The Growing Threat of the “Trusted Insider”
In the realm of national security and law enforcement, the most dangerous vulnerability isn’t always a sophisticated foreign hacker; often, it is the “trusted insider.” When individuals with high-level security clearances abuse their access for personal favors, the consequences can escalate from simple data breaches to real-world violence.
A stark example of this is seen in the case of Shivasuria Maniam Kesaval, a Traffic Police investigation officer who accessed Ministry of Home Affairs (MHA) computer systems without authorization. By uncovering the personal particulars of a woman who had reported a friend, Brayden Ong Ying Shan, for driving without a license, Kesaval turned a government tool into a weapon for personal vendettas.

This incident, which led to convictions under the Official Secrets Act (OSA) and the Computer Misuse Act, highlights a systemic risk: the gap between having technical access to data and having the legal or ethical authority to use it.
Shifting Toward Zero Trust Governance
To combat insider threats, government agencies are moving away from traditional perimeter security toward a “Zero Trust” architecture. In older systems, once an officer was logged into the network, they were often trusted to navigate various databases. Zero Trust changes the mantra to “never trust, always verify.”
Future trends suggest a move toward Just-In-Time (JIT) Access. Instead of having permanent access to a database, an officer would need to request access for a specific case number, with the request being automatically vetted against an active assignment. If there is no linked case, the system denies the search.
This would prevent scenarios where officers perform unauthorized searches on friends or acquaintances, as every query would require a documented, legitimate justification before the data is revealed.
AI: The Latest Watchdog for Data Access
While human supervisors are essential, they cannot monitor every single keystroke of thousands of employees. This is where AI-driven behavioral analytics are becoming critical.
Detecting Behavioral Anomalies
Modern security systems are beginning to implement AI that flags “anomalous behavior.” For instance, if an officer who typically searches for traffic violations suddenly begins searching for personal identity cards or mobile phone numbers unrelated to their assigned beat, the system can trigger an immediate alert to the head of investigations.
In the case of Kesaval, whose searches involved queries related to a friend’s name and car plate numbers, an AI-driven monitoring system could have flagged the pattern of searches as “out of character” for his specific role, potentially stopping the leak before the information reached the third party.
Protecting the Whistleblower in a Digital Age
The most harrowing aspect of the Kesaval and Ong case was the use of leaked data to produce death threats against a whistleblower. This underscores a critical need for enhanced technical protections for those who report crimes.
Future trends in reporting systems are leaning toward cryptographic anonymity. By using hashing and encryption, the identity of a reporter can be shielded from the very officers investigating the case, with the identity only being revealable by a high-level judicial authority or an independent oversight body.
When the identity of a whistleblower is hidden from the operational level of law enforcement, the risk of “insider leaks” leading to criminal intimidation is significantly reduced.
For more on how digital laws are evolving, you can explore our guides on Data Privacy Laws and Government Accountability Frameworks.
Frequently Asked Questions
What is the Official Secrets Act (OSA)?
The OSA is legislation designed to protect state secrets and prevent the unauthorized disclosure of official information that could prejudice the security or interests of the state.
How does the Computer Misuse Act differ from the OSA?
While the OSA focuses on the secrecy of the information, the Computer Misuse Act focuses on the unauthorized access to the computer system itself.
Can an officer be fired for unauthorized searches even if no information is leaked?
Yes. In most professional law enforcement agencies, the mere act of accessing data without a legitimate operational reason is a breach of conduct and can lead to suspension or dismissal.
Join the Conversation
Do you think AI monitoring is the best way to prevent the abuse of power, or does it create too much surveillance for the officers themselves? Let us know your thoughts in the comments below or subscribe to our newsletter for more deep dives into digital ethics.
