Intell's computer balancing act

The intelligence community has long been a leader in the development of cuttingedge information technologies. But, as last week's events demonstrate, that position is imperiled by the attempt to balance security and privacy with better access to information.

The intelligence community has long been a leader in the development of

cutting-edge information technologies. But, as last week's events demonstrate,

that position is imperiled by the attempt to balance security and privacy

with better access to information.

The most glaring example is the recent case of former CIA director John

Deutch, who may have compromised thousands of pages of highly classified

material by storing the data on a home computer equipped with an unsecured

Internet connection. CIA director George Tenet called his former boss' actions

"sloppy."

The Deutch example represents the ultimate insider threat, where people

use authorized access in unauthorized, or simply irresponsible, ways.

"What this whole fiasco really demonstrates is that the existing information

technology capabilities of the U.S. intelligence community, and the related

security constraints, make it impossible for anyone, even the director of

Central Intelligence, to work efficiently from home or anywhere else, with

due regard for security," said Robert Steele, a former CIA officer and chief

executive officer of Open Source Solutions Inc.

The disclosure of Deutch's blunder comes on the heels of the Energy

Department's effort to restructure agency security policy in light of the

indictment of former DOE physicist Wen Ho Lee. Lee is accused of downloading

nuclear weapons information onto an unclassified computer system and storing

that data on unsecured tape storage devices.

But the tendency to increase monitoring and bolster cyberdefenses comes

with its own set of problems, such as how cyberintelligence is balanced

with privacy. Marc Rotenberg, executive director of the Electronic Privacy

Information Center, pointed to the National Security Agency as a prime example.

"The problem is that the federal government has two very distinct views

of computer security," Rotenberg said in a statement delivered to Congress

last week. One view is securing your own communications and the other is

intercepting the electronic emanations of suspected criminals, he said.

"In no agency are the two notions more at odds than the [NSA]," which is

responsible for federal systems security standards and developing methods

to crack encryption codes and break into networks.

NEXT STORY: VA's time line