{"id":17473,"date":"2013-07-09T18:11:02","date_gmt":"2013-07-10T01:11:02","guid":{"rendered":"http:\/\/savingtherepublic.com\/blog\/?p=17473"},"modified":"2013-07-09T18:13:15","modified_gmt":"2013-07-10T01:13:15","slug":"obama-ordered-insider-threat-program-for-federal-workers-to-spy-on-each-other","status":"publish","type":"post","link":"http:\/\/savingtherepublic.com\/blog\/2013\/07\/obama-ordered-insider-threat-program-for-federal-workers-to-spy-on-each-other\/","title":{"rendered":"Obama Ordered Insider Threat Program for Federal Workers to Spy on Each Other"},"content":{"rendered":"<p><a href=\"https:\/\/i0.wp.com\/savingtherepublic.com\/blog\/wp-content\/uploads\/2012\/01\/obamabigbrother.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2760 alignleft\" alt=\"obama big brother\" src=\"https:\/\/i0.wp.com\/savingtherepublic.com\/blog\/wp-content\/uploads\/2012\/01\/obamabigbrother.gif?resize=158%2C132\" width=\"158\" height=\"132\" srcset=\"https:\/\/i0.wp.com\/savingtherepublic.com\/blog\/wp-content\/uploads\/2012\/01\/obamabigbrother.gif?w=625 625w, https:\/\/i0.wp.com\/savingtherepublic.com\/blog\/wp-content\/uploads\/2012\/01\/obamabigbrother.gif?resize=300%2C252 300w\" sizes=\"(max-width: 158px) 100vw, 158px\" data-recalc-dims=\"1\" \/><\/a>Obama has his own &#8220;rat out your co-workers&#8221; program that has taken this country another step right into Orwells <em>1984<\/em>. Designed to thwart leakers this program created in 2011 has government employees keeping a watchful eye on their co-workers and contractors who have access to sensitive material. (Didn&#8217;t work to well to stop Snowden!)<\/p>\n<p>So let&#8217;s see not only do they not trust the people, having everything we do and say recorded and stored by the NSA, but the regime doesn&#8217;t even trust their own employees!<br \/>\n&#8230;..<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" alt=\"\" src=\"https:\/\/i0.wp.com\/media.mcclatchydc.com\/smedia\/2013\/06\/20\/17\/08\/Q3DRl.La.91.jpg?resize=192%2C817\" width=\"192\" height=\"817\" data-recalc-dims=\"1\" \/><strong>Linchpin for Obama\u00e2\u20ac\u2122s plan to predict future leakers unproven, isn\u00e2\u20ac\u2122t likely to work, experts say<\/strong><br \/>\n<a href=\"http:\/\/www.mcclatchydc.com\/2013\/07\/09\/196211\/linchpin-for-obamas-plan-to-predict.html#.Udyy3j67uFI\">By Jonathan S. Landay and Marisa Taylor | McClatchy Washington Bureau<\/a><br \/>\nWASHINGTON \u00e2\u20ac\u201d In an initiative aimed at rooting out future leakers and other security violators, President Barack Obama has ordered federal employees to report suspicious actions of their colleagues based on behavioral profiling techniques that are not scientifically proven to work, according to experts and government documents.<\/p>\n<p>The techniques are a key pillar of the Insider Threat Program, an unprecedented government-wide crackdown under which millions of federal bureaucrats and contractors must watch out for \u00e2\u20ac\u0153high-risk persons or behaviors\u00e2\u20ac\u009d among co-workers. Those who fail to report them could face penalties, including criminal charges.<\/p>\n<p>Obama mandated the program in an October 2011 executive order after Army Pfc. Bradley Manning downloaded hundreds of thousands of documents from a classified computer network and gave them to WikiLeaks, the anti-government secrecy group. The order covers virtually every federal department and agency, including the Peace Corps, the Department of Education and others not directly involved in national security.<\/p>\n<p>Under the program, which is being implemented with little public attention, security investigations can be launched when government employees showing \u00e2\u20ac\u0153indicators of insider threat behavior\u00e2\u20ac\u009d are reported by co-workers, according to previously undisclosed administration documents obtained by McClatchy. Investigations also can be triggered when \u00e2\u20ac\u0153suspicious user behavior\u00e2\u20ac\u009d is detected by computer network monitoring and reported to \u00e2\u20ac\u0153insider threat personnel.\u00e2\u20ac\u009d<\/p>\n<p>Federal employees and contractors are asked to pay particular attention to the lifestyles, attitudes and behaviors \u00e2\u20ac\u201c like financial troubles, odd working hours or unexplained travel \u00e2\u20ac\u201c of co-workers as a way to predict whether they might do \u00e2\u20ac\u0153harm to the United States.\u00e2\u20ac\u009d Managers of special insider threat offices will have \u00e2\u20ac\u0153regular, timely, and, if possible, electronic, access\u00e2\u20ac\u009d to employees\u00e2\u20ac\u2122 personnel, payroll, disciplinary and \u00e2\u20ac\u0153personal contact\u00e2\u20ac\u009d files, as well as records of their use of classified and unclassified computer networks, polygraph results, travel reports and financial disclosure forms.<\/p>\n<p>Over the years, numerous studies of public and private workers who\u00e2\u20ac\u2122ve been caught spying, leaking classified information, stealing corporate secrets or engaging in sabotage have identified psychological profiles that could offer clues to possible threats. Administration officials want government workers trained to look for such indicators and report them so the next violation can be stopped before it happens.<\/p>\n<p>\u00e2\u20ac\u0153In past espionage cases, we find people saw things that may have helped identify a spy, but never reported it,\u00e2\u20ac\u009d said Gene Barlow, a spokesman for the Office of the National Counterintelligence Executive, which oversees government efforts to detect threats like spies and computer hackers and is helping implement the Insider Threat Program. \u00e2\u20ac\u0153That is why the awareness effort of the program is to teach people not only what types of activity to report, but how to report it and why it is so important to report it.\u00e2\u20ac\u009d<\/p>\n<p>But even the government\u00e2\u20ac\u2122s top scientific advisers have questioned these techniques. Those experts say that trying to predict future acts through behavioral monitoring is unproven and could result in illegal ethnic and racial profiling and privacy violations.<\/p>\n<p>\u00e2\u20ac\u0153There is no consensus in the relevant scientific community nor on the committee regarding whether any behavioral surveillance or physiological monitoring techniques are ready for use at all,\u00e2\u20ac\u009d concluded a 2008 National Research Council report on detecting terrorists.<a href=\"http:\/\/www.mcclatchydc.com\/2013\/07\/09\/196211\/linchpin-for-obamas-plan-to-predict.html#.Udyy3j67uFI\">..more <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Obama has his own &#8220;rat out your co-workers&#8221; program that has taken this country another step right into Orwells 1984. Designed to thwart leakers this program created in 2011 has government employees keeping a watchful&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_options":[]},"categories":[7077,21493,248],"tags":[4281,9472,194,30461,30459,30460,13437,9473,30463,30462],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/posts\/17473"}],"collection":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/comments?post=17473"}],"version-history":[{"count":0,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/posts\/17473\/revisions"}],"wp:attachment":[{"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/media?parent=17473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/categories?post=17473"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/savingtherepublic.com\/blog\/wp-json\/wp\/v2\/tags?post=17473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}