Wednesday, 25 December, 2024

Sponsored

How the Latest Leaked Documents Are Different From Past Breaches


When WikiLeaks spilled a huge trove of State Department cables 13 years ago, it gave the world a sense of what American diplomats do each day — the sharp elbows, the doubts about wavering allies and the glimpses at how Washington was preparing for North Korea’s eventual collapse and Iran’s nuclear breakout.

When Edward Snowden swept up the National Security Agency’s secrets three years later, Americans suddenly discovered the scope of how the digital age had ushered in a remarkable new era of surveillance by the agency — enabling it to pierce China’s telecommunications industry and to drill into Google’s servers overseas to pick up foreign communications.

Sign up for The Morning newsletter from the New York Times

The cache of 100 or so newly leaked briefing slides of operational data on the war in Ukraine is distinctly different. The data revealed so far is less comprehensive than those vast secret archives but far more timely. And it is the immediate salience of the intelligence that most worries White House and Pentagon officials.

Some of the most sensitive material — maps of Ukrainian air defenses and a deep dive into South Korea’s secret plans to deliver 330,000 rounds of much-needed ammunition in time for Ukraine’s spring counteroffensive — is revealed in documents that appear to be barely 40 days old.

It is the freshness of the “secret” and “top secret” documents, and the hints they hold for operations to come, that make these disclosures particularly damaging, administration officials say.

On Sunday, Sabrina Singh, a Pentagon spokesperson, said U.S. officials had notified congressional committees of the leak and referred the matter to the Justice Department, which had opened an investigation.

The 100-plus pages of slides and briefing documents leave no doubt about how deeply enmeshed the United States is in the day-to-day conduct of the war, providing the precise intelligence and logistics that help explain Ukraine’s success thus far. While President Joe Biden has barred U.S. troops from firing directly on Russian targets, and blocked sending weapons that could reach deep into Russian territory, the documents make clear that a year into the invasion, the United States is heavily entangled in almost everything else.

The U.S. is providing detailed targeting data and coordinating the long, complex logistical train that delivers weapons to the Ukrainians. And as a Feb. 22 document makes clear, U.S. officials are planning ahead for a year in which the battle for the Donbas is “likely heading toward a stalemate” that will frustrate Russian President Vladimir Putin’s goal of capturing the region — and Ukraine’s goal of expelling the invaders.

One senior Western intelligence official summed up the disclosures as “a nightmare.” Dmitri Alperovitch, the Russia-born chair of Silverado Policy Accelerator, who is best known for pioneering work in cybersecurity, said Sunday that he feared there were “a number of ways this can be damaging.” He said that included the possibility that Russian intelligence is able to use the pages, spread out over Twitter and Telegram, “to figure out how we are collecting” the plans of the GRU, Russia’s military intelligence service, and the movement of military units.

In fact, the documents released so far are a brief snapshot of how the United States viewed the war in Ukraine. Many pages seem to come right out of the briefing books circulating among the Joint Chiefs of Staff, and in a few cases updates from the CIA’s operations center. They are a combination of the current order of battle and — perhaps most valuable to Russian military planners — U.S. projections of where the air defenses being rushed into Ukraine could be located next month.

Mixed in are a series of early warnings about how Russia might retaliate, beyond Ukraine, if the war drags on. One particularly ominous CIA document refers to a pro-Russian hacking group that had successfully broken into Canada’s gas distribution network and was “receiving instructions from a presumed Federal Security Service (FSB) officer to maintain network access to Canadian gas infrastructure and wait for further instruction.” So far there is no evidence that Russian actors have begun a destructive attack, but that was the explicit fear expressed in the document.

Because such warnings are so sensitive, many of the “top secret” documents are limited to American officials or to the “Five Eyes” — the intelligence alliance of the United States, Britain, Australia, New Zealand and Canada. That group has an informal agreement not to spy on the other members. But it clearly does not apply to other American allies and partners. There is evidence that the United States has plugged itself into Ukrainian President Volodymyr Zelenskyy’s internal conversations and those of even the closest U.S. allies, such as South Korea.

In a dispatch very reminiscent of the 2010 WikiLeaks disclosures, one document based on what is delicately referred to as “signals intelligence” describes the internal debate in South Korea over how to handle American pressure to send more lethal aid to Ukraine, which would violate the country’s practice of not directly sending weapons into a war zone. It reports that South Korea’s president, Yoon Suk Yeol, was concerned that Biden might call him to press for greater contributions to Ukraine’s military.

It is an enormously sensitive subject among South Korean officials. During a recent visit to Seoul, the South Korean capital, before the leaked documents appeared, government officials dodged a reporter’s questions about whether they were planning to send 155-mm artillery rounds, which they produce in large quantities, to aid in the war effort. One official said South Korea did not want to violate its own policies, or risk its delicate relationship with Russia.

Now the world has seen the Pentagon’s “delivery timeline” for sea shipments of those shells, along with estimates of the cost of the shipments, $26 million.

With every disclosure of secret documents, of course, there are fears of lasting damage, sometimes overblown. That happened in 2010, when The New York Times started publishing a series called “State’s Secrets,” detailing and analyzing selected documents from the trove of cables taken by Chelsea Manning, then an Army private in Iraq, and published by Julian Assange, the WikiLeaks founder. Soon after the first articles were published, Secretary of State Hillary Clinton expressed fear that no one would ever talk to U.S. diplomats again.

“In addition to endangering particular individuals, disclosures like these tear at the fabric of the proper function of responsible government,” she told reporters in the Treaty Room of the State Department. Of course, they did keep talking — although many foreign officials say that when they speak today, they edit themselves with the knowledge that they may be quoted in department cables that leak in the future.

When Snowden released vast amounts of data from the National Security Agency, collected with a $100 piece of software that just gathered up archives he had access to at a facility in Hawaii, there was similar fear of setbacks in intelligence collection. The agency spent years altering programs, at a cost of hundreds of millions of dollars, and officials say they are still monitoring the damage a decade later. In September, Putin granted Snowden, a low-level intelligence contractor, full Russian citizenship; the United States is still seeking to bring him back to face charges.

Both Manning and Snowden said they were motivated by a desire to reveal what they viewed as transgressions by the United States. “This time it doesn’t look ideological,” Alperovitch said. The first appearance of some of the documents seems to have taken place on gaming platforms, perhaps to settle an online argument over the status of the fight in Ukraine.

“Think about that,” Alperovitch said. “An internet fight that ends up in a massive intelligence disaster.”

Credit: Yahoo News

Sponsored

0 comments on “How the Latest Leaked Documents Are Different From Past Breaches

Leave a Reply

Your email address will not be published. Required fields are marked *