Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

DARPA Soliciting Bids On Insider Threat Prevention

Defense Department agency to develop system that can identify and stop people from removing information from its networks.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
The Defense Advanced Research Projects Agency (DARPA) has launched a new program aimed at quickly finding and stopping insiders from trying to steal information from Department of Defense (DoD) computer networks for use against the federal government.

To develop its Cyber Insider Threat program, or CINDER, DARPA is "soliciting novel approaches to insider threat detection that greatly increase the accuracy, rate, and speed of detection and that impede the ability of adversaries to operate within government and military interest networks," according to a presolicitation notice posted on FedBizOpps.gov.

In the notice, DARPA describes an insider threat as any within the DoD's communications or computer-network environment being performed "in support of an adversary mission or goal."

For CINDER, DARPA is taking an approach that already assumes systems and networks have been compromised. Starting from there, the agency will take a three-phased approach, it said.

In phase one, the agency will aim to understand adversary missions and their techniques to identify the threat. Phase two will work to develop a system using information from the first phase to create a system capable of identifying multiple insider threats at once. The third phase then will demonstrate the second-phase system in a real-world environment.

Multiple awards are possible under the procurement, and firms have until Aug. 25, 2011, to submit proposals.

The DoD's sensitivity to insider leaks has been heightened lately as a battle to keep classified information from making it onto the Wikileaks website intensified in recent months. Wikileaks acts as a whistleblower site and releases documents about current and controversial events that aren't otherwise available. In June, the DoD arrested a military intelligence analyst for allegedly leaking to Wikileaks the video of a 2007 U.S. helicopter attack on people assembled in a Baghdad square. The attack left two Reuters employees dead and two children wounded.

In fact, the date on the CINDER pre-solicitation notice is one month to the day of a major leak of classified documents from DoD computers. On July 25, Wikileaks released a batch of more than 75,000 files, called the Afghan War Diary 2004-2010, regarding the current conflict in Afghanistan. The files depict a war in which an alarming number of civilians have been killed and caused an outcry of criticism from the press and public about U.S. military failures in the region.

Wikileaks claims to have 15,000 more files to add to the Afghan War Diary that it has yet to release. The Pentagon has formally demanded the return of those files.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13116
PUBLISHED: 2019-10-16
The MuleSoft Mule runtime engine before 3.8 allows remote attackers to execute arbitrary code because of Java Deserialization, related to Apache Commons Collections.
CVE-2019-17664
PUBLISHED: 2019-10-16
NSA Ghidra through 9.0.4 uses a potentially untrusted search path. When executing Ghidra from a given path, the Java process working directory is set to this path. Then, when launching the Python interpreter via the "Ghidra Codebrowser > Window > Python" option, Ghidra will try to ex...
CVE-2019-17665
PUBLISHED: 2019-10-16
NSA Ghidra before 9.0.2 is vulnerable to DLL hijacking because it loads jansi.dll from the current working directory.
CVE-2019-17435
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in the GlobalProtect Agent for Windows 5.0.3 and earlier, and GlobalProtect Agent for Windows 4.1.12 and earlier, in which the auto-update feature can allow for modification of a GlobalProtect Agent MSI installer package on disk before installation.
CVE-2019-17436
PUBLISHED: 2019-10-16
A Local Privilege Escalation vulnerability exists in GlobalProtect Agent for Linux and Mac OS X version 5.0.4 and earlier and version 4.1.12 and earlier, that can allow non-root users to overwrite root files on the file system.