Risk
1/26/2012
03:57 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Intel Chief: Insider Leaks A Top Priority

Strategies to prevent another Wikileaks will take years to perfect, but the cloud could save time and money, says director of national intelligence James Clapper.

>Slideshow: Next Generation Defense Technologies
Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
Building the architecture necessary to prevent another Wikileaks might take several years, director of national intelligence James Clapper said at an event Thursday in Washington, D.C.

The Wikileaks scandal, in which 260,000 diplomatic cables, many of them sensitive, were burned onto CD-RWs and later published online, has accelerated work toward ensuring that information sharing is secure, Clapper said in a speech on information sharing at the Center for Strategic and International Studies. However, there is no silver bullet to preventing insider threats.

"Inherently, we've always had a responsibility for protecting against insider threats," Clapper said in a speech on information sharing at the Center for Strategic and International Studies. "Wikileaks has heightened our sensitivity. In the IT context, the insider threat is quite profound, and that's why everybody is more sensitized to being alert."

The intelligence community is taking a multi-pronged approach to addressing the insider threat problem, Clapper said. Among other things, the community is developing a "national insider threat policy," is investing heavily in more pervasive auditing and monitoring capabilities, is improving identity management, and is tagging data as a means of access control. In addition, any of the policies and procedures around removable media have already been overhauled, and security clearance procedures are continuing to improve, he said.

[ How one thieving employee embarrassed a conglomerate: Citigroup Case Spotlights Insider Threat Dangers. ]

More broadly, Clapper said, the insider threat efforts are just one piece of the intelligence community's information sharing efforts that aim to get analysts and others who need the information "the right data, any time, any place, usable by any authorized recipient, prevented only law – not technology – and protected by a comprehensive regimen of accountability." That, he said, represents "nirvana" and is "not an easy task."

The ever-increasing imperative for secure information sharing, when coupled with increased budget pressure, has also created another consequence, Clapper said. For the first time ever, he said, the intelligence community is working together on "an integrated IT enterprise across the major intelligence agencies." Although it is something that agencies have been discussing for some time, he said, recent budget pressures have helped push the idea toward reality.

Cloud computing likely will play a significant role in the evolution of an integrated IT infrastructure within the intelligence community. The cloud has a "huge potential for achieving savings and promoting integration," he said.

Heightened concern that users could inadvertently expose or leak--or purposely steal--an organization's sensitive data has spurred debate over the proper technology and training to protect the crown jewels. An Insider Threat Reality Check, a special retrospective of recent news coverage, takes a look at how organizations are handling the threat--and what users are really up to. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:38:22 AM
re: U.S. Intel Chief: Insider Leaks A Top Priority
On the psychology of the insider threat:
http://www.symantec.com/about/...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1544
Published: 2014-07-23
Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger cer...

CVE-2014-1547
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1548
Published: 2014-07-23
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.

CVE-2014-1549
Published: 2014-07-23
The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and applica...

CVE-2014-1550
Published: 2014-07-23
Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.