Cybersecurity

The latest chapter in 'preventing the next Snowden'

Wikimedia image: Defense Information Systems Agency (logo).

The large-scale leaks of former National Security Agency contractor Edward Snowden prompted Pentagon officials to rethink how the bureaucracy protects and segments information. Since then, the Defense Information Systems Agency, the defense agency for IT infrastructure, has looked for private-sector solutions to the insider threats. Thus opened up a potentially lucrative market for any company whose technology could make the next Snowden less likely.

DISA Director Lt. Gen. Ronnie Hawkins in May called for the defense industry’s help in leveraging cloud computing to analyze insider threats and better understand the movements and capabilities of government personnel. As of then, industry was involved in more than 60 percent of DISA’s cloud work and more than 80 percent of the agency’s telecom network, Hawkins estimated, appealing for more collaboration with contractors.

The latest step in DISA’s work with industry on insider threats is a project with Metalogix, a Washington, D.C.-based IT management firm. The "data guard" tool unveiled by the firm Jan. 20 is meant to obviate thumb drives or other manual means of transferring data between agency networks. (Snowden reportedly used a thumb drive to download classified information from an NSA facility in Hawaii). The tool can instantaneously replicate content in the military's classified (SIPRNet) and unclassified (NIPRnet) networks.

The technology is designed to take out the middleman in data transfer, Pat Park, regional vice president of public sector at Metalogix, said in an interview. As the product was developed, DISA put it through a series of security tests over the last year, he added.

The swift and relatively seamless transfer of data between networks could be especially important for American forces overseas, added retired Maj. Gen. Steve Smith, a security technology advisor to Metalogix. Those forces not only deal with SIPRNet and NIPRnet, but with the security network rules of their host nation, he pointed out.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • Cybersecurity
    Shutterstock photo id 669226093 By Gorodenkoff

    The disinformation game

    The federal government is poised to bring new tools and strategies to bear in the fight against foreign-backed online disinformation campaigns, but how and when they choose to act could have ramifications on the U.S. political ecosystem.

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.