Risk
9/2/2010
12:34 PM
Connect Directly
RSS
E-Mail
50%
50%

DARPA Soliciting Bids On Insider Threat Prevention

Defense Department agency to develop system that can identify and stop people from removing information from its networks.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
The Defense Advanced Research Projects Agency (DARPA) has launched a new program aimed at quickly finding and stopping insiders from trying to steal information from Department of Defense (DoD) computer networks for use against the federal government.

To develop its Cyber Insider Threat program, or CINDER, DARPA is "soliciting novel approaches to insider threat detection that greatly increase the accuracy, rate, and speed of detection and that impede the ability of adversaries to operate within government and military interest networks," according to a presolicitation notice posted on FedBizOpps.gov.

In the notice, DARPA describes an insider threat as any within the DoD's communications or computer-network environment being performed "in support of an adversary mission or goal."

For CINDER, DARPA is taking an approach that already assumes systems and networks have been compromised. Starting from there, the agency will take a three-phased approach, it said.

In phase one, the agency will aim to understand adversary missions and their techniques to identify the threat. Phase two will work to develop a system using information from the first phase to create a system capable of identifying multiple insider threats at once. The third phase then will demonstrate the second-phase system in a real-world environment.

Multiple awards are possible under the procurement, and firms have until Aug. 25, 2011, to submit proposals.

The DoD's sensitivity to insider leaks has been heightened lately as a battle to keep classified information from making it onto the Wikileaks website intensified in recent months. Wikileaks acts as a whistleblower site and releases documents about current and controversial events that aren't otherwise available. In June, the DoD arrested a military intelligence analyst for allegedly leaking to Wikileaks the video of a 2007 U.S. helicopter attack on people assembled in a Baghdad square. The attack left two Reuters employees dead and two children wounded.

In fact, the date on the CINDER pre-solicitation notice is one month to the day of a major leak of classified documents from DoD computers. On July 25, Wikileaks released a batch of more than 75,000 files, called the Afghan War Diary 2004-2010, regarding the current conflict in Afghanistan. The files depict a war in which an alarming number of civilians have been killed and caused an outcry of criticism from the press and public about U.S. military failures in the region.

Wikileaks claims to have 15,000 more files to add to the Afghan War Diary that it has yet to release. The Pentagon has formally demanded the return of those files.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2886
Published: 2014-09-18
GKSu 2.0.2, when sudo-mode is not enabled, uses " (double quote) characters in a gksu-run-helper argument, which allows attackers to execute arbitrary commands in certain situations involving an untrusted substring within this argument, as demonstrated by an untrusted filename encountered during ins...

CVE-2014-4352
Published: 2014-09-18
Address Book in Apple iOS before 8 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information by obtaining this UID.

CVE-2014-4353
Published: 2014-09-18
Race condition in iMessage in Apple iOS before 8 allows attackers to obtain sensitive information by leveraging the presence of an attachment after the deletion of its parent (1) iMessage or (2) MMS.

CVE-2014-4354
Published: 2014-09-18
Apple iOS before 8 enables Bluetooth during all upgrade actions, which makes it easier for remote attackers to bypass intended access restrictions via a Bluetooth session.

CVE-2014-4356
Published: 2014-09-18
Apple iOS before 8 does not follow the intended configuration setting for text-message preview on the lock screen, which allows physically proximate attackers to obtain sensitive information by reading this screen.

Best of the Web
Dark Reading Radio