Risk
10/12/2010
12:37 PM
Connect Directly
RSS
E-Mail
50%
50%

DARPA Developing Tech To Stop Insider Threats

Defense agency seeking collaborators on technology to predict when soldiers or other government insiders pose a danger to themselves or others.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
The technology research arm of the Department of Defense (DoD) plans to develop technology to determine ahead of time when soldiers or other government insiders may become a threat to themselves or others.

The Defense Advanced Research Projects Agency (DARPA) is seeking ideas for its Anomaly Detection at Multiple Scales (ADAMS) program, which will produce technology that can sift through the behavioral signs that may lead to someone turning on his or her cohorts, and prevent the action before it happens, the agency said.

"Each time we see an incident like a soldier in good mental health becoming homicidal or suicidal or an innocent insider becoming malicious we wonder why we didn't see it coming," according to an announcement about an ADAMS industry day on Oct. 19. "When we look through the evidence after the fact, we often find a trail -- sometimes even an 'obvious' one."

The problem with putting all the pieces of evidence together is the process of analyzing the data, knowing how to spot the difference between normal and abnormal behaviors, and determining how they may lead to a threatening incident, the agency said.

With ADAMS, the agency aims to "create, adapt, and apply technology to the problem of anomaly characterization and detection in massive data sets," according to DARPA. Following the industry day, it will release a broad agency announcement on FedBizOpps.gov seeking proposals for the program.

DARPA hopes the military and the counterintelligence community can use the technology to catch potentially threatening behaviors "before or shortly after they turn," it said. The agency defines an insider threat as one coming from a person already trusted in a secure environment who has access to sensitive information, systems, and sources.

Indeed, security threats from insiders are a chief concern for the federal government, which has seen numerous cases of sensitive information being leaked by trusted employees.

The DoD's ongoing battle with the website Wikileaks, which publishes classified information provided by insiders, is a prime example. In July the U.S. Army formally brought charges against an intelligence analyst, Private First Class Bradley Manning, for leaking classified video footage from Iraq to the site.

Another concern among military officials is suicides by soldiers, which have been on the rise since the conflicts in Iraq and Afghanistan began. The Army in particular has undertaken efforts -- such as offering suicide counseling when previously psychological treatment was seen as a stigma -- to try to prevent more soldiers from taking their own lives.

At next week's ADAMS industry day, DARPA plans to introduce participants to the program and the agency's interest in applying automated and integrated modeling, correlation, exploitation, prediction, and resource management to the insider-threat problem.

The agency also hopes to identify organizations or individuals who may have valid ideas for ADAMS, and set them up with meetings with potential program managers for potential collaboration on the project.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio