Cybersecurity

Pentagon exploring methods to mitigate insider threats

Placeholder Image for Article Template

The Pentagon is researching how best to identify and prevent the next Edward Snowden or Bradley (Chelsea) Manning-level insider threat.

In a request for information made public Nov. 22, the Defense Department aims to gauge the capabilities, experience, knowledge and abilities of contractors qualified to participate in its internal security threat program.

No doubt expedited by unauthorized disclosures from Snowden, a former National Security Agency contractor, and Manning, an Army private who leaked 250,000 documents, the request ultimately stems from an executive order issued by President Barack Obama on Oct. 7, 2011.

Executive Order 13587 directed the government to ensure the responsible sharing and safeguarding of classified national security information within and between federal agencies, prompting other policy directives, including the National Insider Threat Policy.

The latest request, which asked for responses from contractors by Dec. 6, is likely just the next stage in handling insider threats, and information received from this RFI could be used to issue a request for proposals in the near future. Specifically, the Pentagon seeks:

  • Counterintelligence-focused support to investigations involving, but not limited to espionage, sabotage, treason, terrorism and insider threat; conduct inquiries to identify and develop insider threat leads for possible referral to investigators; conduct background records reviews to identify past behaviors relevant to the issue under inquiry; provide comprehensive written reports as required; review results of data analysis of insider threat auditing and monitoring software systems to detect, identify and refer threats to the appropriate entities.
  • Provide subject matter expertise in the security clearance process to include adjudication of clearances, processing of security information files, and suspension of clearances for violating security protocols to support documenting violations or attempts to bypass or circumvent the activities and systems identified above.
  • Conduct data analysis of auditing and monitoring software to detect, identify and refer threats to the appropriate entities.
  • Support development and implementation of security measures that protect the handling, storing, processing, and transfer of classified information.

About the Author

Frank Konkel is a former staff writer for FCW.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.

Featured

  • FCW @ 30 GPS

    FCW @ 30

    Since 1996, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

  • Shutterstock image.

    Merged IT modernization bill punts on funding

    A House panel approved a new IT modernization bill that appears poised to pass, but key funding questions are left for appropriators.

  • General Frost

    Army wants cyber capability everywhere

    The Army's cyber director said cyber, electronic warfare and information operations must be integrated into warfighters' doctrine and training.

  • Rising Star 2013

    Meet the 2016 Rising Stars

    FCW honors 30 early-career leaders in federal IT.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group