RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Mime-Version:
1.0
Sender:
Records Management Program <[log in to unmask]>
Subject:
From:
Larry Medina <[log in to unmask]>
Date:
Fri, 10 Dec 2010 11:11:34 -0500
Content-Transfer-Encoding:
8bit
Content-Type:
text/plain; charset="UTF-8"
Reply-To:
Records Management Program <[log in to unmask]>
Parts/Attachments:
text/plain (49 lines)
A wake up call for Records Management?

I think not...  anyone who has been following this and how this information
was made public knows this wasn't a failure on the manner in which
classified information is managed or the RM practices utilized to manage it,
it was a result of the actions of a single rogue soldier who 'wanted to get
even and make someone pay'

http://wapo.st/hhHzdN

Changes should have been made to limit the access privileges this individual
had to information when he was demoted, but in reading the article, it
appears he had already made his move and captured the content to removable
media.  

As an analyst, his position called for him to have access to a broad
spectrum of data sources, and to utilize analytical tools to search for
patterns of information in intelligence potentially leading to ways to
assist the Government.  What is unusual (and it's not a failure of RM
practices) is that the system/s he worked on were equipped with
ports/devices allowing the capture of content to ANY removable media or data
devices. 

This, as well as no audit trails of file activity and forensics for system
use (attaching a device or writing data) sound much more like an indictment
of IT practices to me.  In certain systems that I'm familiar with, there are
no drives for writing media, no ports for attaching devices, and if an
attempt is made to crack the case of the computer to alter anything, the
system is shut down.  Applications are not allowed on these systems that can
communicate directly outside of a closed network either, so anything 'sent'
from the machine must stay within a closed system, and all transactions are
logged collecting to/from data.

ON a news story this week Manning was quoted as stating he took a portable
CD/DVD player into work with him with a disc with music on it, he then
connected the device to a computer, erased the music, compressed files, and
wrote them to the disc, removing it in his music player at the end of the
day.  Given the volume of data he had, he had to have done this multiple
times, so this was a concerted effort.

Larry
[log in to unmask]
[Yes, it's really me =) ]

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2