Insiders in the supply chain
Connecting state and local government leaders
An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts.
An insecure IT supply chain can present as much risk to agencies as an insider exfiltrating data, according to security experts, and government must work with industry to secure it.
There are as many sources of IT supply chain flaws as there are suppliers of all computer and network equipment in use, according to Jon Amis, director of supply chain assurance at Dell, in a panel during the April 10 Intelligence and National Security Alliance conference. A host of computer component companies supply parts to myriad computer makers, he said, and each company has its own set of insiders. With IT, he said, it's a "supply web, not a chain."
To work effectively, the federal government and private industry must both work to bolster protection against supply chain threats, he said, adding that such work should start with federal agencies' internal IT and intelligence teams working together.
Amis said that his firm has "layers and layers" of defenses meant to mitigate such threats, including personnel security measures such as extensive employee background checks.
"The IT and intelligence folks don't talk to one another," he said. To foster a dialogue with industry about how to staunch possible supply chain issues, federal agencies "just need to start with that. Get all the critical pieces together," then reach out to industry.
William Evanina, national counterintelligence executive in the Office of the Director of National Intelligence, said contractors aren't the primary insider threat problem.
There is no reason to believe that contractors pose the majority of insider threat to federal or private network or systems, he said. "Quickly eliminate the thought that the majority of [insider] threat comes from contractors or millennials," he said. "There is no data to support that."
Phishing attacks that entice unsuspecting employees to click on bad links account for much of the risk, while a few determined insiders, such as Edward Snowden and Chelsea Manning, have done some of the most significant insider damage to the federal government and intelligence community.
Ultimately, Evanina said, it is the mind of insiders who wants to open up the taps of sensitive data at their agency that needs to be better understood.
Two researchers delivered a paper at the conference aimed at doing just that.
"Assessing the Mind of the Malicious Insider," from the Intelligence and National Security Alliance, illustrates how the researchers used a continuous evaluation behavioral model and data analytics to detect insiders that could be threats to their employers and its data. The model samples words used in emails, correspondence and other sources that could be used to develop monitoring tools that ingest and correlate phrases and words that have been proven to be associated with anxieties and problems that can add up to an insider threat.
NEXT STORY: Why threat-data sharing is so hard