-Caveat Lector-

Clinton adviser breached security NSC

Official transferred classified files to unsecured network, but
kept her job.

By Paul Sperry
WorldNetDaily.com


WASHINGTON -- A national security adviser to President Clinton
was caught transferring highly classified computer files from a
secure network in the White House to an unsecured network, but
was allowed to stay on the job, White House sources tell
WorldNetDaily.

The 1998 breach in security occurred when the National Security
Council official copied classified files onto a disk from an NSC
computer in a secure area of the West Wing, White House employees
say.

She then loaded the files onto a computer connected to an
unsecured network in her Old Executive Office Building office,
exposing the secret data to potential Internet hackers and
foreign spies, sources say.

"It was a bunch of files, not just one," said a White House
employee familiar with the incident.  "And they were all
classified, which made it a serious security violation."

Jaime Borrego, former White House information security officer,
uncovered the computer security breach and alerted White House
Security Officer Charles Easley.

Easley, in turn, met with then-White House Chief of Staff Erskine
Bowles to discuss how to proceed with an investigation into the
security infraction and potential compromise of U.S.
intelligence.

After the adviser admitted taking the classified files, Easley
confiscated her computer and took away her building security
badge.

But White House sources say the national security adviser, who is
a Clinton appointee, was allowed to return to her job after going
out on extended leave.

"She was supposed to be fired and wasn't," said a White House
employee close to the investigation.  "She went on maternity
leave.  Now she's back working at NSC."

National security experts say the White House security violation
fits a pattern of sloppy handling of U.S.  secrets throughout the
government during the past eight years:

State Department officials lost several classified laptops.

A missing hard drive containing nuclear secrets turned up behind
a copier at Los Alamos lab.

A Los Alamos scientist managed to download the entire history of
the U.S.  nuclear-bomb program and bomb-testing data onto several
computer tapes, some of which still haven't been recovered.

A Pentagon official left his CIA briefing book in a Beijing hotel
room.

Even CIA Director John Deutch mishandled secrets.

Clinton, along with his National Security Adviser Sandy Berger,
have for the most part brushed off the problems as unfortunate
but isolated events, while assuring Americans that their national
security secrets are safe.

"But this latest breach lays the problem right at the West Wing
and at Berger's door," said William C.  Triplett, a former Reagan
White House official, who notes that Berger was a lobbyist for
China before joining the NSC.

The White House refused to identify the NSC official who
mishandled the classified material.

"It's been a long-standing policy of the White House that we do
not discuss internal security matters and investigations," said
White House spokesman Mark Kitchens.

Asked why the woman was allowed to keep her job, Kitchens said,
"We don't discuss our internal policies."

Neither Kitchens nor NSC spokesman P.J.  Crowley would say if the
adviser has retained her CIA clearance to review classified
information.

"This is the president's national security staff, so they're
going to have access to the most sensitive materials the United
States has," said Ken deGraffenreid, who headed intelligence
programs at the NSC from 1981 to 1987.

"Everybody there would be cleared for extremely high levels of
compartmented information, because it's just the nature of the
work," he added.

White House insiders say the adviser accessed the files from a
West Wing "SCIF" -- a secure room where material classified Top
Secret and above is stored in vaults and on secure computers.

Some SCIFs protect super-secret coded information.  If such data
fell into the wrong hands, they could cause grave danger to U.S.
security -- especially if they were transmitted electronically.

For that reason, SCIFs can't have computers connected to an
unclassified system, even if it's the White House local area
network used only by employees.  They have to be on a secure
system.

"You can't bring in a regular phone line or Internet line into a
full-up SCIF.  You can't take a cell phone in there, even though
many of the rooms are hardened to protect against electronic
eavesdropping," said deGraffenreid.

"The rooms have access locks.  Uncleared people can't get in.
Security officers are responsible for guarding them, along with
information security specialists," he added.

And there should still be procedures in place for removing
magnetic media, he says.  Staffers shouldn't be able to take
disks in or out -- unless they log them out and give a specific
destination, such as another SCIF.

"If someone takes a disk out of a SCIF without logging it,
they're breaking the rules," deGraffenreid said.

Transferring classified files to an unsecured network is a big
no-no, former White House officials say.

"That's what Wen Ho Lee did," Triplett said.  Lee is the Los
Alamos scientist convicted of stealing secret restricted nuclear
data, a felony.

White House sources say the NSC official's computer hard drive
was supposed to be wiped clean of the classified data she
uploaded.  It's not clear if that was done.  It's also not clear
what became of the disk she used.

The White House would not say.

"What was she doing uploading those files?" asked Notra Trulock,
former Energy Department counterintelligence director.  "There's
no good reason for it."

"And did that classified information get onto an unclassified
server?" he wondered.

According to one source, Borrego, a Naval officer detailed over
to the White House from the National Security Agency at the time,
spotted the security breach by "doing scans of people's systems."

Poor grade from GAO

The Clinton White House has not had a good security track record.

In 1994, more than a year after taking office, more than 100
senior White House aides still had no security clearances.  They
were granted access to highly classified information anyway,
according to former White House FBI agent Gary Aldrich and
others.

And in a 1998 report, the General Accounting Office found that
between 1993 and 1996 there were no procedures to control access
to Sensitive Compartmented Information -- the level of
classification above Top Secret -- within the Executive Office of
the President.

The White House vowed to fix the problems.

But its security procedures issued in March 1998 did not set
specific guidelines for safeguarding classified information.

What's more, Clinton never established a security self-inspection
program, despite an executive order mandating one.  The White
House director of information security said his office has never
done a security inspection of classified programs at the White
House.

"My impression is that security in this White House has been
terrible," deGraffenreid said.  "They had problems just clearing
people in the beginning."

He says security was much tighter in the Reagan White House.

"We had very stringent controls over classified materials, though
all that was in the easier days of dealing with paper, not
networks," he said.

Still, "I can't recall any serious breaches then," deGraffenreid
said.  "And people who lost or misplaced classified documents
were dealt with severely."

"In fact," he added, "people back then were scared to death
they'd go to jail if they mishandled information."

Frank Gaffney, a former Reagan Defense official, agrees that
Clinton ushered in a new culture.

"There's been a dumbing down of national security," he said, "and
it's been systematic."

Gaffney says transferring classified files from the NSC network
to an unsecured network probably was not viewed by the political
appointees in the White House as a serious violation.

"Given what happened to Wen Ho Lee (who, from the start, was not
prosecuted aggressively by Attorney General Janet Reno, and was
let out of jail after he was convicted), I'm not sure that's a
hanging offense anymore," Gaffney said.

Trulock, who originally fingered Lee as a bad actor, says the NSC
official's breach is par for the course for the outgoing
administration.

"It's so typical of the people in this administration -- DOE
(Department of Energy), State ...  they all do it," he said.
"They just have no regard for security procedures put in place to
protect our secrets."


Paul Sperry is Washington bureau chief for WorldNetDaily.com.


=================================================================
             Kadosh, Kadosh, Kadosh, YHVH, TZEVAOT

  FROM THE DESK OF:
                     *Michael Spitzer*  <[EMAIL PROTECTED]>
                      ~~~~~~~~~~~~~~~
  The Best Way To Destroy Enemies Is To Change Them To Friends
=================================================================

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to