How Pentagon leak suspect’s violent words escaped notice

|
Justice Department/AP
Jack Teixeira's room at his father's home in North Dighton, Massachusetts. Prosecutors said the Massachusetts Air National guardsman accused of leaking classified military documents kept weapons and said on social media that he would like to kill a "ton of people."
  • Quick Read
  • Deep Read ( 5 Min. )

Prosecutors say Air National Guard member Jack Teixeira is behind the largest leak of U.S. intelligence in decades. He also allegedly made racist threats in high school, and recently said online that he favored “culling the weak minded.”

How did someone with that kind of profile have access to so much sensitive data?

Why We Wrote This

There are 2.8 million people with U.S. security clearances. Some of them exhibit online behavior that should disqualify them from access to secrets – and intelligence agencies are studying better ways of identifying those people.

One problem is the sheer amount of classified information, which necessitates a larger number of people with security clearances – around 2.8 million.

And all those secrets are distributed widely among the many different parts of the U.S. intelligence community. That’s a practice begun after 9/11, when lack of such sharing was identified as a partial reason the government failed to anticipate the attacks.

As an IT employee, Mr. Teixeira had a clearance in case he saw secrets while working. But he had no “need to know” qualifying him to search and print out classified archives.

One conclusion: The U.S. needs a better way of enforcing the need-to-know standard for wide access.

“Any system that doesn’t detect some of these red flags is, by definition, flawed,” says Michael Allen, who worked in President George W. Bush’s National Security Council.

In March 2018, a high school junior in North Dighton, Massachusetts, was suspended after a classmate allegedly heard him discussing guns, Molotov cocktails, and racist threats. 

To those who knew him online, this wouldn’t have been a surprise. The student – Jack Teixeira – was a gun-loving, edgy teenage gamer. The servers he frequented in the years to come included members who were obsessed with the military and posted Nazi memes.

But that didn’t prevent Mr. Teixeira, the next year, from getting an IT job with the Massachusetts Air National Guard. Neither, in 2021, did it stop him from getting a Top Secret/Sensitive Compartmented Information clearance – the highest level the government awards.

Why We Wrote This

There are 2.8 million people with U.S. security clearances. Some of them exhibit online behavior that should disqualify them from access to secrets – and intelligence agencies are studying better ways of identifying those people.

Now Mr. Teixeira stands accused of abusing his position, and then some. Last month, he was arrested and charged with being the perpetrator of the largest leak of U.S. intelligence in a decade. Since last October, he has allegedly posted hundreds of highly classified national security documents on Discord, a popular gaming site.

The Discord leaks have presented a list of questions for the American intelligence community – about how someone in such a niche outfit could have access to some of the nation’s most furtive secrets and why the leak took so long to spot. But as more details of Mr. Teixeira’s past come out, former intelligence officials are also starting to wonder how he got a clearance at all – and how he even made it into the military. 

“It seems like they didn’t do a very good job vetting him at the very outset, to say nothing of when they were considering his security clearance,” says Evelyn Farkas, former deputy assistant secretary of defense for Russia, Ukraine, and Eurasia. “It’s a total failure.”

Jon Elswick/AP
Image of Justice Department's motion for continued pretrial detention of Jack Teixeira.

It’s a failure, former officials argue, that may say less about Mr. Teixeira than the system he worked for. The American intelligence community is a sprawling bureaucratic neighborhood of agencies and levels of classification. In 2017, the number of people with active Top Secret security clearances was just under 1.2 million – including government employees and contractors, and officials at all levels of seniority. Even as the Pentagon investigates this leak and tries to contain its damage, there are simply too many people with top clearances across too many levels of government to audit them all. 

Gaming culture

Shortly after Russia invaded Ukraine last February, Mr. Teixeira reportedly began posting classified information about the war to an online Discord chat room of 600 people. He would continue doing so for months, but in October began concentrating on another online group, a community of 50 mostly young gamers on a Discord server called Thug Shaker Central.

