14.02.2016 Views

SCHOOL THESIS

?view&did=768625

?view&did=768625

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IV.<br />

DISCUSSION OF INSIDER THREAT AND UNAUTHORIZED<br />

DISCLOSURE<br />

State secrecy versus transparency is part of the growing debate regarding<br />

unauthorized disclosures, especially in light of recent disclosures by Chelsea Manning<br />

and Edward Snowden. Recurring unauthorized disclosures can cause harm by causing<br />

damage to intelligence sources and methods, potential loss of life, a financial cost<br />

associated with the release as well as harm to international alliances<br />

because, if repeated often enough, they will lessen the willingness of local<br />

sources to share sensitive info with American diplomats (and also make<br />

diplomats reluctant to share with each other what they have learned<br />

through their careful cultivated networks of informants). 105<br />

The insider threat “can include damage to the United States through espionage, terrorism,<br />

unauthorized disclosure of national security information, or through the loss or<br />

degradation of resources or capabilities.” 106<br />

When it comes to those who commit unauthorized disclosure, several terms are<br />

bantered about: espionage, whistleblower, spy, patriot, and traitor. Regardless what term<br />

is used, it is more important to understand why people choose to spy or disclose sensitive<br />

information with which they have been entrusted. In the case of a spy, Sarbin, Carney,<br />

and Eoyang list several steps a person takes in becoming a spy. The first step is the<br />

opportunity and access to sell or steal classified information and access to a potential<br />

customer. They describe the remaining steps:<br />

Second, the prospect of espionage must occur to the potential spy and not<br />

be dismissed out of hand; the behavior must be ‘available’ or conceivable.<br />

Perhaps in some cases the opportunity comes along first and then the<br />

possibility comes to mind; in others, the idea arises, and then the<br />

opportunity is sought out. But whatever the order, opportunity and idea are<br />

the basic preconditions. Next, the potential spy needs a motive strong<br />

enough to take the risk. Fourth, any inhibitions of conscience must be<br />

overridden. And last, our potential spy must not be prevented by others, in<br />

105 Sagar, Secrets and Leaks, 1.<br />

106 U.S. Department of Defense, The DOD Insider Threat Program, Department of Defense Directive<br />

Number 5205.16 (Washington, DC: U.S. Department of Defense, 2014), §3.b.<br />

33

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!