SCHOOL THESIS
?view&did=768625
?view&did=768625
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
IV.<br />
DISCUSSION OF INSIDER THREAT AND UNAUTHORIZED<br />
DISCLOSURE<br />
State secrecy versus transparency is part of the growing debate regarding<br />
unauthorized disclosures, especially in light of recent disclosures by Chelsea Manning<br />
and Edward Snowden. Recurring unauthorized disclosures can cause harm by causing<br />
damage to intelligence sources and methods, potential loss of life, a financial cost<br />
associated with the release as well as harm to international alliances<br />
because, if repeated often enough, they will lessen the willingness of local<br />
sources to share sensitive info with American diplomats (and also make<br />
diplomats reluctant to share with each other what they have learned<br />
through their careful cultivated networks of informants). 105<br />
The insider threat “can include damage to the United States through espionage, terrorism,<br />
unauthorized disclosure of national security information, or through the loss or<br />
degradation of resources or capabilities.” 106<br />
When it comes to those who commit unauthorized disclosure, several terms are<br />
bantered about: espionage, whistleblower, spy, patriot, and traitor. Regardless what term<br />
is used, it is more important to understand why people choose to spy or disclose sensitive<br />
information with which they have been entrusted. In the case of a spy, Sarbin, Carney,<br />
and Eoyang list several steps a person takes in becoming a spy. The first step is the<br />
opportunity and access to sell or steal classified information and access to a potential<br />
customer. They describe the remaining steps:<br />
Second, the prospect of espionage must occur to the potential spy and not<br />
be dismissed out of hand; the behavior must be ‘available’ or conceivable.<br />
Perhaps in some cases the opportunity comes along first and then the<br />
possibility comes to mind; in others, the idea arises, and then the<br />
opportunity is sought out. But whatever the order, opportunity and idea are<br />
the basic preconditions. Next, the potential spy needs a motive strong<br />
enough to take the risk. Fourth, any inhibitions of conscience must be<br />
overridden. And last, our potential spy must not be prevented by others, in<br />
105 Sagar, Secrets and Leaks, 1.<br />
106 U.S. Department of Defense, The DOD Insider Threat Program, Department of Defense Directive<br />
Number 5205.16 (Washington, DC: U.S. Department of Defense, 2014), §3.b.<br />
33