Clinton Emails Case Highlights Dangers to National Security

One aspect of National Security is about guarding the secrets that our adversaries could use against us. All personnel involved in classified information at any level are taught from the beginning that Personal Security is Job One. What this means is that the security forces cannot oversee every particle of secret information that is being processed. It is up to the individual to provide the first level of security. Now add to that the complexity of the world today. The internet, emails, and complex communications systems have replaced the printed page as the only thing needing securing.


As Written By Cory Bennett and Julian Hattem at The Hill:

Clinton case shines light on danger to national secrets

The sheer volume of mobile phones, laptops and tablets used by federal officials is making it difficult to stop leaks of classified information, officials worry.

The controversy over Hillary Clinton‘s private email has drawn fresh scrutiny to the handling of classified information.

While Clinton’s is a high profile and somewhat unusual case, officials say federal employees across the board are struggling to keep security practices apace with rapidly evolving technology.

The prevalence of email and the dramatic growth of the national security state simply makes leaks all but inevitable, they say.

“In this world, with the amount of communication, with the Internet, there’s so much that’s out there,” said Rep. Dutch Ruppersberger (Md.), formerly the top Democrat on the House Intelligence Committee.

The leaking of classified information — whether within the government or to the public — is infrequent but not unusual, officials say.

“Does it happen? Yes. Does it happen more than rarely? Yes. Does it happen regularly? No, it doesn’t,” said John Cohen, who worked in intelligence posts under both Presidents George W. Bush and Obama.

The government has long struggled with how to handle potentially sensitive information, torn between calls for transparency and the need to keep operations secret.

This high-wire routine only became more difficult with the proliferation of email and text messaging, and the many devices — BlackBerries, iPhones, iPads, laptops — people now use to chat.


Leave a Comment

We have no tolerance for comments containing violence, racism, vulgarity, profanity, all caps, or discourteous behavior. Thank you for partnering with us to maintain a courteous and useful public environment where we can engage in reasonable discourse.