1 mars 2019 | International, Sécurité, Autre défense

The Security Clearance Process Is About to Get Its Biggest Overhaul in 50 Years

By AARON BOYD

The federal intelligence and human resources communities are preparing a coming out party for the first major update to the security clearance process in some 50 years.

For the last year, the Suitability and Security Clearance Performance Accountability Council has been working on the Trusted Workforce 2.0 framework, the start of a wide-ranging effort to overhaul how background investigations are conducted. Representatives from the intelligence community, Defense Department, Office of Personnel Management, and Office of Management and Budget are leading PAC's efforts.

Over the next two weeks, the team plans to debut the finalized framework to the White House and Congress and offered a group of reporters a first look at what's to come.

This is the first time ever that the legislative and executive branches are on the same page with regard to clearance reform, according to Bill Evanina, director of the National Counterintelligence and Security Center, who is leading the framework effort along with OPM Deputy Director Michael Rigas.

The two agencies, along with members of the Defense Department, have been working to reduce the crushing backlog of security investigations, which topped 725,000 in early 2018. That backlog has since been reduced to 551,000 as of Monday. But that number is 100 percent above what security professionals consider to be the baseline “steady state” of 220,000 to 250,000 investigations in process at any given time.

Key to continuing to decrease the backlog and get the average clearance timeline down below 80 days is a major process overhaul, Evanina and Rigas said.

“We realized this is a really big elephant, so we have to take some small bites,” beginning with reducing the backlog, Evanina said.

From there, beginning mid-summer, they began to look at the “blue sky perspective,” as Evanina put it: the high-level view of structural, procedural changes that needed to take place.

Discussions focused on removing “friction” from the process, said Matt Eanes, director of the PAC program management office, whether by removing the need to vet minor things or allowing investigators to use digital methods.

Full article: https://www.nextgov.com/cio-briefing/2019/02/security-clearance-process-about-get-its-biggest-overhaul-50-years/155229/

Sur le même sujet

  • HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    14 août 2018 | International, C4ISR

    HOW HACKED WATER HEATERS COULD TRIGGER MASS BLACKOUTS

    WHEN THE CYBERSECURITY industry warns about the nightmare of hackers causing blackouts, the scenario they describe typically entails an elite team of hackers breaking into the inner sanctum of a power utility to start flipping switches. But one group of researchers has imagined how an entire power grid could be taken down by hacking a less centralized and protected class of targets: home air conditioners and water heaters. Lots of them. At the Usenix Security conference this week, a group of Princeton University security researchers will present a study that considers a little-examined question in power grid cybersecurity: What if hackers attacked not the supply side of the power grid, but the demand side? In a series of simulations, the researchers imagined what might happen if hackers controlled a botnet composed of thousands of silently hacked consumer internet of things devices, particularly power-hungry ones like air conditioners, water heaters, and space heaters. Then they ran a series of software simulations to see how many of those devices an attacker would need to simultaneously hijack to disrupt the stability of the power grid. Their answers point to a disturbing, if not quite yet practical scenario: In a power network large enough to serve an area of 38 million people—a population roughly equal to Canada or California—the researchers estimate that just a one percent bump in demand might be enough to take down the majority of the grid. That demand increase could be created by a botnet as small as a few tens of thousands of hacked electric water heaters or a couple hundred thousand air conditioners. "Power grids are stable as long as supply is equal to demand," says Saleh Soltan, a researcher in Princeton's Department of Electrical Engineering, who led the study. "If you have a very large botnet of IoT devices, you can really manipulate the demand, changing it abruptly, any time you want." The result of that botnet-induced imbalance, Soltan says, could be cascading blackouts. When demand in one part of the grid rapidly increases, it can overload the current on certain power lines, damaging them or more likely triggering devices called protective relays, which turn off the power when they sense dangerous conditions. Switching off those lines puts more load on the remaining ones, potentially leading to a chain reaction. "Fewer lines need to carry the same flows and they get overloaded, so then the next one will be disconnected and the next one," says Soltan. "In the worst case, most or all of them are disconnected, and you have a blackout in most of your grid." Power utility engineers, of course, expertly forecast fluctuations in electric demand on a daily basis. They plan for everything from heat waves that predictably cause spikes in air conditioner usage to the moment at the end of British soap opera episodes when hundreds of thousands of viewers all switch on their tea kettles. But the Princeton researchers' study suggests that hackers could make those demand spikes not only unpredictable, but maliciously timed. The researchers don't actually point to any vulnerabilities in specific household devices, or suggest how exactly they might be hacked. Instead, they start from the premise that a large number of those devices could somehow be compromised and silently controlled by a hacker. That's arguably a realistic assumption, given the myriad vulnerabilities other security researchers and hackers have found in the internet of things. One talk at the Kaspersky Analyst Summit in 2016 described security flaws in air conditioners that could be used to pull off the sort of grid disturbance that the Princeton researchers describe. And real-world malicious hackers have compromised everything from refrigerators to fish tanks. Given that assumption, the researchers ran simulations in power grid software MATPOWER and Power World to determine what sort of botnet would could disrupt what size grid. They ran most of their simulations on models of the Polish power grid from 2004 and 2008, a rare country-sized electrical system whose architecture is described in publicly available records. They found they could cause a cascading blackout of 86 percent of the power lines in the 2008 Poland grid model with just a one percent increase in demand. That would require the equivalent of 210,000 hacked air conditioners, or 42,000 electric water heaters. The notion of an internet of things botnet large enough to pull off one of those attacks isn't entirely farfetched. The Princeton researchers point to the Mirai botnet of 600,000 hacked IoT devices, including security cameras and home routers. That zombie horde hit DNS provider Dyn with an unprecedented denial of service attack in late 2016, taking down a broad collection of websites. Building a botnet of the same size out of more power-hungry IoT devices is probably impossible today, says Ben Miller, a former cybersecurity engineer at electric utility Constellation Energy and now the director of the threat operations center at industrial security firm Dragos. There simply aren't enough high-power smart devices in homes, he says, especially since the entire botnet would have to be within the geographic area of the target electrical grid, not distributed across the world like the Mirai botnet. But as internet-connected air conditioners, heaters, and the smart thermostats that control them increasingly show up in homes for convenience and efficiency, a demand-based attack like the one the Princeton researchers describes could become more practical than one that targets grid operators. "It's as simple as running a botnet. When a botnet is successful, it can scale by itself. That makes the attack easier," Miller says. "It's really hard to attack all the generation sites on a grid all at once. But with a botnet you could attack all these end user devices at once and have some sort of impact." The Princeton researchers modeled more devious techniques their imaginary IoT botnet might use to mess with power grids, too. They found it was possible to increase demand in one area while decreasing it in another, so that the total load on a system's generators remains constant while the attack overloads certain lines. That could make it even harder for utility operators to figure out the source of the disruption. If a botnet did succeed in taking down a grid, the researchers' models showed it would be even easier to keepit down as operators attempted to bring it back online, triggering smaller scale versions of their attack in the sections or "islands" of the grid that recover first. And smaller scale attacks could force utility operators to pay for expensive backup power supplies, even if they fall short of causing actual blackouts. And the researchers point out that since the source of the demand spikes would be largely hidden from utilities, attackers could simply try them again and again, experimenting until they had the desired effect. The owners of the actual air conditioners and water heaters might notice that their equipment was suddenly behaving strangely. But that still wouldn't immediately be apparent to the target energy utility. "Where do the consumers report it?" asks Princeton's Soltan. "They don't report it to Con Edison, they report it to the manufacturer of the smart device. But the real impact is on the power system that doesn't have any of this data." That disconnect represents the root of the security vulnerability that utility operators need to fix, Soltan argues. Just as utilities carefully model heat waves and British tea times and keep a stock of energy in reserve to cover those demands, they now need to account for the number of potentially hackable high-powered devices on their grids, too. As high-power smart-home gadgets multiply, the consequences of IoT insecurity could someday be more than just a haywire thermostat, but entire portions of a country going dark. https://www.wired.com/story/water-heaters-power-grid-hack-blackout/

  • Farnborough Air Show Plans Virtual Expo to Fill Paris Void

    5 mars 2021 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Farnborough Air Show Plans Virtual Expo to Fill Paris Void

    Organizers of Britain's Farnborough International Airshow are planning a virtual expo later this year to fill the void left by a biennial event in Paris that was scrapped because of Covid-19.

