recommended reading

Survey: Abuse of Network Access Privileges Is Rampant

Pavel Ignatov/

Agencies are more concerned about insiders leaking citizens’ and partner organizations’ information than their own general business information, according to a new survey by the Ponemon Institute. Meanwhile, the commercial sector cares more about inappropriate disclosures of business data than customer data.

Ponemon surveyed 693 industry and government information technology personnel who had high-level access to internal networks. 

Overall, 59 percent, the majority of whom worked in industry, said their business information is most at risk without the right protections. Only 49 percent said client information is most in jeopardy.

Among participants employed at state, local and federal agencies, 54 percent said customer information is the most vulnerable type of information they need to protect. Roughly 42 percent of those government personnel indicated their own business information is most susceptible to leaks.

Commercial firms “probably feel it’s kind of more important that they need to protect their stuff versus customers,” said Michael Crouse, director of insider threat strategies for Raytheon Company, which commissioned Ponemon to conduct the study. 

Whereas, "the government, which kind of sees their customers’ information as what they have to protect," feels that client data is most unprotected, he said. "It’s kind of an interesting inversion."

Across the board, most (88 percent) of participants recognized that the abuse of IT access privileges is a cause for alarm. "But less than half that number, around 44 percent in the government, feel that they have a dedicated budget for investing in these technologies, investing in processes and procedures, to reduce the threat of the insider," Crouse said. 

Determining what to invest in is part of the challenge. Many analysts say more resources must be devoted to checking up on employees' behaviors, rather than just network security.  

About 74 percent of the government officials surveyed said personnel with high user privileges feel they are empowered to access all the information they can view, Crouse said. 

"Just because you are looking for information or accessing information, that in itself isn’t a violation for the most part," he said. "If you’re actually taking that information, or using that information, or sending that information, whether you do it deliberately or maliciously, that is a big problem."

Changes in employee feelings and perceptions can turn natural nosiness into malice.

Leaders need to have auditing mechanisms in place to ensure an employee's "sense of empowerment won’t do damage to the organization," Crouse said.

Technology that analyzes networks and machines for abnormal transfers isn't enough, many security specialists say.

Since 2010, when then Pfc. Bradley Manning allegedly shared classified intelligence with anti-secrecy website WikiLeaks, the Pentagon has spent millions of dollars on data loss prevention software to protect systems against breaches from within. 

That didn't stop ex-National Security Agency contractor Edward Snowden from allegedly leaking secrets about the Defense agency's spying operations.

Working from an office in Hawaii, he used login credentials and passwords that colleagues unwittingly provided him to access some of the material he divulged to the media, according to Reuters

Some former U.S. national security IT officials say the government doesn't need to start from scratch on a behavior surveillance system to stop rogue employees.

"It’s not new technology -- it’s a matter of making it more encompassing, making it more scalable, making it faster” at searching for signs of changes in conduct, Dale Meyerrose, the first chief information officer of the intelligence community under the Director of National Intelligence, told Nextgov. "A lot of it is the same infrastructure, the same sensors, the same networking technology. You just put in the software code new rules [detailing which databases to scour], new processes, new applications," he said.

(Image via Pavel Ignatov/

Threatwatch Alert

Software vulnerability

Malware Has a New Hiding Place: Subtitles

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.


When you download a report, your information may be shared with the underwriters of that document.