According
to the article published by Federal News Radio, Swift said that most
agencies have already developed protocols for identifying “troubled
employees” who would be the most likely suspects in a case of an insider
passing on classified information. The Task Force will take advantage
of the protocols that are already in place by examining each and
choosing from among them those best suited to being reported to all the
relevant departments within the Executive Branch. In reading the
description of the policy in the Federal News Radio piece, it would seem
that the Task Force is preparing training modules for federal employees
that teach them how to recognize behavior that might indicate that a
colleague is a potential risk to national security. Prior to the
branch-wide implementation of whatever scheme is finally approved by the
Task Force and the President, there is a method already set to be
enforced that could address the potential for leaks. In order to
decrease the “potential for terrorist attacks,” Homeland Security Presidential Directive 12
calls for the creation of a mandatory, Government-wide standard for
secure and reliable forms of identification issued by the Federal
Government to its employees and contractors (including contractor
employees). Rob Carey, the Defense Department deputy chief information
officer, said during another session at FOSE that the federal ID card
can “prevent unauthorized access to data and promote information sharing
at the same time along with improving the cybersecurity of an agency's
network.” The absolute requirement that the identification be used by
intelligence employees will provide the President with a
keystroke-by-keystroke record of every worker’s online activity. This
level of after-the-fact monitoring will plug the pores in our nation’s
cybersecurity. As Carey explained it, implementation of the key card
control mechanism will “add another layer of security while also letting
officials know who is on the network, when they were on the network and
what they were doing there.” As set forth in the Directive, "Secure and
reliable forms of identification" for purposes of this directive means
identification that (a) is issued based on sound criteria for verifying
an individual employee's identity; (b) is strongly resistant to identity
fraud, tampering, counterfeiting, and terrorist exploitation; (c) can
be rapidly authenticated electronically; and (d) is issued only by
providers whose reliability has been established by an official
accreditation process. The Standard will include graduated criteria,
from least secure to most secure, to ensure flexibility in selecting the
appropriate level of security for each application. The use of the
“Common Identification Standard for Federal Employees and Contractors”
is only one of the ideas being offered for securing the country’s most
critical classified data. One member of the Insider Threat Task Force,
Diana Braun, said that the ID cards are just one of five “near term ways
to strengthen systems against insider threats.” According to the
rubrics contained in Executive Order 13587, the agencies listed therein
must submit annual reports to the Steering Committee created by the
Order. The Senior Information Sharing and Safeguarding Steering
Committee shall be co-chaired by senior representatives of the Office of
Management and Budget and the National Security Staff. Members of the
committee shall be officers of the United States as designated by the
heads of the Departments of State, Defense, Justice, Energy, and
Homeland Security, the Office of the Director of National Intelligence,
the Central Intelligence Agency, and the Information Security Oversight
Office within the National Archives and Records Administration (ISOO),
as well as such additional agencies as the co-chairs of the Steering
Committee may designate. While it is indisputable that our nation must
be protected from the damage that could be caused by intelligence agency
insiders who criminally pass classified information to those who could
pose a legitimate and demonstrable threat to our national security, what
is perhaps more helpful to the long-term freedom of our Republic is the
immediate end of all those secret yet reprehensible activities being
carried out by our government that bring shame to every citizen. If we
could rid our government of those in high places who are working against
the cause of liberty and peace, then we wouldn’t need another task
force or federal agency.
