recommended reading

Defense bill tackles WikiLeaks-style insider threats

Dismissing White House concerns about the tight timetable, Congress on Thursday sent President Obama a Defense authorization bill for 2012 that would require the Pentagon to install a departmentwide computer monitoring system by October aimed at averting unauthorized data leaks.

The measure calls for an insider threat detection program to prevent Defense Department personnel and contractors from releasing sensitive data, following allegations a U.S. soldier transferred hundreds of thousands of confidential diplomatic and military files to the public exposure website WikiLeaks. The security application is supposed to flag signs of unauthorized computer activity and, in some cases, block information sharing.

Under H.R. 1540, which cleared the Senate late Thursday by a vote of 86-13, the Pentagon must connect all information systems in every service and agency to a central control panel. The legislation demands the technology employ a variety of specific safeguards, including: monitoring the use of external data ports and read/write tools; disabling removable data drives; electronically reporting unusual user behavior; rendering data unreadable if compromised; updating bug fixes; regulating access according to job responsibilities; and refereeing traffic between networks to prevent the exchange of restricted data.

The system must be operable by Oct. 1, 2012, and fully deployed by October 2013. The House approved the defense bill by a vote of 283-136 on Wednesday night.

An intelligence authorization bill enacted this summer mandated the national intelligence director set up a similar system within the same short time frame. That measure drew White House pushback. A statement of administrative policy objecting to H.R. 754 stated, "the administration is concerned with the unrealistic timelines required by this provision for the program's operational readiness, and strongly requests that the provision be amended to grant the [Office of the Director of National Intelligence] flexibility in implementation timelines of the program." The legislation passed anyway.

White House Press Secretary Jay Carney issued a statement saying the administration would not veto the defense bill, but it did not address the threat detection technology.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.