Risk
3/21/2011
01:17 PM
50%
50%

Government Eyeing Security Technology To Prevent Another Wikileaks

The Intelligence Community is trying to find a "sweet spot" between sharing intelligence information while preventing unauthorized access to that data by people who might misuse it, an official told Congress.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. intelligence agencies are eyeing the use of new security technology to help prevent another insider data breach like the one that caused the Wikileaks international scandal last year.

Testifying before the Senate Homeland Security and Governmental Affairs Committee earlier this month, Corin Stone, the Intelligence Community's (IC) information sharing executive, said that striking a balance between sharing intelligence information while still protecting data against insider threats is a persistent problem within the community, and one that it will use technology to solve.

The Intelligence Community is a coalition of 17 U.S. intelligence agencies and departments -- including the Central Intelligence Agency, the Federal Bureau of Investigations, the Office of National Intelligence, and the Defense Intelligence Agency -- that perform intelligence operations.

As information sharing executive, Stone is responsible for disseminating intelligence information within the community, a result of a reassigning of duties by the Office of the Director of National Intelligence last October. Previously, the IC CIO was responsible for that activity.

Stone said the community is trying to find a "sweet spot" between allowing its members to share intelligence information while preventing unauthorized access to that data by people who might misuse it.

She described the process of doing so as one in which both factors must be considered equally. "In other words, as we increase information sharing, we must also increase the protections afforded to that information," Stone said.

To do this, the community is in the process of implementing insider threat detection capability designed for it by the National Counterintelligence Executive, of which "technology refresh is a vital part," she said.

Stone outlined a two-pronged technology approach that will be implemented over the course of the 2011 and 2012 fiscal years that includes enhancements to logical and physical security controls and information-sharing capability that prioritizes mission needs of various organizations in the community.

Technologies the community plans to deploy include identity and access management; data protection and discoverability; and a reliable audit process, she said. The IC also is working on end-to-end data management technology to ensure that intelligence is appropriately secured throughout its entire lifecycle, she said.

New network authentication technologies also will be deployed to "authoritatively identify who is accessing classified information," Stone said.

The IC CIO is working on this task and aims to assign security certificates to eligible IC personnel in the first quarter of the 2012 fiscal year, she said. The community also is working on better user authentication at the application level, she added.

Stone's concerns are part of a broader move by federal agencies handling intelligence and other classified information to prevent unauthorized access or misuse of it. Last year was a tipping point in the government's thorny relationship with the whistle-blowing Web site Wikileaks, and the feds want to prevent future breaches from occurring.

Last July, Wikileaks published thousands of classified Department of Defense (DoD) documents related to the war in Afghanistan, then followed that up by releasing online 400,000 classified Iraq logs in October.

Then the release of thousands of classified U.S. embassy cables in late November spurred an incident that became known as Cablegate, which caused many to seriously question security at the DoD. Army Private First Class Bradley Manning was arrested last June and is suspected of leaking the information after removing it from the DoD's classified SIPRNet network.

Other top federal officials also have expressed the same concern about avoiding another major scandal. Testifying at the same hearing, new DoD CIO Teri Takai said the agency also is currently deploying new security technology to SIPRNet, to prevent future insider breaches.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0656
Published: 2015-03-03
Cross-site scripting (XSS) vulnerability in the login page in Cisco Network Analysis Module (NAM) allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Bug ID CSCum81269.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.