Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/26/2012
03:57 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Intel Chief: Insider Leaks A Top Priority

Strategies to prevent another Wikileaks will take years to perfect, but the cloud could save time and money, says director of national intelligence James Clapper.

>Slideshow: Next Generation Defense Technologies
Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
Building the architecture necessary to prevent another Wikileaks might take several years, director of national intelligence James Clapper said at an event Thursday in Washington, D.C.

The Wikileaks scandal, in which 260,000 diplomatic cables, many of them sensitive, were burned onto CD-RWs and later published online, has accelerated work toward ensuring that information sharing is secure, Clapper said in a speech on information sharing at the Center for Strategic and International Studies. However, there is no silver bullet to preventing insider threats.

"Inherently, we've always had a responsibility for protecting against insider threats," Clapper said in a speech on information sharing at the Center for Strategic and International Studies. "Wikileaks has heightened our sensitivity. In the IT context, the insider threat is quite profound, and that's why everybody is more sensitized to being alert."

The intelligence community is taking a multi-pronged approach to addressing the insider threat problem, Clapper said. Among other things, the community is developing a "national insider threat policy," is investing heavily in more pervasive auditing and monitoring capabilities, is improving identity management, and is tagging data as a means of access control. In addition, any of the policies and procedures around removable media have already been overhauled, and security clearance procedures are continuing to improve, he said.

[ How one thieving employee embarrassed a conglomerate: Citigroup Case Spotlights Insider Threat Dangers. ]

More broadly, Clapper said, the insider threat efforts are just one piece of the intelligence community's information sharing efforts that aim to get analysts and others who need the information "the right data, any time, any place, usable by any authorized recipient, prevented only law – not technology – and protected by a comprehensive regimen of accountability." That, he said, represents "nirvana" and is "not an easy task."

The ever-increasing imperative for secure information sharing, when coupled with increased budget pressure, has also created another consequence, Clapper said. For the first time ever, he said, the intelligence community is working together on "an integrated IT enterprise across the major intelligence agencies." Although it is something that agencies have been discussing for some time, he said, recent budget pressures have helped push the idea toward reality.

Cloud computing likely will play a significant role in the evolution of an integrated IT infrastructure within the intelligence community. The cloud has a "huge potential for achieving savings and promoting integration," he said.

Heightened concern that users could inadvertently expose or leak--or purposely steal--an organization's sensitive data has spurred debate over the proper technology and training to protect the crown jewels. An Insider Threat Reality Check, a special retrospective of recent news coverage, takes a look at how organizations are handling the threat--and what users are really up to. (Free registration required.)

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:38:22 AM
re: U.S. Intel Chief: Insider Leaks A Top Priority
On the psychology of the insider threat:
http://www.symantec.com/about/...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Exploiting Google Cloud Platform With Ease
Dark Reading Staff 8/6/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16168
PUBLISHED: 2020-08-07
Temi firmware 20190419.165201 does not properly verify that the source of data or communication is valid, aka an Origin Validation Error.
CVE-2020-8025
PUBLISHED: 2020-08-07
A Incorrect Execution-Assigned Permissions vulnerability in the permissions package of SUSE Linux Enterprise Server 12-SP4, SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Tumbleweed sets the permissions for some of the directories of the p...
CVE-2020-8026
PUBLISHED: 2020-08-07
A Incorrect Default Permissions vulnerability in the packaging of inn in openSUSE Leap 15.2, openSUSE Tumbleweed, openSUSE Leap 15.1 allows local attackers with control of the new user to escalate their privileges to root. This issue affects: openSUSE Leap 15.2 inn version 2.6.2-lp152.1.26 and prior...
CVE-2020-16219
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.
CVE-2020-16221
PUBLISHED: 2020-08-07
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.