DoD Fails to Control “Controlled Unclassified Info”
Pentagon officials say that the Department of Defense and its contractors are failing to adequately protect “controlled unclassified information” (CUI) that may have significant military or technological value to adversaries or competitors.
“Simply stated, hostile actors can exfiltrate large volumes of unclassified program information in a single attack that can potentially net enough information to enable adversaries to narrow a capability gap,” according to a recent Army information paper (marked “for official use only”).
Digitized information in the hands of Defense Industrial Base (DIB) contractors is said to be particularly vulnerable.
“Exfiltrations of unclassified data from DIB unclassified systems have occurred and continue to occur, potentially undermining and even neutralizing the technological advantage and combat effectiveness of the future force,” the paper stated.
See “U.S. Army’s Concerns with Protection of Controlled Unclassified Information,” (pdf) August 15, 2008.
The paper was obtained by Inside the Army and first reported in “Army Cyber Task Force To Manage Growing Industrial Espionage Risk” by Daniel Wasserbly, Inside the Army, October 20, 2008.
A similar concern about protection of controlled unclassified information was expressed last month by DoD Chief Information Officer John G. Grimes.
He reiterated “the importance of properly protecting controlled unclassified information placed on information systems connected to the Internet, especially those that use file transfer protocol (FTP), peer-to-peer (P2P), and other protocols that are inherently insecure and pose significant security risks.”
“DoD is currently hosting thousands of such sites and, in spite of previous direction, far too much CUI data is still publicly available from these DoD sites,” he wrote.
See “Protection of Controlled Unclassified Information on DoD Information Systems Connected to the Internet” (pdf), September 22, 2008. The Grimes memo was first reported by Sebastian Sprenger in Inside Defense on October 22.
The Department of Defense Inspector General recently reported that defense contractors had failed to properly manage, recover or revoke thousands of Common Access Cards that permit the holder to access controlled defense information on DoD information systems.
This presents “a potential national security risk that may result in unauthorized access to DoD resources, installations, and sensitive information worldwide,” the DoD IG said.
See “Controls Over the Contractor Common Access Card Life Cycle” (large pdf), DoD Inspector General, October 10, 2008.
Among other things, a failure to reliably protect restricted information that is unclassified may produce an undesirable incentive to classify such information.
While the U.S. has made significant advancements and remained a global leader in biotechnology over the past decade, the next four years will be critical in determining whether it can sustain that leadership.
As the efficacy of environmental laws has waned, so has their durability. What was once a broadly shared goal – protecting Americans from environmental harm – is now a political football, with rules that whipsaw back and forth depending on who’s in charge.
It takes the average person over 9 hours and costs $160 to file taxes each year. IRS Direct File meant it didn’t have to.
It’s paramount to balance both innovation capabilities and risk as we work towards ensuring that the U.S. bioeconomy is a priority area for both the Nation and for National Security.