• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

July 24, 2015 by

20 Jul 15. Can big data fight both shooters and hackers? After the September 2013 shooting at the Navy Yard, the Defense Department directed the establishment of the DoD Insider Threat Management Analysis Center to try to close some of the gaps that allowed a credentialed military contractor into the Navy Yard facilities. (Photo: Staff)
Keeping tabs on workers in contact with the federal government is high priority in an era that is not only post-Edward Snowden, but post-Fort Hood, post-Navy Yard and generally post-general-sense-of-security. The government’s struggles to maintain thorough backgrounds of its workers are well-documented, but now officials hope the use of big data will fix many of the problems. After the September 2013 shooting at the Navy Yard, the Defense Department directed the establishment of the DoD Insider Threat Management Analysis Center to try to close some of the gaps that allowed a credentialed military contractor into the Navy Yard facilities – and that also made it possible for other security breaches by cleared personnel. Part of that reconciliation will hinge on the use of continuous evaluation, an IT-powered version of the background checks regularly performed on military personnel. A pilot program employing continuous evaluation currently monitors roughly 250,000 personnel and will scale to 500,000 by the end of the year, according to Carrie Wibben, director of the security policy operations directorate in DoD’s Office of the Under Secretary of Defense (Intelligence).
Wibben spoke as part of a panel held by Defense One in Arlington, Virginia, on July 16.
“We’ve spent a lot of time and energy establishing a centralized DoD element to gather and fuse relevant information from different data sources within the department,” Wibben said. “And I imagine continuous evaluation will be one of those key data sources…in producing information on our workforce that will give us a better understanding and more holistic picture of the people working for and on behalf of the department.”
Continuous evaluation is a critical mission of the DITMAC. The center also relies on the service components to provide their own data they’ve collected from capabilities that currently are in development, the panelists said. The undertaking additionally relies on the vast troves of publicly available data online – including social media and other sources of public information.
“The mission is to enable information-sharing, collaboration, analysis and risk management across the DoD components to address current and emerging threats to DoD personnel and missions, including their information,” said Mark Nehmer, deputy chief of implementation at DITMAC. “Our job is to actually fuse the information we can find with the information they’ve already got at the component level, query inside and outside the department for additional information, bundle that and hand it back to the component for action as fast as possible. We’re an information exchange and enabling function.”
DITMAC’s mission and the Pentagon’s focus on maintaining up-to-date personnel background information are at the crosshairs of ongoing debates: What constitutes an insider threat versus a whistleblower, or what data is legal – or ethical – for the government to collect and keep?
“It’s not the technical issues anymore,” said Patricia Larsen, co-director of the National Insider Threat Task Force at the Office of the Director of National Intelligence. “It’s the legal questions, the non-technical constrains that are really the problem. As soon as you try to build a national-level program, you stumble across the different legal and civil liberties interpretations.”
But Wibben emphasized it’s less about personal information being collected and used by the government, and more about fixing the problems – including the failure to identify and flag certain behaviors and patterns – that led to the Navy Yard, Fort Hood and Edward Snowden.
“There are gaps in our periodic

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT