Risk
3/21/2011
01:17 PM
50%
50%

Government Eyeing Security Technology To Prevent Another Wikileaks

The Intelligence Community is trying to find a "sweet spot" between sharing intelligence information while preventing unauthorized access to that data by people who might misuse it, an official told Congress.

Inside DHS' Classified Cyber-Coordination Headquarters
(click image for larger view)
Slideshow: Inside DHS' Classified Cyber-Coordination Headquarters
U.S. intelligence agencies are eyeing the use of new security technology to help prevent another insider data breach like the one that caused the Wikileaks international scandal last year.

Testifying before the Senate Homeland Security and Governmental Affairs Committee earlier this month, Corin Stone, the Intelligence Community's (IC) information sharing executive, said that striking a balance between sharing intelligence information while still protecting data against insider threats is a persistent problem within the community, and one that it will use technology to solve.

The Intelligence Community is a coalition of 17 U.S. intelligence agencies and departments -- including the Central Intelligence Agency, the Federal Bureau of Investigations, the Office of National Intelligence, and the Defense Intelligence Agency -- that perform intelligence operations.

As information sharing executive, Stone is responsible for disseminating intelligence information within the community, a result of a reassigning of duties by the Office of the Director of National Intelligence last October. Previously, the IC CIO was responsible for that activity.

Stone said the community is trying to find a "sweet spot" between allowing its members to share intelligence information while preventing unauthorized access to that data by people who might misuse it.

She described the process of doing so as one in which both factors must be considered equally. "In other words, as we increase information sharing, we must also increase the protections afforded to that information," Stone said.

To do this, the community is in the process of implementing insider threat detection capability designed for it by the National Counterintelligence Executive, of which "technology refresh is a vital part," she said.

Stone outlined a two-pronged technology approach that will be implemented over the course of the 2011 and 2012 fiscal years that includes enhancements to logical and physical security controls and information-sharing capability that prioritizes mission needs of various organizations in the community.

Technologies the community plans to deploy include identity and access management; data protection and discoverability; and a reliable audit process, she said. The IC also is working on end-to-end data management technology to ensure that intelligence is appropriately secured throughout its entire lifecycle, she said.

New network authentication technologies also will be deployed to "authoritatively identify who is accessing classified information," Stone said.

The IC CIO is working on this task and aims to assign security certificates to eligible IC personnel in the first quarter of the 2012 fiscal year, she said. The community also is working on better user authentication at the application level, she added.

Stone's concerns are part of a broader move by federal agencies handling intelligence and other classified information to prevent unauthorized access or misuse of it. Last year was a tipping point in the government's thorny relationship with the whistle-blowing Web site Wikileaks, and the feds want to prevent future breaches from occurring.

Last July, Wikileaks published thousands of classified Department of Defense (DoD) documents related to the war in Afghanistan, then followed that up by releasing online 400,000 classified Iraq logs in October.

Then the release of thousands of classified U.S. embassy cables in late November spurred an incident that became known as Cablegate, which caused many to seriously question security at the DoD. Army Private First Class Bradley Manning was arrested last June and is suspected of leaking the information after removing it from the DoD's classified SIPRNet network.

Other top federal officials also have expressed the same concern about avoiding another major scandal. Testifying at the same hearing, new DoD CIO Teri Takai said the agency also is currently deploying new security technology to SIPRNet, to prevent future insider breaches.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Janice, I think I've got a message from the code father!
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.