G2TT
来源类型Research Reports
规范类型报告
ISBN9780833081803
来源IDRR-409-OSD
Fixing Leaks: Assessing the Department of Defense's Approach to Preventing and Deterring Unauthorized Disclosures
James B. Bruce; W. George Jameson
发表日期2013
出版年2013
页码76
语种英语
结论

The Department of Defense Faces Strategic Obstacles in Stemming Disclosures

  • Media leaks have many causes but few feasible and effective solutions.
  • There is a longstanding organizational culture in DoD that treats leaking classified information to the media as nearly risk-free, which suggests to some that the behavior is acceptable.
  • To be fully effective, remedies must address the full range of security, classification, and particularly UD-related behavior, and establish an end-to-end accountability process from initial UD identification through the imposition of effective penalties for violations.

Tactical Obstacles Also Exist

  • Successfully addressing the unauthorized disclosures problem requires carefully calibrating the focus of current efforts and prioritizing the most serious UDs for action.
  • The current plan focuses mostly on identification and reporting, but these activities must be complemented by other, equally significant tasks, such as assigning responsibility and ownership for acting on the reported disclosure and seeing the action through all the needed steps to bring it to closure.
  • The language and guidance addressing UDs in DoD directives and manuals is often unclear, inconsistent, or ambiguous, and requires clarification,
  • It is important to identify steps where security can act before leaks occur, as well as determining where new measures could improve the security clearance vetting process.
  • The lack of metrics to track results, the sensitivity of counterintelligence investigations, insufficient authority of UD PIT members within their own components, and insufficient outreach to non-DoD elements all require correctives to improve implementation effectiveness.
摘要
  • Grow the initiative through a recalibrated and even more ambitious agenda, as well as through greater senior-level oversight and direction.
  • With the recent transition in Defense Secretaries, ensure that the top-level priority and support assigned to the initiative by the previous Secretary is reinforced and sustained by the new leadership.
  • Empower the Program Implementation Team members within their components and establish a Senior Executive Service-level steering group.
  • Prioritize the most-serious classified disclosures to the media for concerted action.
  • Establish metrics to track results.
  • Establish full accountability by identifying leakers and apply sanctions to promote the realization that leaking classified information will not be tolerated.
  • Ensure that full ownership of every serious UD is assumed or assigned, that accountability is established as offenders are identified and adjudicated, and that appropriate sanctions are implemented before any serious case is brought to closure.
  • Clarify policies, directives, and guidance to help managers understand their authorities and responsibilities to ensure that accountability is established and offenders are punished for violations.
  • To facilitate compliance, sanctions must be timely, visible, meaningful, and fair.
  • Prioritize and deliver quality training and education regarding unauthorized disclosures.
  • Ensure language clarity and consistency in all relevant documents, directives, manuals, and official issuances — and along the full range of departmental authorities.
  • Review security vetting for classified access and reform security measures to include a reliable and predictive evaluation of security trustworthiness.
  • Conduct studies to assess the causes, consequences, and correctives to significant UDs, and to improve measures to identify and punish leakers for violations.
主题Cybersecurity ; Intelligence Community ; Law Enforcement ; United States Department of Defense
URLhttps://www.rand.org/pubs/research_reports/RR409.html
来源智库RAND Corporation (United States)
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/107619
推荐引用方式
GB/T 7714
James B. Bruce,W. George Jameson. Fixing Leaks: Assessing the Department of Defense's Approach to Preventing and Deterring Unauthorized Disclosures. 2013.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1495316374130.jpg(10KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR409.pdf(736KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[James B. Bruce]的文章
[W. George Jameson]的文章
百度学术
百度学术中相似的文章
[James B. Bruce]的文章
[W. George Jameson]的文章
必应学术
必应学术中相似的文章
[James B. Bruce]的文章
[W. George Jameson]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1495316374130.jpg
格式: JPEG
文件名: RAND_RR409.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。