Congress Enacts Insider Threat Detection Program
Congress ordered the Secretary of Defense to establish an information security program for detecting “unauthorized access to, use of, or transmission of classified or controlled unclassified information.” The provision was included by the FY2012 defense authorization act that was approved in conference this week (section 922).
The insider threat detection program, conceived as a response to WikiLeaks, is intended to “allow for centralized monitoring and detection of unauthorized activities.” Among other things, it is supposed to employ technology solutions “to prevent the unauthorized export of information from a network or to render such information unusable in the event of the unauthorized export of such information.”
The Congressional action was partially anticipated by President Obama’s executive order 13587 of October 7, 2011, which established new governance procedures for improving the security of classified information.
The new legislation adds some further detail and imposes deadlines for compliance.
We came out of the longest shutdown in history and we are all worse for it. Who won the shutdown fight? It doesn’t matter – Americans lost. And there is a chance we run it all back again in a few short months.
Promising examples of progress are emerging from the Boston metropolitan area that show the power of partnership between researchers, government officials, practitioners, and community-based organizations.
Americans trade stocks instantly, but spend 13 hours on tax forms. They send cash by text, but wait weeks for IRS responses. The nation’s revenue collector ranks dead last in citizen satisfaction. The problem isn’t just paperwork — it’s how the government builds.
In a new report, we begin to address these fundamental implementation questions based on discussions with over 80 individuals – from senior political staff to individual project managers – involved in the execution of major clean energy programs through the Department of Energy (DOE).