recommended reading

How Did the White House Find Its Twitter Mole?

kropic1/Shutterstock.com

The sting that helped furious White House plumbers unmask the National Security Council official driving them crazy with snarky Tweets is a time-honored device often employed at high levels of government to identify leakers.

"It's an easy way to nail somebody who talks too much," laughed a former senior political adviser to a Republican president expert in such ploys. "You drop a harmless little nugget into a meeting where everyone is in on the scam except the suspected leaker. Then when the information pops up somewhere - bingo."

National Security Council staffer Jofi Joseph was fired last week after being exposed as the creative talent behind @natsecwonk, an anonymous Twitter account that routinely trashed such Obama heavy-hitters as counselor Valerie Jarrett ("vacuous cipher"), NSC chief Susan Rice and UN ambassador Samantha Power - not to mention former secretary of state Hillary Clinton and other ObamaWorld stalwarts.

Published reports say that top Obama advisers, enraged and embarrassed by the commentary, decided to leak innocuous material to Joseph to see if it turned up on the notorious snark-site. It's not clear the ploy produced the proverbial "smoking gun," but suddenly Joseph was fired. In a statement, he admitted to being the anonymous agent- provocateur and apologized to "everyone I insulted."

There's a famous corollary to this practice that helped undermine White House chief of staff Donald Regan. During Ronald Reagan's second term, some senior White House officials eager to grease the skids under Regan concocted snappy one-liners certain to make it into print from appreciative journalists. But there was a twist: the anonymous quotes often contained a favorite Regan phrase ("and the like"). When Nancy Reagan, never a Regan fan, saw some of the provocative quotes she immediately assumed Regan was the leaker. Nancy's rage was a prime factor in Regan being forced out of his job in 1987.

(Image via kropic1/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.