top | item 43475818

(no title)

GVIrish | 11 months ago

That doesn't really make sense. If they had strong reason to believe that the secure comms systems they were supposed to be using were compromised, using personal phones to communicate outside of SCIFs is very, very far from what any competent person who understands and is briefed on the threat environment would do. Note that none of the people involved are making that argument because it would make them look even more incompetent.

discuss

order

ctrlp|11 months ago

Not arguing it was the best choice. But, I'm curious, if you were in the position where you had strong reasons to believe the official secure channels available to you were compromised by your political opponents who were leaking information received via those channels to undermine your policy initiatives, and needed to act and coordinate nonetheless, what would you do?

digdugdirk|11 months ago

Follow the SOP (and the law) and use a SCIF.

What they did is illegal. Any rank and file that did the same would be in prison for a decade, no questions asked.

In general, it seems like you're trying to "3d chess" incompetence into strategy, but try taking a step back and looking at it with clear eyes. This was a bad decision, plain and simple. Nobody is taking responsibility for it, and that makes it worse - these people are in charge of the largest intelligence and war machine on the planet. This is not okay.

giantrobot|11 months ago

> But, I'm curious, if you were in the position where you had strong reasons to believe the official secure channels available to you were compromised by your political opponents who were leaking information received via those channels to undermine your policy initiatives, and needed to act and coordinate nonetheless, what would you do?

Here's a pretty good order of operations when your policy breaks the law or is so odious as to feel the need to hide it from other duly elected representatives in government:

1. Stop breaking the fucking law.

chihuahua|11 months ago

I would use a private service like Signal, and make sure to add a journalist that will leak information to undermine my policy initiatives - obviously! (because I'm a genius)

GVIrish|11 months ago

So you're using the word 'compromised'. In this context that would mean malware, unauthorized access, circumvented logging, etc. If someone thought this was happening the answer would be to lock the system down, perform forensic audits, and prosecute anyone who compromised these systems.

If you're talking about fear of leakers, the response to that is to tighten the distribution of information and start a counterintelligence investigation.

In any case the simple risk calculus is, what is the risk of adversaries getting a hold of this information and causing grave and lasting damage to national security and death vs the risk of political rivals leaking something. Pretty simple decision there and one that any cabinet member should get right.

KerrAvon|11 months ago

[deleted]

lmm|11 months ago

So what would the smart move have been in that case?