Anatomy of a Breach

Anatomy of a Breach: WikiLeaks and Chelsea Manning — The Largest Classified Leak in Military History

> series: anatomy_of_a_breach —— part: 017 —— subject: chelsea_manning —— documents: 750,000 —— classification: secret<span class="cursor-blink">_</span>_

Hedgehog Security 31 May 2010 14 min read

One analyst. One writable CD. 750,000 classified documents.

In early 2010, Private First Class Chelsea Manning (then known as Bradley Manning), a 22-year-old US Army intelligence analyst stationed at Forward Operating Base Hammer near Baghdad, began downloading classified documents from the Secret Internet Protocol Router Network (SIPRNet) — the US military's classified network. Manning copied the files to a rewritable CD labelled 'Lady Gaga' and uploaded them to WikiLeaks, the transparency organisation founded by Julian Assange. The total volume exceeded 750,000 classified and sensitive documents.

The leaks were released in phases throughout 2010: the Collateral Murder video in April (classified footage of a US Apache helicopter attack in Baghdad), the Afghan War Diary in July (75,000+ classified reports), the Iraq War Logs in October (391,832 reports), and Cablegate in November (251,287 diplomatic cables). Together, they constituted the largest leak of classified information in military history — and the most consequential insider threat incident ever documented.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

The insider controls that did not exist.

Manning had a Top Secret/SCI security clearance and routine access to SIPRNet as part of her intelligence analyst role. She downloaded the documents over a period of weeks, copying them to rewritable CDs in a SCIF (Sensitive Compartmented Information Facility) where personal music CDs were permitted. She lip-synced to Lady Gaga songs while the data transferred — an act that would have appeared entirely normal to colleagues.

No Technical Controls on Data Export
Manning was able to copy hundreds of thousands of classified documents to removable media without triggering any technical alert. There was no data loss prevention system on SIPRNet monitoring for bulk downloads, no restriction on writable media in the SCIF, and no anomaly detection on database query patterns. The same failure we identified in the <a href="/blog/anatomy-of-a-breach-t-mobile-uk-insider">T-Mobile insider breach</a> — but with national security consequences.
Over-Broad Access
Manning, a junior analyst, had access to the same databases as senior intelligence officers. The principle of least privilege — granting users only the access their role requires — was not applied. Our <a href="/penetration-testing/infrastructure">internal penetration testing</a> assesses privilege separation and access controls to identify exactly this type of over-provisioning.
No Behavioural Monitoring
Manning's download patterns — accessing hundreds of thousands of documents across multiple databases, far beyond what her duties required — should have triggered behavioural alerts. No such monitoring existed. <a href="https://www.socinabox.co.uk">SOC in a Box</a> provides behavioural analytics that detect anomalous data access patterns — the capability that was absent on SIPRNet.
Security Culture vs. Security Technology
The US military's security culture was built on trust — the assumption that cleared personnel would not misuse their access. Manning demonstrated that trust without verification is not a security control. Technical enforcement of access policies, combined with continuous monitoring, is the only reliable defence against insider threats — as our <a href="/blog/sector-under-the-microscope-defence-supply-chain">defence supply chain analysis</a> discusses.

What the leak changed.

Manning was arrested on 27 May 2010 after a former hacker, Adrian Lamo, reported her to the US Army's Criminal Investigation Command. She was convicted in 2013 under the Espionage Act and sentenced to 35 years in military prison — later commuted by President Obama in 2017. The Manning case led to a fundamental overhaul of how the US Government controls access to classified information, including the deployment of user activity monitoring on classified networks and restrictions on removable media.

For organisations in the UK defence supply chain, the Manning case is a stark illustration of insider threat risk. Cyber Essentials Plus — mandatory for MoD contracts — addresses technical controls including access management and device security. Our penetration testing validates these controls. Data loss prevention through SOC in a Box provides the continuous monitoring that detects bulk data export. And UK Cyber Defence's incident response provides the forensic capability when an insider incident is suspected.


If the US military could not stop an insider, can you?

Our <a href="/penetration-testing/infrastructure">internal penetration testing</a> simulates insider threat scenarios. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects anomalous data access. <a href="/cyber-essentials">Cyber Essentials</a> enforces baseline access controls. The Manning case proved that trust alone is not a security strategy.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles