Risk
10/12/2010
12:37 PM
Connect Directly
RSS
E-Mail
50%
50%

DARPA Developing Tech To Stop Insider Threats

Defense agency seeking collaborators on technology to predict when soldiers or other government insiders pose a danger to themselves or others.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
The technology research arm of the Department of Defense (DoD) plans to develop technology to determine ahead of time when soldiers or other government insiders may become a threat to themselves or others.

The Defense Advanced Research Projects Agency (DARPA) is seeking ideas for its Anomaly Detection at Multiple Scales (ADAMS) program, which will produce technology that can sift through the behavioral signs that may lead to someone turning on his or her cohorts, and prevent the action before it happens, the agency said.

"Each time we see an incident like a soldier in good mental health becoming homicidal or suicidal or an innocent insider becoming malicious we wonder why we didn't see it coming," according to an announcement about an ADAMS industry day on Oct. 19. "When we look through the evidence after the fact, we often find a trail -- sometimes even an 'obvious' one."

The problem with putting all the pieces of evidence together is the process of analyzing the data, knowing how to spot the difference between normal and abnormal behaviors, and determining how they may lead to a threatening incident, the agency said.

With ADAMS, the agency aims to "create, adapt, and apply technology to the problem of anomaly characterization and detection in massive data sets," according to DARPA. Following the industry day, it will release a broad agency announcement on FedBizOpps.gov seeking proposals for the program.

DARPA hopes the military and the counterintelligence community can use the technology to catch potentially threatening behaviors "before or shortly after they turn," it said. The agency defines an insider threat as one coming from a person already trusted in a secure environment who has access to sensitive information, systems, and sources.

Indeed, security threats from insiders are a chief concern for the federal government, which has seen numerous cases of sensitive information being leaked by trusted employees.

The DoD's ongoing battle with the website Wikileaks, which publishes classified information provided by insiders, is a prime example. In July the U.S. Army formally brought charges against an intelligence analyst, Private First Class Bradley Manning, for leaking classified video footage from Iraq to the site.

Another concern among military officials is suicides by soldiers, which have been on the rise since the conflicts in Iraq and Afghanistan began. The Army in particular has undertaken efforts -- such as offering suicide counseling when previously psychological treatment was seen as a stigma -- to try to prevent more soldiers from taking their own lives.

At next week's ADAMS industry day, DARPA plans to introduce participants to the program and the agency's interest in applying automated and integrated modeling, correlation, exploitation, prediction, and resource management to the insider-threat problem.

The agency also hopes to identify organizations or individuals who may have valid ideas for ADAMS, and set them up with meetings with potential program managers for potential collaboration on the project.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

CVE-2014-2356
Published: 2014-07-30
Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.

Best of the Web
Dark Reading Radio