Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: CFW

He probably didn’t have official access to the information, but as an IT tech he would know how to get it if he wanted to. i.e. log in to “JWICS” as one of the members of your unit that does have access...he is the one in charge of log-ins/passwords, etc. for the unit. It is a National Guard unit...less “stringent”/formal shall we say. You would be surprised what a “low-level” IT person can get away with if they have bad intentions...they get the call when the CO forgets their password. ;-)


17 posted on 04/14/2023 10:48:43 PM PDT by Drago
[ Post Reply | Private Reply | To 15 | View Replies ]


To: Drago

Thanks for some sound, down-to-earth ideas.


42 posted on 04/15/2023 7:54:26 AM PDT by gloryblaze
[ Post Reply | Private Reply | To 17 | View Replies ]

To: Drago

He would at least be the same security clearance level to be ‘in charge of passwords’. But that is a serious OPSEC violation to have someone else’s password.

A more likely scenario imo is an email over-distribution spillage. Where briefing emails are sent beyond the intended, cleared audience who will be attending briefings.

Once it’s in email it can be anywhere.

What’s more interesting is how those documents passed an email guard (computer guard) to get to a network with a printer. Then how the printed documents got outside the facility.

Gonna be an interesting cyber investigation. I have no doubt they’ll have the full failure detailed within a month or so.


44 posted on 04/15/2023 8:39:56 AM PDT by Justa (If where you came from is so great then why aren't Floridians moving there?)
[ Post Reply | Private Reply | To 17 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson