Air Force

November 1, 2013

Hagel: New Protections Needed for Unclassified Data

American Forces Press Service

WASHINGTON, D.C. Defense Secretary Chuck Hagel recently directed that DOD organizations take additional steps to ensure unclassified controlled technical information is protected from cyber intrusions.

“Stolen data provides potential adversaries extraordinary insight into the United States’ defense and industrial capabilities and allows them to save time and expense in developing similar capabilities,” Hagel said in a memo dated Oct. 10.

“Protection of this data is a high priority for the department and is critical to preserving the intellectual property and competitive capabilities of our national industrial base and the technological superiority of our fielded military systems,” he added.

As the world has become increasingly dependent on electronic data, traditional physical security concepts are no longer valid, said Jennifer Elzea, a Defense Department spokesperson.

“The opportunity to gain access to sensitive unclassified information is simply too unconstrained, and we must rethink how we safeguard our technical information,” she said.

Unclassified controlled technical data losses have become a major problem for the nation and its industrial base, Elzea said. And the problem is getting worse. Data and intellectual property concerning defense systems requirements, concepts of operations, technologies, designs, engineering, systems production and component manufacturing are all being targeted, she said. While the information is unclassified, its loss still represents a significant threat to national security.

“The department must be sure that unclassified controlled technical information is protected from network intrusion and that any consequences associated with loss of this information are assessed and minimized,” Elzea said.

To that end, the secretary directed that the offices of the undersecretaries of defense for acquisition, technology and logistics, policy, intelligence, and the DOD chief information officer work together to develop any necessary changes to policy, guidance and rulemaking activities to improve the protection of unclassified controlled technical information that resides on or passes through defense contractor systems or networks.

DOD also has proposed an amendment to its acquisition and contracting regulations, Elzea said. The amendment will add language to defense contracts requiring contractors to incorporate established security standards on their networks, and to report cyber-intrusions that result in the loss of unclassified controlled technical information.

The change is part of the effort to balance the cost of increased protection with the ability to conduct business operations at an unclassified level, she noted. The department must be able to safely operate at that level.

Other actions directed in the memo include the establishment of a joint analysis cell to assess losses of technical information. The cell, to be led by the undersecretary of defense for acquisition, technology and logistics, will determine the consequences of those losses and develop necessary responses.

In addition, Hagel directed the military departments to identify critical acquisition and technology programs that require additional protection. This process will include a review of the classification guidance for those programs.

Finally, the DOD CIO, the National Security Agency and the Defense Information Systems Agency will continue to identify the technical standards needed to protect unclassified information in the Joint Information Environment.

“The Department of Defense is committed to protecting our unclassified controlled technical information against the threat of cyber intrusions that target the department and our industrial base,” the defense secretary said.

“These actions will ensure that the department provides a cohesive, comprehensive and cost-effective approach to protect priority investments and future defense capabilities while maintaining efficient business operations with our industrial partners,” he added.




All of this week's top headlines to your email every Friday.


 
 

 
U.S. Air Force photo/Senior Airman Russell S. McMillan

Commander shows off Team March at Capitol Hill

U.S. Air Force photo/Senior Airman Russell S. McMillan (From left to right) U.S. Rep. Mark Takano, who represents the 41st District of California, and Julia Steinberger, senior legislative assistant to Takano’s office, discus...
 
 
U.S. Air Force photo/Master Sgt. Megan Crusher

Yellow Ribbon program supports Airman inspired by family history

U.S. Air Force photo/Master Sgt. Megan Crusher Almira Pasic and her youngest son, Memsudin, participate in an activity during the Warrior Support Forum, at a Yellow Ribbon Reintegration Program, held in Chandler, Ariz., July 26...
 
 
Courtesy photo

Through the glass: Veteran remembers his past

Courtesy photo Retired Lt. Col. Bruce Sooy receives a demonstration flight at Nut Tree Airport, Calif., July 2015. It had been 56 years since he had last flown an aircraft. (This feature is part of the “Through Airmen’s Eye...
 

 
Brigade3

News from the 304th Sustainment Brigade’s Facebook page

Army Reserve Pvt. 2nd Class Kiet Duong, a culinary specialist with the 387th, sifts flour through a sieve during the competition. Duong, a Garden Grove, Calif., native, used the flour in the baked wheat rolls and Boston cream c...
 
 
Courtesy photo of Marine Maj. Bridget Guerrero (ret.)

Marine vet honors fallen female troops with 160-mile run

Courtesy photo of Marine Maj. Bridget Guerrero (ret.) Marine Maj. Bridget Guerrero (ret.) ran 160 miles around the Puget Sound in Washington from July 23-26, 2015. Each mile represented a female service member who lost her life...
 
 
150725-F-RK887-023

Swarz assumes command of 452nd Security Forces Squadron

The 452nd Security Forces Squadron held an Assumption of Command ceremony at the Cultural Resource Center here on Saturday, July 25, 2015. During the ceremony Lt. Col. Arthur J. Rodi, deputy commander, 452nd Mission Support Gro...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>