  • Army Ponders What To Cut If Budget Drops: Gen. Murray

    11 juin 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Army Ponders What To Cut If Budget Drops: Gen. Murray

    The Army Futures commander is making a list of which of the service's 34 top-priority programs to sacrifice first – and which programs outside the top 34 he has to save. By SYDNEY J. FREEDBERG JR.on June 10, 2020 at 4:18 PM WASHINGTON: The Army Secretary and Chief of Staff approved a draft spending plan for 2022-2026 yesterday that funds all 34 of the service's top-priority programs, the Army's modernization chief said this morning. But with the ever-growing cost of COVID looming over the economy and the Pentagon alike, Gen. John “Mike” Murray says he's already made a mental list of which of the 34 the service might have to slow down or sacrifice and which ones it absolutely has to save. “I have a one-to-N list in my mind” of the 34 programs, Murray told an Association of the US Army webcast this morning. “That's only in my mind, right now,” he emphasized. “It's pre-decisional.” In other words, it's not final, it's not official, and it's not ready to share with the public. All that said, however, it's still a telling sign of uncertain budget times that the four-star chief of Army Futures Command not only has such a list, but is willing to say he has it. Meanwhile, Murray's chief civilian partner, Assistant Secretary for Acquisition Bruce Jette, has launched a long-term study of the Army's economic prospects. In effect, Jette's looking at the supply side, asking how tight the budget will be, and Murray is looking at the demand side, asking what the Army should prioritize within that tight budget. Beyond The 34: “Critical Enablers” Gen. Murray is also looking at the Army's 684 other programs, he said, to determine which of them can be cut – while some have been slashed already to free up funding for the 34, others are so far unscathed – and which are essential to the top-34's success. “We can come up with, you know, the most impressive Next Generation Combat Vehicle in the world,” Murray said. “If you can't get fuel to it, then you're wasting your time.” Fuel is just one, particularly knotty logistical problem. Ultimately, Murray wants to reduce Army fuel demands by moving to hybrid diesel-electric motors. While electric power by itself might work for civilian cars, he said, he's skeptical the Army can charge batteries in combat, or that any practical amount of batteries can store enough energy to move, say, a 70-ton main battle tank. Likewise, while civilian quadcopters can run off batteries, the Army's new scout helicopter, the Future Attack Reconnaissance Aircraft, requires a high-powered turbine. So for decades to come, the Army will need fuel trucks, storage bladders, pumps, drums, hoses, and so on. And that's just for the gas. Both current and future combat systems require a staggering array of spare parts, repair tools, maintenance facilities, and more. Logistics is historically a US strength, but it's not a major focus of the 34 priority programs, which range from hypersonic missiles to smart rifles, from tanks to aircraft to robots. Besides weapons, the 34 do include a lot of high-tech information-age infrastructure, both to train the troops in virtual and augmented reality, and to share tactical data like target locations across the battlefield. There has not, however, been nearly as much emphasis on supporting functions such as fuel, maintenance, and transport. Murray now aims to fix that. Starting with a study by the Combined Arms Center at Fort Leavenworth, he said, the Army has come up with a list of “18 key critical enablers that are getting funded,” Murray said, again without naming them. Murray's calling the 34 priority programs “Tier One” and the 18 enablers “Tier Two,” he said. “Then tier three is ammo,” he added. The general didn't elaborate, but certainly a high-tech tank or aircraft can't fight without ammunition, just as it can't move without fuel. The catch is that, in modern warfare, you're not just buying rifle bullets and cannon shells, but a host of precision-guided munitions that are much more expensive to stockpile in bulk for a major war. Even once the Army has figured out which weapons, support systems, and ammunition it can afford to buy, it still won't be able to buy enough of them to equip every unit at once. The service's recent AimPoint study, Murray said, focused on figuring out which units around the world need to be modernized first and which will have to wait. “The whole point behind AimPoint was an understanding that you can't modernize the entire army overnight, or in a year, or really even in a decade,” Murray said. As a young officer, he recalled, his unit had M60 tanks and M113 transports “while the rest of the Army was running around in M1s and Bradleys.” While he doesn't to return to the extreme disparities of the past, he said, “somebody has to be first and somebody has to be last.” https://breakingdefense.com/2020/06/army-ponders-what-to-cut-if-budget-drops-gen-murray/

Toutes les nouvelles