Risk
3/21/2011
01:17 PM
50%
50%

Government Eyeing Security Technology To Prevent Another Wikileaks

The Intelligence Community is trying to find a "sweet spot" between sharing intelligence information while preventing unauthorized access to that data by people who might misuse it, an official told Congress.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. intelligence agencies are eyeing the use of new security technology to help prevent another insider data breach like the one that caused the Wikileaks international scandal last year.

Testifying before the Senate Homeland Security and Governmental Affairs Committee earlier this month, Corin Stone, the Intelligence Community's (IC) information sharing executive, said that striking a balance between sharing intelligence information while still protecting data against insider threats is a persistent problem within the community, and one that it will use technology to solve.

The Intelligence Community is a coalition of 17 U.S. intelligence agencies and departments -- including the Central Intelligence Agency, the Federal Bureau of Investigations, the Office of National Intelligence, and the Defense Intelligence Agency -- that perform intelligence operations.

As information sharing executive, Stone is responsible for disseminating intelligence information within the community, a result of a reassigning of duties by the Office of the Director of National Intelligence last October. Previously, the IC CIO was responsible for that activity.

Stone said the community is trying to find a "sweet spot" between allowing its members to share intelligence information while preventing unauthorized access to that data by people who might misuse it.

She described the process of doing so as one in which both factors must be considered equally. "In other words, as we increase information sharing, we must also increase the protections afforded to that information," Stone said.

To do this, the community is in the process of implementing insider threat detection capability designed for it by the National Counterintelligence Executive, of which "technology refresh is a vital part," she said.

Stone outlined a two-pronged technology approach that will be implemented over the course of the 2011 and 2012 fiscal years that includes enhancements to logical and physical security controls and information-sharing capability that prioritizes mission needs of various organizations in the community.

Technologies the community plans to deploy include identity and access management; data protection and discoverability; and a reliable audit process, she said. The IC also is working on end-to-end data management technology to ensure that intelligence is appropriately secured throughout its entire lifecycle, she said.

New network authentication technologies also will be deployed to "authoritatively identify who is accessing classified information," Stone said.

The IC CIO is working on this task and aims to assign security certificates to eligible IC personnel in the first quarter of the 2012 fiscal year, she said. The community also is working on better user authentication at the application level, she added.

Stone's concerns are part of a broader move by federal agencies handling intelligence and other classified information to prevent unauthorized access or misuse of it. Last year was a tipping point in the government's thorny relationship with the whistle-blowing Web site Wikileaks, and the feds want to prevent future breaches from occurring.

Last July, Wikileaks published thousands of classified Department of Defense (DoD) documents related to the war in Afghanistan, then followed that up by releasing online 400,000 classified Iraq logs in October.

Then the release of thousands of classified U.S. embassy cables in late November spurred an incident that became known as Cablegate, which caused many to seriously question security at the DoD. Army Private First Class Bradley Manning was arrested last June and is suspected of leaking the information after removing it from the DoD's classified SIPRNet network.

Other top federal officials also have expressed the same concern about avoiding another major scandal. Testifying at the same hearing, new DoD CIO Teri Takai said the agency also is currently deploying new security technology to SIPRNet, to prevent future insider breaches.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8370
Published: 2015-01-29
VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

CVE-2015-0236
Published: 2015-01-29
libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

CVE-2015-1043
Published: 2015-01-29
The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

CVE-2015-1044
Published: 2015-01-29
vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

CVE-2015-1422
Published: 2015-01-29
Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.