CACI's Dr. Jack London on WikiLeaks, the Insider Threat and Defining Cyber War

Dr. J.P. "Jack" London, CACI

In the wake of the WikiLeaks disclosures that tarnished American diplomatic relations and highlighted the issue of the insider threat, many wondered whether leaks can ever be stopped. CACI International Inc‘s Executive Chairman and Chairman of the Board Dr. Jack London, who previously called the world a “dangerous place,” talked to The New New Internet and gave an exclusive insight into why he believes legislative attention is needed to prevent secret spilling, why he is a firm believer of the rule of law, and what can be done to stop the unauthorized release of sensitive information.

On WikiLeaks and national security concerns:

“Certainly from a national security standpoint, it has created a significant challenge to our country and our national security establishment in terms of protecting really what purely are secrets and information and technical capability and so on that needs to be protected. And then, it’s a whole issue of really what constitutes an act of war. We’re in a world now, of course, where warfare can be implemented in various ways damaging to cultures and society that doesn’t involve kinetic energy, which traditionally has more the definition of combat and war was the kinetic side of things, if you will. And you’re dealing with something very new, conceptually and otherwise and, therefore, the statutes and the political arena is sort of, I would say, at a loss or certainly lagging behind the capability of adversaries and those that would be so disposed to do these kinds of things.”

On legislative attention:

“If I were clairvoyant and had a silver bullet, I would think that there needs to be some discourse around legislation that would create some definitions about what constitutes cyber warfare, what constitutes warfare in that domain, how warfare is distinguished from national security implications, from criminal activity. And I readily would make note of the fact that there undoubtedly would be some distinctions. But, the national security part of this is of course the part that concerns me from my professional position, if you will, and experience causes me considerable concern about it. [T]he Congress clearly would need to take a look at what I’ll call the commercial indiscretions that could come about from release of banking information, the things that we were talking about, proprietary technologies, patents, formulas, so forth.  Those kinds of things that are truly and legitimately company secrets. Those are private properties and need to be respected, but when you have the technology today that can just pile the stuff on a thumb drive and walk out the door and stick it in another box and spread it around the world. I mean, you got a different kind of a challenge.”

On the rule of law:

“I’m a rule of law person and if the rule of law says that the release of security-classified documents is against the law, then that’s where I am. If the Congress and the Supreme Court deem some other fashion, then that’s probably going to be fine with me, too, but I don’t think you can kind of say, ‘Well, there’s this need to know, so it’s okay for WikiLeaks to put stuff out, because the public needs to know this stuff.’ It’s a judgment that–and who authorizes? Who says and permits Mr. Assange to release all this stuff? Why does he think he has the authority to render a judgment about what is in the best interest of the people of this world, or the American people or national security? He has no right to do that anymore than anybody else.”

On preventing leaks:

“We’ve had some terrible, terrible violations of the sale of truly government national security military secrets to the Soviets, as you undoubtedly recall, and some things that were even sold to the Israelis or provided to them. I’m not sure that the notion of a 100 percent protection is even feasible, let alone something that can be addressed.  … The knowledge I have, or information I have that I’ve read and been briefed on from time to time, are people tend to believe with considerable conviction that the technological side of it is not the significant challenge that there are technologies, capabilities, systems, mechanisms and so on that would give you tremendous security protections, almost always on a tailor made basis, by the way.  … You have to revolve around or go back to the notion of screening, of compartmentalizing information or access maybe, access codes that have to be rotated.  You have to have a more elaborate mechanism, protocol, process, procedure, if you will, on the people side of the issue. There needs to be some conceptual way where you have to have a two-key solution.”

On the increase of WikiLeaks-like organizations:

“The funding and backing for these things can come from all kinds of sources, from organizations that are intent on focusing on competitors, if you’re in the commercial domain. And in an anonymous fashion, they can come from a small organization that can be funded by nation states on a paramilitary basis to attack other countries. [I]’ll be generous and say, [the United States is] lagging behind. I won’t say we’ve lost the game. By the way, I want to make a note that I believe the United States has a formidable cyber-warfare capability. …  There are some nation states that are very active in this area. As you know, Russia, certainly the Israelis and China have been coming on very strong. [The Chinese cyber threat] is formidable and it’s serious. And I think sort of ignoring it is frankly dangerous for us.”

The whole Q&A with Dr. Jack London follows on the next page.

You may also be interested in...

GSA Eyes ‘On-Ramp’ Solicitation for OASIS Small Business IDIQ’s Six Subpools

The General Services Administration has announced plans to issue a solicitation as an on-ramp for the six subpools of the One Acquisition Solution for Integrated Services Small Business contract vehicle. GSA’s Federal Acquisition Service said in a presolicitation notice published Friday that it expects to award 30 contracts for subpool 1, 20 contracts for subpool 3 and eight each for subpools 2, 4, 5B and 6 of the OASIS SB indefinite-delivery/indefinite-quantity contract.

SSL to Design Methane Emission Detection Satellite; Richard White Quoted

Maxar TechnologiesSSL subsidiary has received a contract from Environmental Defense Fund to design and define requirements for a small satellite designed to detect and monitor methane emissions from oil and gas facilities worldwide. MethaneSAT is a small form-factor satellite that will work to provide high-resolution images to help detect and measure low- and high-emission sources in regions that constitute more than 80 percent of global production of oil and gas per week, Maxar said Thursday

Booz Allen’s Sarah St. Clair on Lessons Learned From HR Tech Upgrade Project

Sarah St. Clair, vice president responsible for human resource services at Booz Allen Hamilton, told Diginomica in an interview published Tuesday about the company’s experiences and efforts to address challenges associated with upgrading its HR technology system. St. Clair discussed Booz Allen’s move to execute the Workday project to manage recruitment operations and mentioned some of the actions the company made to mitigate negative impacts associated with project implementation.