{"id":443406,"date":"2023-04-13T16:40:18","date_gmt":"2023-04-13T14:40:18","guid":{"rendered":"https:\/\/innovationorigins.com\/?p=443406"},"modified":"2023-04-13T16:40:18","modified_gmt":"2023-04-13T14:40:18","slug":"tech-vs-secrets-the-ongoing-battle-for-secure-communication","status":"publish","type":"post","link":"https:\/\/ioplus.nl\/archive\/en\/tech-vs-secrets-the-ongoing-battle-for-secure-communication\/","title":{"rendered":"Tech vs Secrets: the ongoing battle for secure communication"},"content":{"rendered":"\n<p>A young gun enthusiast known as &#8220;OG&#8221; has leaked a massive amount of top-secret US government documents, exposing spying on allies, Ukraine-Russia war prospects, and sensitive information. The <a href=\"https:\/\/www.washingtonpost.com\/national-security\/2023\/04\/12\/discord-leaked-documents\/\" target=\"_blank\" rel=\"noreferrer noopener\">Washington Post<\/a> reported on this.  The documents were shared within a private Discord group, initially through transcriptions and later as photographs of the actual files. The leaks prompt questions regarding the technologies used to safeguard military secrets and how advancements in technology may be breaking down these protective barriers. The Pentagon is currently conducting an internal review, while the FBI investigates the source of the leaks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security measures and protocols<\/h2>\n\n\n\n<p>Classified information is traditionally protected through a combination of physical security measures, access controls, and strict protocols for handling sensitive data. However, human error or malintent can create vulnerabilities in these systems. In the case of the Pentagon leaks, an employee appears to have broken the established protocols by photographing and sharing classified documents. This highlights a common weak point in security: the human factor.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Social engineering<\/h2>\n\n\n\n<p>Social engineering is a form of manipulation used to access sensitive information. In the case of the Pentagon leaks, it is likely the leaker used social engineering tactics, such as feigning an official position or using deceptive language, to gain access to the documents.<\/p>\n\n\n\n<p>The leaker reportedly used a simple method of photographing paper documents, bypassing any sophisticated cybersecurity measures. This demonstrates that even low-tech methods can have a significant impact on the security of sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Advancements in data protection and leak prevention<\/h2>\n\n\n\n<p>As technology evolves, new methods for data protection and leak prevention emerge. Some examples of recent advancements include artificial intelligence (AI) and machine learning, which can be used to detect and prevent data leaks more effectively. However, cybercriminals can also use these same technologies to identify vulnerabilities and exploit existing security safeguards. Consequently, a proactive approach to data leak prevention is crucial, including continuous monitoring and adaptation of security strategies.<\/p>\n\n\n<div class=\"vlp-link-container vlp-layout-basic wp-block-visual-link-preview-link advgb-dyn-fe88abbe\"><a href=\"https:\/\/innovationorigins.com\/en\/digital-decoys-provide-more-it-security\/\" class=\"vlp-link\" title=\"Digital decoys provide more IT security - Innovation Origins\" target=\"_blank\"><\/a><div class=\"vlp-layout-zone-side\"><div class=\"vlp-block-2 vlp-link-image\"><img decoding=\"async\" src=\"https:\/\/innovationorigins.com\/app\/uploads\/2018\/05\/cybercrime.jpg\" style=\"max-width: 150px; max-height: 150px\" \/><\/div><\/div><div class=\"vlp-layout-zone-main\"><div class=\"vlp-block-0 vlp-link-title\">Digital decoys provide more IT security &#8211; Innovation Origins<\/div><div class=\"vlp-block-1 vlp-link-summary\">A system developed by the German Research Institute for Artificial Intelligence fools criminal hackers into thinking that the infrastructure is easy to infiltrate.<\/div><\/div><\/div>\n\n\n<p>AI is being used to reconstruct hidden data by analyzing patterns and correlations between different elements of information. For example, AI can be used to analyze large data sets and look for tell-tale signs of unusual activity that might indicate a data leak. AI can also be used to detect patterns in language, such as keywords or phrases that may indicate malicious intent, and flag them for further investigation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Limited data security resources<\/h2>\n\n\n\n<p>The Defense Security Service (DSS) has been facing challenges in administering the National Industrial Security Program, as adversaries attempt to steal national security information and technology at unprecedented rates. The DSS has been unable to conduct security reviews at around 60% of cleared facilities due to resource constraints and an inability to manage workloads and complete training on current threats and technologies. To address these challenges, the DSS plans to implement a new monitoring approach for emerging threats at facilities, focused on prioritising security reviews based on assets and threats to assets.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Person Behind Leaked Pentagon Documents Identified\" width=\"563\" height=\"1000\" src=\"https:\/\/www.youtube.com\/embed\/n4gRL13T4W0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Industrial security addresses information systems, personnel, and physical security of facilities and cleared employees with access to classified information. To focus on safeguarding classified information and technology in data protection and information leaks prevention, the DSS must improve collaboration with stakeholders and identify roles, responsibilities, and resources.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>As technology advances, the battle for secure communication continues. The Pentagon leaks showcase a prime example of human error posing a significant risk to sensitive information, despite existing security measures. New technologies, such as AI and machine learning, can help protect classified information, but they can also be exploited by cybercriminals. A proactive and adaptive approach to data leak prevention is necessary, as well as continued investment in training, monitoring, and collaboration with stakeholders.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A young gun enthusiast known as &#8220;OG&#8221; has leaked a massive amount of top-secret US government documents, exposing spying on allies, Ukraine-Russia war prospects, and sensitive information. The Washington Post reported on this. The documents were shared within a private Discord group, initially through transcriptions and later as photographs of the actual files. The leaks [&hellip;]<\/p>\n","protected":false},"author":2580,"featured_media":494046,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"categories":[8553],"tags":[33367,77215,77217,77220,28934],"location":[6763,76794],"article_type":[60595],"serie":[],"archives":[],"internal_archives":[],"reboot-archive":[],"class_list":["post-443406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital","tag-it-en","tag-leaks","tag-pentagon","tag-secret-documents","tag-security-en","location-netherlands","location-united-states","article_type-analysis"],"blocksy_meta":[],"acf":{"subtitle":"How the Pentagon secrets could be leaked, and what can we learn to prevent data leaks ourselves? ","text_display_homepage":false},"author_meta":{"display_name":"Laio","author_link":"https:\/\/ioplus.nl\/archive\/author\/laio\/"},"featured_img":"https:\/\/ioplus.nl\/archive\/wp-content\/uploads\/2023\/04\/wXW5mle3_2x.jpg","coauthors":[],"tax_additional":{"categories":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">Digital<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">Digital<\/span>"]},"tags":{"linked":["<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">IT<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">leaks<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">pentagon<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">secret documents<\/a>","<a href=\"https:\/\/ioplus.nl\/archive\/en\/category\/digital\/\" class=\"advgb-post-tax-term\">security<\/a>"],"unlinked":["<span class=\"advgb-post-tax-term\">IT<\/span>","<span class=\"advgb-post-tax-term\">leaks<\/span>","<span class=\"advgb-post-tax-term\">pentagon<\/span>","<span class=\"advgb-post-tax-term\">secret documents<\/span>","<span class=\"advgb-post-tax-term\">security<\/span>"]}},"comment_count":"0","relative_dates":{"created":"Posted 3 years ago","modified":"Updated 3 years ago"},"absolute_dates":{"created":"Posted on April 13, 2023","modified":"Updated on April 13, 2023"},"absolute_dates_time":{"created":"Posted on April 13, 2023 4:40 pm","modified":"Updated on April 13, 2023 4:40 pm"},"featured_img_caption":"","series_order":"","_links":{"self":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/443406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/users\/2580"}],"replies":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/comments?post=443406"}],"version-history":[{"count":0,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/posts\/443406\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media\/494046"}],"wp:attachment":[{"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/media?parent=443406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/categories?post=443406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/tags?post=443406"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/location?post=443406"},{"taxonomy":"article_type","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/article_type?post=443406"},{"taxonomy":"serie","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/serie?post=443406"},{"taxonomy":"archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/archives?post=443406"},{"taxonomy":"internal_archives","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/internal_archives?post=443406"},{"taxonomy":"reboot-archive","embeddable":true,"href":"https:\/\/ioplus.nl\/archive\/wp-json\/wp\/v2\/reboot-archive?post=443406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}