Congress Enacts Insider Threat Detection Program
Congress ordered the Secretary of Defense to establish an information security program for detecting “unauthorized access to, use of, or transmission of classified or controlled unclassified information.” The provision was included by the FY2012 defense authorization act that was approved in conference this week (section 922).
The insider threat detection program, conceived as a response to WikiLeaks, is intended to “allow for centralized monitoring and detection of unauthorized activities.” Among other things, it is supposed to employ technology solutions “to prevent the unauthorized export of information from a network or to render such information unusable in the event of the unauthorized export of such information.”
The Congressional action was partially anticipated by President Obama’s executive order 13587 of October 7, 2011, which established new governance procedures for improving the security of classified information.
The new legislation adds some further detail and imposes deadlines for compliance.
No one will be surprised if we end up with a continuing resolution to push our shutdown deadline out past the midterms, so the real question is what else will they get done this summer?
Rebuilding public participation starts with something simple — treating the public not as a problem to manage, but as a source of ingenuity government cannot function without.
If the government wants a system of learning and adaptation that improves results in real time, it has to treat translation, utilization, and adaptation as core functions of governance rather than as afterthoughts.
Coordination among federal science agencies is essential to ensure government-wide alignment on R&D investment priorities. However, the federal R&D enterprise suffers from egregious siloization.