iTnews
  • Home
  • News
  • Technology
  • Security

US Gov orders infosec lock-down post Wikileaks

By Angela Moscaritolo on Oct 10, 2011 10:31AM
US Gov orders infosec lock-down post Wikileaks

Assange predicts balkanised agencies will fail.

The White House last week ordered agencies tighten security to prevent further Wikileaks-style attacks.

The structural changes issued within an executive order to safeguard classified information and networks from insider threats.

It followed a seven-month government review of policies and procedures surrounding the handling of classified information, prompted by the leak of classified US cables by whistleblower site Wikileaks.

The order stated that individual government agencies “bear the primary responsibility” for ensuring that classified information was safeguarded and shared appropriately.

Agencies that use classified networks must implement an insider threat detection and prevention program, designate a senior official to oversee information-sharing protections and perform self-assessments of compliance with standards.

Senior Defense and National Security Agency officials would be responsible for developing technical policies and standards to protect classified information within national security systems, and will also conduct assessments of agency compliance. 

This month Wikileaks founder Julian Assange said governments would react to the cable leaks by becoming transparent or locking down.

In the latter instance, Assange said agencies would Balkanise and become less effective and unable to compete for skilled staff.

“This is one of the goals of Wikileaks,” Assange said.

But Securosis founder Rich Mogull said the executive order “appears to carefully balance the needs of continued information sharing with that of increased security”.

“The normal reaction is to return to pre-9-11 silos, but assuming agencies are following these orders, they will maintain cooperation while still addressing insider threats,” Mogull said

The Wikileaks exposures were essentially the result of one agency, the Department of Defense, leaking data shared by another agency, the Department of State, according to Mogull.

US agencies have recently strengthened security including systems to improve online identity management, access control, and bans on the use of removable media.

“These are tough problems, and implementation is everything, but on paper it's the right direction,” Mogull said.

The executive directive ordered the creation of a task force to develop a government-wide program to detect and prevent insider threats and reduce security vulnerabilities.

The Senior Information Sharing and Safeguarding Steering Committee would submit regular reports to document government successes and failures in protecting classified information.

A new office dubbed the Classified Information Sharing and Safeguarding Office would advise the steering committee and support the insider threat task force and other agencies.

-With Darren Pauli

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
data breachdlpjulian assangesecurityus governmentwikileaks

Partner Content

The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Angela Moscaritolo
Oct 10 2011
10:31AM
0 Comments

Related Articles

  • Qld gov proposes mandatory data breach reporting for agencies
  • Law firm mulls class action over NDIS software provider data breach
  • NDIS case management system provider breached
  • 50k customers caught up in Spirit Super phishing attack
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Researchers hacked Oracle servers to demo serious vulnerability

Researchers hacked Oracle servers to demo serious vulnerability

PayTo rollout kicks off

PayTo rollout kicks off

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
The security threat of quantum computing
The security threat of quantum computing
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.