelligence and terrorism…. What Colon did was hardly cutting edge, said Joe Stewart, a senior researcher with Chicago-based security company LURHQ Corp. “It was pretty run-of-the-mill stuff five years ago,” Stewart said. Asked if he was surprised that a secure FBI system could be entered so easily, Stewart said, “I’d like to say ‘Sure,’ but I’m not really. They are dealing with the same types of problems that corporations are dealing with.”
To be fair to the Bush administration, a lot of this stuff might have happened regardless of who was running the White House. That said, the administration seems to be obsessed with protecting data from journalists. I’d much prefer it if they were obsessed with protecting their data from hackers. UPDATE: On the other hand, the FBI has done an excellent job protecting Coca Cola’s secret formula!!
Daniel W. Drezner is a professor of international politics at the Fletcher School of Law and Diplomacy at Tufts University and co-host of the Space the Nation podcast. Twitter: @dandrezner
More from Foreign Policy

Can Russia Get Used to Being China’s Little Brother?
The power dynamic between Beijing and Moscow has switched dramatically.

Xi and Putin Have the Most Consequential Undeclared Alliance in the World
It’s become more important than Washington’s official alliances today.

It’s a New Great Game. Again.
Across Central Asia, Russia’s brand is tainted by Ukraine, China’s got challenges, and Washington senses another opening.

Iraqi Kurdistan’s House of Cards Is Collapsing
The region once seemed a bright spot in the disorder unleashed by U.S. regime change. Today, things look bleak.