What’s in Sessions’ toolkit for hunting anti-Trump leakers?

When the National Basketball Association wanted to stop a cloudburst of internal memo from being leaked to the media, it turned to classic spycraft.

League officials conducted a stinging operation in 2010, in which they changed a few numbers or words in the copies of the memos that were going out to different squads.

When one of those memorandas was leaked to the press and reported, the NBA instantly spotted the difference and got their man.

In this case, it was Detroit Pistons official Joe Dumars, who was fined $500,000 for leaking information to an online athletics reporter.

“That source may or may not be a leaker. The phase is that this approach narrows the scope of potential suspects.”

– Steven Aftergood, Project on Government Secrecy

The technique the NBA utilized is called a barium meal test after the drink taken to attain the gastrointestinal system visible during a CAT scan.

That test is one of several alternatives in the governments toolkit for hunting down the leakers in the West Wing, the intelligence community, or wherever they might be.

As far as the Trump leakers are concerned, merely one has been publicly comprehended and charged, largely due to sloppy techniques on the part of the alleged leaker. But according to experts, technology also played a key role.

Reality Winner, the former National Security Agency contractor who leaked a classified document on Russian interference in the 2016 election, was caught when the document was posted online.

The hi-res color image depicted a crease, suggesting it had been printed and hand-carried out of a secure space. The document she printed out was also branded with a digital watermark.

In the case of the intelligence community, a watermark is a unique string of digital code often inserted into each copy of official documents, so that if and when its shared without authorization, its possible to identify its original source.

That source may or may not be a leaker, told Steven Aftergood of the Project on Government Secrecy at the Federation of American Scientists, the point is that this approach constricts the scope of potential suspects.

In Winners case, the digital watermark on her document was tied to a specific printer a Xerox Docucolor with model number 54, serial number 2953521 8.

She was one of a handful of employees with access to that printer, and after a NSA audit detected she was the only one who communicated with the website, she was taken into custody.

That was easy, told cybersecurity adviser Morgan Wright, mostly because Winner apparently failed to cover her digital ways.

Wright said there are a variety of other technological options available to investigators.

They include: electronic intercept of all types of communications, software that can be secretly loaded into a device like a mobile phone to watch activity in real period, behavioral analytics that look for unusual activity such as downloading files onto a USB removable drive, and automated access logs that may is determined who accessed classified information within a particular time period.

The problem with some of the software was the number of false positives – red herring, told Wright. While it’s gets better, there is no holy grail tech that is foolproof…yet.

Technological approaches can sometimes improve the odds, but can’t guarantee that an investigative conclusion will be reached, agreed Aftergood.

Thus, the Trump Administration is said to be shopping for new technologies to plug the leaks.

It all get more complicated when the leakers know the tricks and how to cover their tracks.

The case of former four-star Gen. James Cartwright, who was called President Obamas favorite general until his fall from grace, represents the following steps researchers often have to go through to close a complicated leak investigation.

According to Deputy Attorney General Rod Rosenstein, who in 2012 supervised the Cartwright investigation, the evidence showed that the general disclosed classified information without authorization to two reporters.

In get Cartwright to plead guilty to lying to the FBI about it all, tens of thousands of documents were collected through subpoenas, search warrants, and records requests, and scores of government employees were interviewed.

Once researchers constricted down the list of possible suspects to Cartwright, it was probably just a matter of obtaining a warrant to go through personal emails, said Wright, since it was unlikely he would have use his official email to send the information to the reporters.

Cartwright appears to have been caught through an FBI interview that was provably false through emails to a reporter that were obtained in the investigation, Wright told Fox News, Nothing too fancy – just good leg work.

A big problem facing President Trump and Attorney General Jeff Sessions is that much of what is leaked does not rise to the level of criminality, stimulating it harder if not legally impossible to obtain a warrant to do the necessary scouring of personal emails or other evidence protected by the law.

That might explain why Winner is the only one publicly charged with international crimes thus far, though Attorney General Jeff Sessions said that four people have been charged with unauthorized disclosures.

I think the most important point reason is that most leaks are not crimes, said Aftergood.

A leak potentially becomes a crime under the Espionage Act statutes whenever national defense or almost all other classified information is disclosed to an unauthorized person, as in Cartwrights case.

But unauthorized disclosure of private conversations or White House intrigue would not qualify as a crime in most cases, Aftergood told Fox News. It could be a firing offense, but not a basis for prosecution.

As for the recipients of the leaks, they, too, can become the subject of the investigation, according to Wright, to try to identify his or her typical sources and known contacts. Telephone or email or other records may be scrutinized.

The Obama administration began a crackdown on leakers under the Espionage Act that the Trump administration appears to be building off, and that has journalists up in arms.

The Espionage Act is a 100 -year-old law originally used to go after spies, told Alexandra Ellerbeck of the Committee to Protect Journalists, but its use over the past eight years against journalists’ sources has the potential to chill the flow of information and reporting about serious concerns in the public interest.

Sessions has said he is reviewing standards put in place to protect reporters amid a firestorm of criticism by the media against the Obama administration for its treatment of journalists.

While imperfect, these standards were a welcome response to criticism of the Obama administration from journalists and transparency proponents. Subpoenas immediately to reporters or to third party technology companies hit at the fundamental need of reporters to protect their sources, which is crucial to their ability to keep the public informed, said Ellerbeck.

Make sure to visit: CapGeneration.com