http://homelandsecuritynewswire.com/pentagon-emphasizes-insider-threat-detec
tion

 


Pentagon emphasizes insider threat detection


Published 16 November 2010

Based on a report examining the Fort Hood incident, military leaders have
concluded that protecting military bases and facilities only from external
threats is no longer a viable strategy; the U.S. military's four services
plan to share information and coordinate efforts more closely to ensure
military personnel are protected from insider threats; the armed services
will continue to develop the Web-based iWatch and iSalute programs, and
DARPA is developing technology -- anomaly detection at multiple scales
(ADAMS) -- to help better identify potential insider threats before they can
do damage

Internet-based "neighborhood watch" programs and improved data sharing are
two of the ways the U.S. military plans better to align its security efforts
as a reaction to a deadly shooting at Fort Hood last year.

Based on a report examining the incident, military leaders have concluded
that protecting military bases and facilities only from external threats is
no longer a viable strategy, according to the Department of Defense (DoD).

Informationweek reports
<http://www.informationweek.com/news/government/security/showArticle.jhtml?a
rticleID=228200954&cid=RSSfeed_IWK_All>  that the four main branches of the
military - the Navy, Army, Air Force, and Marines - plan to share
information and coordinate efforts more closely to ensure military personnel
are protected from insider threats. They also plan to align their own
efforts with law-enforcement agencies and mental-health professionals.

The report, "Protecting the Force: Lessons from Fort Hood," was commissioned
after Maj. Nidal Hasan went on a shooting rampage that left 13 dead and 31
wounded on 5 November 2009. Hasan was working as an Army psychiatrist at the
time, and investigations conducted before and after the shooting discovered
that he was in communication with a known radical Islamist.

As part of efforts to raise red flags before such incidents can occur in the
future, the armed services will continue to develop the Web-based iWatch and
iSalute programs, which emulate civilian neighborhood-watch programs, they
said. The programs educate military personnel about behaviors and activities
that may be connected to terrorism or criminal activity, and allow them to
report that activity online.

The DoD also will create a threat awareness and reporting program and
institute training to improve insider-threat information sharing, as well as
bolster incident-response and anti-terrorism awareness, it said.

Military leaders have been seeking ways to prevent or deter insider threats
for some time. Last month, the Defense Advanced Research Projects Agency
(DARPA), the defense research arm of the DoD, said it is developing
technology to help better identify potential insider threats before they can
do damage.

DARPA's anomaly detection at multiple scales (ADAMS) program will produce
technology that can sift through the behavioral signs that may lead to
someone turning on his or her cohorts, and prevent the action before it
happens, according to the agency. 

 



[Non-text portions of this message have been removed]



------------------------------------

--------------------------
Want to discuss this topic?  Head on over to our discussion list, 
[email protected].
--------------------------
Brooks Isoldi, editor
[email protected]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [email protected]
  Unsubscribe:  [email protected]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    [email protected] 
    [email protected]

<*> To unsubscribe from this group, send an email to:
    [email protected]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/

Reply via email to