No Result
View All Result
Global Finances Daily
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers
  • Login
Global Finances Daily
No Result
View All Result
Home Protection

5 Early Warning Indicators That Are Key to Protecting National Secrets

August 23, 2023
in Protection
0
informa



The US Department of Defense (DoD) will create an insider threat office to monitor employees following a review into the leak of classified Pentagon intelligence on Discord.

A June 30 memo signed by the Secretary of Defense calls for the establishment of a Joint Management Office for Insider Threat and Cyber Capabilities to “oversee user activity monitoring (UAM).”

While any effort to stop insiders from leaking data is promising, there is a bigger issue at play that has everything to do with the UAM requirements, as defined by the Committee on National Security Systems Directive (CNSSD) 504 in 2014.

In brief, current UAM data requirements are insufficient for proactively stopping insider risks from becoming threats that turn into data-loss incidents (“proactively” being the key word).

Déjà Vu All Over Again

On hearing about the Joint Management Office for Insider Threat and Cyber Capabilities, many insider-risk practitioners likely experienced a good spell of déjà vu. And within reason.

Let’s recap history:

Indeed, there has been a lot of effort into consolidating the insider threat function across the whole of the DoD. But if the endgame is to protect classified intelligence in the interests of national security, then there are bigger issues to address.

The Real Issue: UAM Data Requirements Are Reactive

The biggest hindrance to proactive insider-risk mitigation within the DoD is that the required UAM data collection capabilities are reactive (at best).

According to CNSSD 504, every executive branch department and agency should have five minimum technical capabilities to collect user activity data. They are:

  1. Keystroke monitoring
  2. Full application content (e.g., email, chat, data import, data export)
  3. Screen capture
  4. File shadowing for all lawful purposes (i.e., the ability to track documents when the names and locations have changed)
  5. Attributing all collected UAM data to a specific user

As of 2019, 4.2 million individuals were eligible to access classified information. Many of the capabilities listed above rely on employee surveillance, which is a serious issue with respect to privacy and the trusted workforce philosophy. But to rely on surveillance as a primary mechanism for finding the needle in a haystack is just not feasible. Even on the off chance it does work, most insider risks will go unnoticed until exfiltration occurs and it’s too late. This reactive approach sets a low bar, especially in the context of national security.

When it comes to protecting national secrets, having the right data is the difference between proactive insider risk management versus reactive damage control.

Keystrokes and screen capture cannot be used to stop leaks from occurring; this data is only ever useful after the fact, and even then, its use is limited because the damage is already done.

There is a significant need to modernize the requirements for UAM by prioritizing data that can be used early to proactively mitigate insider risk. This is why early warning indicators are so powerful; they afford the opportunity of time to detect, deter, and disrupt insider risks well before data loss occurs.

Pentagon Leaks: How Early Warning Indicators Could Have Changed History

If the goal is to proactively mitigate insider risk, then having actionable data that precedes a potential exfiltration is everything. It is not enough to have a UAM solution capture data during or after a data loss event has occurred.

Early warning indicators afford analysts the privilege of time to proactively escalate, investigate, and remediate insider risk before data is lost.

In the case of the Pentagon leaks, there were several early warning indicators that could have been leveraged to provide the necessary context to proactively identify risk and prevent data loss.

Knowing what to look for and how to make sense of the right data is prudent. Insider risk cannot be determined in isolation. It should be a holistic, calculated effort based on the correlation and aggregation of data from human, organizational, cyber, and physical sensors over time.

Here are five potential early warning indicators from the Pentagon leaks:

  • Volume and frequency: Accessing large volumes of data within unusual frequencies, especially when compared with an individual’s peer group
  • Sensitivity: Searching, accessing, or aggregating highly sensitive data that may be unusual based on the individual’s job function
  • Job function: Any other activity deemed to be beyond the scope or seniority of the individual’s job function and department
  • HR notifications: Any notification of unauthorized or antisocial employee activity — no matter how small (“see something, say something“)
  • Search: Searching or researching the corporate networks (in this case, the Joint Worldwide Intelligence Communication System) in unusual ways, times, and frequencies

These are just a handful of potential early warning behavioral-based indicators. While they might seem harmless in isolation, the individual’s risk profile is elevated when the indicators are aggregated and correlated, especially with other data including the accused’s controversial online presence.