There, reportedly as the group’s leader, Mr. Teixeira posted transcripts and then photos of highly classified documents detailing U.S. intelligence secrets from the war in Ukraine to arms supply in South Korea. 

Besides boasting classified documents in its chat, Thug Shaker Central was a portrait of online gaming’s often lewd, offensive culture. According to a Department of Justice filing last week, Mr. Teixeira “had regular discussions about violence and murder on the social media platform.” Last November, according to a Department of Justice filing, he stated that “if he had his way, he would ‘kill a [expletive] ton of people’ because it would be ‘culling the weak minded.’”

When the FBI raided Mr. Teixeira’s family home in Massachusetts on April 13, according to the same filing, they found a gun safe containing bolt-action rifles, an AK-style weapon, and a gas mask 2 feet from his bed.

This is not the profile of someone the United States wants with a top-secret clearance.

“It’s exposing something that’s quite systemic,” says Amy Jeffress, a former Department of Justice prosecutor and national security lawyer. “We keep seeing these cases where individuals who really should not have access to our most highly classified information do have access to it.”

Part of the problem, Ms. Jeffress argues, is that the government classifies too much information – it’s just seen as a safer option. But a high volume of classified documents demands a large number of government employees with security clearances: around 2.8 million in total as of 2017.

Alex Brandon/AP
Director of National Intelligence Avril Haines, center, departs after a closed-door briefing about the leak of highly classified military documents, on Capitol Hill, April 19, 2023, in Washington.

Another issue is that top secret information is shared widely among different parts of the intelligence community, a choice that dates back 20 years, when a lack of intelligence sharing was faulted, in part, for the government’s failure to anticipate the 9/11 terrorist attacks. 

The upside is that sharing intelligence helps avoid catastrophe. The downside is that more widely shared intelligence is harder to keep secret. 

“Every intelligence crisis has an aphorism or a saying that comes out of it. After 9/11, it was ‘information sharing, connect the dots,’” says Michael Allen, who worked in President George W. Bush’s National Security Council. “But now we’ve clearly overshared the information.” 

Secret PowerPoints

The documents Mr. Teixeira posted on Discord were J2 briefing slides, the highest-level intelligence product America’s intelligence community creates every day, says former Defense Intelligence Agency and National Security Council official Javed Ali. 

Those slides – essentially a daily PowerPoint presentation for the nation’s top policymakers – are posted to an online bulletin board of sorts known as the Joint Worldwide Intelligence Communication System, or JWICS (pronounced “jay-wiks”). For Mr. Teixeira, it was as simple as accessing JWICS, printing out the slides, and taking them home. 

Members of the intelligence community work on keyboards that track their every keystroke and printers that log their every print. But those tools better suit an audit than a real-time alarm, says Mr. Ali. Thousands of people access JWICS each day, he says. 

Mr. Teixeira was an IT employee, which made his clearance kind of like the head electrician at the White House, says Dr. Farkas, now director of the McCain Institute, a Washington-based think tank. He needed a clearance in case he saw something secret at work. But he had no “need to know’’ such sensitive information. 

The intelligence community needs a better way to enforce that need-to-know standard, she says. The Department of Defense is working on a yearslong project to make its computer networks “zero trust,” which would mean users need to continuously authenticate their credentials before accessing information at different levels. But that structure likely wouldn’t have prevented all of Mr. Teixeira’s leaks, and is still years away. 

“How do you begin to regulate a system that’s compartmented like crazy with all these different levels of classification?” says Mr. Allen. 

Mr. Ali recommends added scrutiny of social media accounts and airport-level security at secure sites, maybe even random bag checks. But even those protocols, he concedes, aren’t perfect. Even members of the intelligence community have constitutional rights to privacy. 

“These are things that are hard to do,” says Mr. Allen. “But ... any system that doesn’t detect some of these red flags is, by definition, flawed.”

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to How Pentagon leak suspect’s violent words escaped notice
Read this article in
https://www.csmonitor.com/World/Americas/2023/0503/How-Pentagon-leak-suspect-s-violent-words-escaped-notice
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe