By Jim Garamone
American Forces Press Service
Robert J. Butler said sharing information within the military, with coalition partners and even with outside agencies will continue, but there will be more controls placed on the information.
The WikiLeaks posting of stolen classified information has highlighted the tension between the strategy of “share to win” and the necessity to enforce “need to know.”
Share to win refers to the idea of getting information and intelligence out to the personnel who need it.
“Commanders in the field recognize … it’s really about coalition war-fighting, and it’s about sharing information with partners,” Butler said. This is true whether the military is involved in humanitarian operations or warfighting.
Sharing information can range from the intelligence and information sharing the United States has with traditional military allies to non-governmental agencies.
“They are part of the fight, they are part of the recipe for success,” Butler said.
Need to know is the shorthand for how the department thinks about security, Butler said. “It’s about how information is shared, who has the information, for what purposes and for what period of time,” he said.
Information sharing networks range from local to national in Afghanistan , he said. All are governed by policies that seek to balance share to win with need to know.
“Based on our agreements with countries and their mechanisms for how they control information, we look for ways we can bridge accountability within their workforce and commanders with what we’re doing,” Butler said. “In Afghanistan , where we have a joint task force and we’re working on common objectives, it’s clear what information needs are. Those needs are transmitted down to subordinate units and those will include coalition partners with information requirements that need to be satisfied.
“We need to link the effects we want to achieve with an information-sharing approach,” he added.
The future will be more of the same, Butler said. “What I see happening is an absolute recognition that we have to share information, and at the same time recognizing an increasing challenge from the cyber threat,” he said.
DOD is taking near-term steps to address that threat. Some of those steps include examining the content on the networks and examining the tactics, techniques and procedures used. “A broader and longer-term perspective is an education program –- one that helps them understand what classification means, how information is classified,” he said. “Beyond the classification scheme, who has access to information?”
“You have this position, you have this mission, and we expect your access to stay open through this time,” he said. “There are re-visit decision points and there is accountability up the chain [of command].
“There are also ways to look for anomalies,” Butler continued, “so if something happens and we expect this individual to have access to this information and that person is looking at something else, that should set off a flag to look at the situation. There may be a perfectly valid reason for the anomaly. But it could be another WikiLeaks situation.”
DOD is closing the window against potential threats and potential adversaries, Butler said, through technical retro-fitting, and through educational and accountability programs.
No comments:
Post a Comment