Going forward, understanding early warning indicators and having a mechanism for capturing and acting upon them swiftly and responsibly will be critical in enabling the proactive detection and resolution of insider risks. Here’s hoping the Joint Management Office for Insider Threat and Cyber Capabilities considers this in its mission to protect national secrets.

Editorial Team

Editorial Team

Related Posts

Shows Like 'Margo's Got Money Troubles' You Should Watch Next
Protection

Shows Like ‘Margo’s Got Money Troubles’ You Should Watch Next

May 14, 2026
The 2026 Hisense S7SG CanvasTV Is $500 Off
Protection

The 2026 Hisense S7SG CanvasTV Is $500 Off

May 14, 2026
This Is Every Android Getting AirDrop Support This Year
Protection

This Is Every Android Getting AirDrop Support This Year

May 14, 2026
How to Actually Start Eating Healthy
Protection

How to Actually Start Eating Healthy

May 14, 2026
The Best Value OLED TV of 2026 Is Now Cheaper
Protection

The Best Value OLED TV of 2026 Is Now Cheaper

May 14, 2026
Instagram's New Snapchat Clone Makes It Too Easy to Send Disappearing Images to All Your Friends
Protection

Instagram’s New Snapchat Clone Makes It Too Easy to Send Disappearing Images to All Your Friends

May 14, 2026
Load More
Next Post
Profits plunge more than 50% annually on weak sales as consumer angst persists

Profits plunge more than 50% annually on weak sales as consumer angst persists

Popular News

  • Bitcoin

    Bitcoin Supply Squeeze? Institutions Absorb 500% Of New BTC

    0 shares
    Share 0 Tweet 0
  • 6 Ways To Deal With Family Asking About Your Job Search

    0 shares
    Share 0 Tweet 0
  • BDC market to triple by 2030

    0 shares
    Share 0 Tweet 0
  • Von Fuchsrot bis „Bambi-Blond“: 12 Herbst-Haarfarben-Trends

    0 shares
    Share 0 Tweet 0
  • Tax expert warns sellers who use online marketplaces not to ignore new wave of HMRC nudge letters

    0 shares
    Share 0 Tweet 0

Latest News

Bitcoin absorbs $732B as tokenized RWAs hit $24B

Will Bitcoin price break $100K as golden cross looms?

May 15, 2026
0

Bitcoin price continued consolidating above the key $80,000 psychological support level this week as improving institutional sentiment and strengthening technical...

Bill Ackman says he built Microsoft position in first quarter

Bill Ackman says he built Microsoft position in first quarter

May 15, 2026
0

Bill Ackman, founder and CEO of Pershing Square Inc., attends his company’s IPO at the New York Stock Exchange (NYSE),...

Career Coach - HigherEdJobs

Career Coach – HigherEdJobs

May 15, 2026
0

Career CoachKansas State UniversityAbout This Role The Management Career Coach supports undergraduate business students majoring in Entrepreneurship, HR, MIS, Operations...

Caregivers and disabled workers are missing out on key financial benefits

Caregivers and disabled workers are missing out on key financial benefits

May 15, 2026
0

ShareShare Article via FacebookShare Article via TwitterShare Article via LinkedInShare Article via EmailVoya Financial CEO Heather Lavallee explains to CNBC’s...

Global Finances Daily

Welcome to Global Finances Daily, your go-to source for all things finance. Our mission is to provide our readers with valuable information and insights to help them achieve their financial goals and secure their financial future.

Subscribe

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Use
  • Editorial Process

© 2025 All Rights Reserved - Global Finances Daily.

No Result
View All Result
  • Alternative Investments
  • Crypto
  • Financial Markets
  • Investments
  • Lifestyle
  • Protection
  • Retirement
  • Savings
  • Work & Careers

© 2025 All Rights Reserved - Global Finances Daily.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.