Risk
1/26/2012
03:57 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Intel Chief: Insider Leaks A Top Priority

Strategies to prevent another Wikileaks will take years to perfect, but the cloud could save time and money, says director of national intelligence James Clapper.

>Slideshow: Next Generation Defense Technologies
Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
Building the architecture necessary to prevent another Wikileaks might take several years, director of national intelligence James Clapper said at an event Thursday in Washington, D.C.

The Wikileaks scandal, in which 260,000 diplomatic cables, many of them sensitive, were burned onto CD-RWs and later published online, has accelerated work toward ensuring that information sharing is secure, Clapper said in a speech on information sharing at the Center for Strategic and International Studies. However, there is no silver bullet to preventing insider threats.

"Inherently, we've always had a responsibility for protecting against insider threats," Clapper said in a speech on information sharing at the Center for Strategic and International Studies. "Wikileaks has heightened our sensitivity. In the IT context, the insider threat is quite profound, and that's why everybody is more sensitized to being alert."

The intelligence community is taking a multi-pronged approach to addressing the insider threat problem, Clapper said. Among other things, the community is developing a "national insider threat policy," is investing heavily in more pervasive auditing and monitoring capabilities, is improving identity management, and is tagging data as a means of access control. In addition, any of the policies and procedures around removable media have already been overhauled, and security clearance procedures are continuing to improve, he said.

[ How one thieving employee embarrassed a conglomerate: Citigroup Case Spotlights Insider Threat Dangers. ]

More broadly, Clapper said, the insider threat efforts are just one piece of the intelligence community's information sharing efforts that aim to get analysts and others who need the information "the right data, any time, any place, usable by any authorized recipient, prevented only law – not technology – and protected by a comprehensive regimen of accountability." That, he said, represents "nirvana" and is "not an easy task."

The ever-increasing imperative for secure information sharing, when coupled with increased budget pressure, has also created another consequence, Clapper said. For the first time ever, he said, the intelligence community is working together on "an integrated IT enterprise across the major intelligence agencies." Although it is something that agencies have been discussing for some time, he said, recent budget pressures have helped push the idea toward reality.

Cloud computing likely will play a significant role in the evolution of an integrated IT infrastructure within the intelligence community. The cloud has a "huge potential for achieving savings and promoting integration," he said.

Heightened concern that users could inadvertently expose or leak--or purposely steal--an organization's sensitive data has spurred debate over the proper technology and training to protect the crown jewels. An Insider Threat Reality Check, a special retrospective of recent news coverage, takes a look at how organizations are handling the threat--and what users are really up to. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:38:22 AM
re: U.S. Intel Chief: Insider Leaks A Top Priority
On the psychology of the insider threat:
http://www.symantec.com/about/...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.