Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/26/2012
03:57 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

U.S. Intel Chief: Insider Leaks A Top Priority

Strategies to prevent another Wikileaks will take years to perfect, but the cloud could save time and money, says director of national intelligence James Clapper.

>Slideshow: Next Generation Defense Technologies
Slideshow: Next Generation Defense Technologies
(click for larger image and for full slideshow)
Building the architecture necessary to prevent another Wikileaks might take several years, director of national intelligence James Clapper said at an event Thursday in Washington, D.C.

The Wikileaks scandal, in which 260,000 diplomatic cables, many of them sensitive, were burned onto CD-RWs and later published online, has accelerated work toward ensuring that information sharing is secure, Clapper said in a speech on information sharing at the Center for Strategic and International Studies. However, there is no silver bullet to preventing insider threats.

"Inherently, we've always had a responsibility for protecting against insider threats," Clapper said in a speech on information sharing at the Center for Strategic and International Studies. "Wikileaks has heightened our sensitivity. In the IT context, the insider threat is quite profound, and that's why everybody is more sensitized to being alert."

The intelligence community is taking a multi-pronged approach to addressing the insider threat problem, Clapper said. Among other things, the community is developing a "national insider threat policy," is investing heavily in more pervasive auditing and monitoring capabilities, is improving identity management, and is tagging data as a means of access control. In addition, any of the policies and procedures around removable media have already been overhauled, and security clearance procedures are continuing to improve, he said.

[ How one thieving employee embarrassed a conglomerate: Citigroup Case Spotlights Insider Threat Dangers. ]

More broadly, Clapper said, the insider threat efforts are just one piece of the intelligence community's information sharing efforts that aim to get analysts and others who need the information "the right data, any time, any place, usable by any authorized recipient, prevented only law – not technology – and protected by a comprehensive regimen of accountability." That, he said, represents "nirvana" and is "not an easy task."

The ever-increasing imperative for secure information sharing, when coupled with increased budget pressure, has also created another consequence, Clapper said. For the first time ever, he said, the intelligence community is working together on "an integrated IT enterprise across the major intelligence agencies." Although it is something that agencies have been discussing for some time, he said, recent budget pressures have helped push the idea toward reality.

Cloud computing likely will play a significant role in the evolution of an integrated IT infrastructure within the intelligence community. The cloud has a "huge potential for achieving savings and promoting integration," he said.

Heightened concern that users could inadvertently expose or leak--or purposely steal--an organization's sensitive data has spurred debate over the proper technology and training to protect the crown jewels. An Insider Threat Reality Check, a special retrospective of recent news coverage, takes a look at how organizations are handling the threat--and what users are really up to. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
1/28/2012 | 3:38:22 AM
re: U.S. Intel Chief: Insider Leaks A Top Priority
On the psychology of the insider threat:
http://www.symantec.com/about/...
Brian Prince, InformationWeek/Dark Reading Comment Moderator
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-25533
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
CVE-2021-3162
PUBLISHED: 2021-01-15
Docker Desktop Community before 2.5.0.0 on macOS mishandles certificate checking, leading to local privilege escalation.
CVE-2021-21242
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...
CVE-2021-21245
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to u...
CVE-2021-21246
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, the REST UserResource endpoint performs a security check to make sure that only administrators can list user details. However for the `/users/` endpoint there are no security checks enforced so it is possible to retrieve ar...