An argument can be made that the rape of military personnel represents an insider threat. Nobody has a model of what this insider threat stuff is supposed to look like, said the senior Pentagon official, explaining that inside the Defense Department there are a lot of chiefs with their own agendas but no leadership.
The Department of Education, meanwhile, informs employees that co-workers going through certain life experiences . . . might turn a trusted user into an insider threat. Those experiences, the department says in a computer training manual, include stress, divorce, financial problems or frustrations with co-workers or the organization.
An online tutorial titled Treason 101 teaches Department of Agriculture and National Oceanic and Atmospheric Administration employees to recognize the psychological profile of spies.
A Defense Security Service online pamphlet lists a wide range of reportable suspicious behaviors, including working outside of normal duty hours. While conceding that not every behavior represents a spy in our midst, the pamphlet adds that every situation needs to be examined to determine whether our nations secrets are at risk.
The Defense Department, traditionally a leading source of media leaks, is still setting up its program, but it has taken numerous steps. They include creating a unit that reviews news reports every day for leaks of classified defense information and implementing new training courses to teach employees how to recognize security risks, including high-risk and disruptive behaviors among co-workers, according to Defense Department documents reviewed by McClatchy.
Its about peoples profiles, their approach to work, how they interact with management. Are they cheery? Are they looking at Salon.com or The Onion during their lunch break? This is about The Stepford Wives, said a second senior Pentagon official, referring to online publications and a 1975 movie about robotically docile housewives. The official said he wanted to remain anonymous to avoid being punished for criticizing the program.
The emphasis on certain behaviors reminded Greenstein of her employee orientation with the CIA, when she was told to be suspicious of unhappy co-workers.
If someone was having a bad day, the message was watch out for them, she said.
Some federal agencies also are using the effort to protect a broader range of information. The Army orders its personnel to report unauthorized disclosures of unclassified information, including details concerning military facilities, activities and personnel.
The Peace Corps, which is in the midst of implementing its program, takes very seriously the obligation to protect sensitive information, said an email from a Peace Corps official who insisted on anonymity but gave no reason for doing so.
Granting wide discretion is dangerous, some experts and officials warned, when federal agencies are already prone to overreach in their efforts to control information flow.
The Bush administration allegedly tried to silence two former government climate change experts from speaking publicly on the dangers of global warming. More recently, the FDA justified the monitoring of the personal email of its scientists and doctors as a way to detect leaks of unclassified information.
But R. Scott Oswald, a Washington attorney of the Employment Law Group, called the Obama administration a friend to whistleblowers, saying it draws a distinction between legitimate whistleblowers who use internal systems to complain of wrongdoing vs. leakers, who illegally make classified information public.
There are numerous cases, however, of government workers who say theyve been forced to go public because theyve suffered retaliation after trying to complain about waste, fraud and abuse through internal channels or to Congress. Thomas Drake, a former senior NSA official, was indicted in 2010 under the Espionage Act after he disclosed millions of dollars in waste to a journalist. Hed tried for years to alert his superiors and Congress. The administration eventually dropped the charges against him.
The Pentagon, meanwhile, declined to answer how its insider threat program would accommodate a leak to the news media like the Pentagon Papers, a top-secret history of U.S. involvement in Vietnam that showed how successive administrations had misled the public and Congress on the war.
The danger is that supervisors and managers will use the profiles for Disgruntled Employees and Insider Threats to go after legitimate whistleblowers, said the second Pentagon official. The executive order says you cant offend the whistleblower laws. But all of the whistleblower laws are about retaliation. That doesnt mean you cant profile them before theyre retaliated against.
Greenstein said she become the target of scrutiny from security officials after she began raising allegations of mismanagement in the CIAs operations in Baghdad. But she never leaked her complaints, which included an allegation that her security chief deleted details about safety risks from cables. Instead, she relied on the agencys internal process to make the allegations.
The CIA, however, tried to get the Justice Department to open a criminal case after Greenstein mentioned during a polygraph test that she was writing a book, which is permitted inside the agency as long as it goes through pre-publication review. The CIA then demanded to see her personal computers. When she got them back months later, all that shed written had been deleted, Greenstein said.
They clearly perceived me as an insider threat, said Greenstein, who has since rewritten the book and has received CIA permission to publish portions of it. By saying I have a problem with this place and I want to make it better, I was instantly turned into a security threat, she said. The CIA declined to comment.




















My Yahoo