Verified Document

Social Engineering Attacks Counterintelligence Essay

Social Engineering Attacks Counter Intelligence Social Engineering Counter Intelligence

Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs.

Social engineering is the theft of classified information. Then, using it to change everyone's opinions and perceptions about what is happening. Counter intelligence is preventing hostile enemies or organizations from obtaining access to sensitive material. These areas are viewed from two different perspectives. The first one is that of more liberal attitudes. They believe that any kind of secret files, are allowing the U.S. government to hide the truth. This is when it has no accountability for engaging in different actions. These voices, feel any kind of disclosures of classified information, is critical to understanding the larger issues and letting the public (i.e. world) know what they are up to. (Mulrine, 2013) (Harding, 2011) ("Wiki Leaks," 2010) ("Wiki Leaks Releases," 2010)

Many groups such as Amnesty International believe that these documents were critical in bring about the Arab Spring. Moreover, they played a major part in forcing the U.S. To leave Iraq. This is when the Iraqi government refused to support the extensions of U.S. troops after the December 31, 2011 deadline. The potential implications are: the status quo cannot hide behind a veil of secrecy and there will be greater levels of accountability. (Harding, 2011) ("Wiki Leaks," 2010) ("Wiki Leaks Releases," 2010)

Another set of voices, believes that these kinds of disclosures are dangerous to national security. This is because, these actions place the lives of personnel in danger and they offer the enemy insights about American capabilities. Furthermore, it harms the ability of government officials to build strong relations with other countries by web sites releasing this information for their own benefit. Over the long-term, this makes the nation less prepared to confront....

Those enemies which are determined to harm American interests. (Harding, 2011) ("Wiki Leaks," 2010) ("Wiki Leaks Releases," 2010)
Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in Wiki Leaks.

Forming a sound information security workforce is vital for the U.S. government in maintaining a certain amount of secrecy. During times of conflict, this can be used to prevent rouge nations and terrorist groups from harming U.S. interests at home or abroad. When the network is secure, this makes it easier to prevent attacks and mitigate the possibility of some unknown variables influencing a host of situations. It is this point, where U.S. policy is more effective and capable of achieving the long-term objectives. (Mulrine, 2013) (Harding, 2011) ("Wiki Leaks," 2010) ("Wiki Leaks Releases," 2010)

The challenges faced by organizations, is from rouge employees who are disclosing this information. This is because they do not agree with the policies of the U.S. government. Instead, of voicing their concerns, they will leak this information to the press (in order to gain notoriety or highlight their displeasure). The case involving Wiki Leaks is the classic example of this. As Bradley Manning disclosed all these documents, because he wanted to illustrate his discontent about what was happening. (Mulrine, 2013) (Harding, 2011) ("Wiki Leaks," 2010) ("Wiki Leaks Releases," 2010)

During his recent trial, Manning's attorneys said, "If you had unprecedented access to classified networks, 14 hours a day, seven days a week -- for eight plus months -- what would you do? He saw incredible things, horrible things, things that belonged in the public domain and not on some server stored in a dark room in Washington, D.C." This is illustrating the challenges of hiding this sensitive information in order to protect the public. The problem is that some people…

Sources used in this document:
References

Wiki Leaks. (2010). ABC News. Retrieved from: http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq-war/story?id=11949670

Wiki Leaks Releases. (2010). VOA News. Retrieved from: http://www.voanews.com/content/wikileaks-releases-400000-classified-us-military-files-105568738/128719.html

Fowler, A. (2011). The Most Dangerous Man in the World. Carlton: University of Melbourne Press.

Harding, L. (2011). Wiki Leaks. New York, NY: Public Affairs.
Mulrine, A. (2013). Bradley Manning Trial. CS Monitor. Retrieved from: http://www.csmonitor.com/USA/Justice/2013/0726/Bradley-Manning-trial-Leakers-Julian-Assange-and-Daniel-Ellsberg-weigh-in-video
Cite this Document:
Copy Bibliography Citation

Related Documents

Origins of Al Qaeda the
Words: 7002 Length: 25 Document Type: Term Paper

His extremism has always been well-known and knowingly harboring him is a significant international offense. In December of 2000 the United Nations imposed sanctions against an Afghanistan struggling under Taliban rule, as a way to get the official government to hand Bin-laden over to international authorities, to answer for his already long list of terrorist crimes and collusions. Since 1998 more than 150 members of Al-Qaeda has been arrested in

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now