Pages
- Home
- About
- 2012
- 9/11 Inside Job
- AIDS
- Agriculture
- Al-Qaeda/Osama
- Anarchy
- Anomaly
- Anonymous
- Area 51
- Banks
- Bed Bugs
- Bermuda Triangle
- Bigfoot
- Bilderberg
- Biography
- Bizarre
- Body Language
- Bohemian Grove
- Buisness/Corporations
- CIA
- Chemtrials
- China
- Chupacabra
- Conspiracies
- Crop Circle
- Dimensions
- Education
- False Flag
- Fluoride
- Free Energy
- Freedom/Rights
- Freemason
- Government
- HAARP
- Hackers
- IRS
- Illuminati
- Infinity
- Internet
- Jews
- JFK
- Kim Jong il
- Marijuana
- Micheal Jackson
- Monsanto
- N.W.O
- Nano Tech
- Nazi's
- Nicola Tesla
- North America
- Paranormal
- Pharmaceutical Industry
- Police
- Puzzle Boxes
- Pyramids
- Quantum Science
- Roswell
- RFID
- Religion
- Rockefellers
- Sadam
- Second Great Depression
- Secret Government
- Sheeple
- Sun
- Swine Flu
- Transhumanism
- UFOsearchonline
- Underground Bases
- United States of Amercia
- Vancouver
- Wikileaks
Wednesday, April 18, 2012
President Intelligence agencies safeguarding Leaks
President Creates Task Force to Stop Leaks of Classified Information:
A
joint task force of American law enforcement and intelligence agencies
is drafting a plan to prevent cyber attacks and information leaks from
those working inside the agencies. The proposal is a requirement of an executive order signed October 7 of last year by President Obama.
Executive Order 13587 sets guidelines designed to “to ensure the
responsible sharing and safeguarding of classified national security
information (classified information) on computer networks.
"One step
toward the accomplishment of this goal is the creation of an interagency
Insider Threat Task Force. That group is charged with developing a
Government-wide program (insider threat program) for deterring,
detecting, and mitigating insider threats, including the safeguarding of
classified information from exploitation, compromise, or other
unauthorized disclosure, taking into account risk levels, as well as the
distinct needs, missions, and systems of individual agencies. This
program shall include development of policies, objectives, and
priorities for establishing and integrating security,
counterintelligence, user audits and monitoring, and other safeguarding
capabilities and practices within agencies. Reading between the lines it
is easy to see what prompted the issuing of this order and the creation
of this new bureaucracy: WikiLeaks. President Obama likely was also
motivated by the acts of Army Private Bradley Manning. In what is
described as “the biggest leak of classified information in U.S.
history,” Manning is accused of passing over 700,000 documents and video
clips to WikiLeaks, the widely known website devoted to exposing
government corruption throughout the world. Private Manning, 24, from
Crescent, Oklahoma, has been detained since he was arrested on May 29,
2010 while on deployment with the 10th Mountain Division in Iraq. While
on duty near Baghdad, Manning had access to the Secret Internet Protocol
Router Network (SIPRNet) and the Joint Worldwide Intelligence
Communications System. SIPRNET is the network used by the U.S.
government to transmit classified information. Manning’s arrest came as
the result of information provided to the FBI by a computer hacker named
Adrian Lamo. Lamo told agents that during an online chat in May 2010,
Manning claimed to have downloaded classified information from SIPRNet
and sent it to WikiLeaks. According to published reports, the material
Manning is accused of unlawfully appropriating includes a large cache of
U.S. diplomatic cables (approximately 250,000), as well as videos of an
American airstrike on Baghdad conducted in July 2007 and a similar
attack in May 2009 on a site near Granai, Afghanistan (an event
sometimes known as the Granai Massacre). Of course, the new policy is
being promoted by the Obama administration as an attempt to assist law
enforcement and intelligence to “connect the dots” so as to prevent
future terrorist attacks on the homeland. A key member of the task force
and the Office of the Director of National Intelligence, John Swift, is
quoted in a recent article
as saying that the agencies named in the executive order are committed
to conforming to the requirements handed down by President Obama. "The
National Policy on Insider Threat is in draft and will probably move its
way to the White House National Security Staff in the next month or
two, which is pretty fast in the federal scheme of things," said Swift
during a panel discussion on the insider threat at the FOSE trade show
in Washington Wednesday. "However, in order to actually implement a
program, you will want to have standards. Those standards are being
developed now by the task force, and all the interagency members that
are working on it. Those standards have to be issued by October of this
year." The Order gives the agencies one year to set and implement the
appropriate standards for identifying and eliminating the threats of
leaks caused by intelligence insiders.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment