US Spy Agencies Will Analyse Insider-Threats

A US spy agency plans to identify people within the organization likely to abuse their access privileges by analysing pieces of text.

The National Geospatial-Intelligence Agency is investing in “sentiment analysis” technology, which generally works by parsing text and categorising its author’s sentiment as positive, negative or neutral. NGA intends to sole-source an award for a 1-year pilot to WT Government Services, which sells such a system called SCOUT Tool.

The pilot, to be operated by NGA’s Security and Installations Directorate Insider Threat Office, Behavioral Science and Engineering Divisions, is supposed to help the agency identify insider threats, according to a notice on FedBizOpps. WT Government Services is the only vendor who can modify its configuration, the posting said. 

NGA plans to issue the firm fixed-price contract to the small business on September 19th. Anyone who works on the project needs to have a top secret security clearance, the posting said. 

If NGA finds that sentiment analysis technology helps it identify insider threats, it intends to “conduct a full and open competition for future support,” the posting said.

This isn’t NGA’s first foray into sentiment analysis. Recently, the agency began gathering information about how the technology could be used to measure how effective its public relations efforts are, including speaker programs and media engagements, in changing public perception about the agency, a FedBizOpps posting earlier this summer said. 

That agency’s Office of Corporate Communication is working on an “aggressive campaign” to raise NGA’s profile especially among recruits, college students and private industry. A contractor on that program would need to create a dashboard measuring the efficacy of NGA’s communication programs and find areas for improvement, the posting said. 

DefenseOne

 

« Obama Warns Of Russian Cyber Warfare Threat
Mass Surveillance: Cuba Filters Text Messages »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Wynyard Group

Wynyard Group

Wynyard Group is a niche, technology-driven company specializing in Integrated Border Security solutions for enhanced public safety.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.