Visitors Now:
Total Visits:
Total Stories:
Profile image
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

TSA Reissues Order For Software To Spy On Employees’ Communications

Wednesday, November 21, 2012 10:40
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Steve Watson
Infowars.com
Nov 21, 2012

The TSA has reissued a purchase order for a contractor to develop spyware that will enable the agency to actively spy on its own employees without them knowing or consenting.

The agency has reworded the order, however, seemingly in a response to the fact that vendors were unhappy with the “insider threat” term used in the original. The move also serves as a way of circumventing a congressional demand that the TSA immediately cease all attempts to acquire such technology.

When the order was originally issued back in June, many believed that it represented a push by the TSA to crack down on leaks from potential whistle-blowers on the inside of the agency.

It asked a contractor to develop software that was capable of monitoring the emails, the web browser history, and even the keystrokes of TSA employees. It also required the ability to track the movement of documents and feed all the information through a central command center.

Nextgov.com reports:

“…the feedback from vendors suggested that the language in the request was too narrow in scope, an agency official told Nextgov. The official acknowledged that TSA is re-soliciting industry with no changes to the technical requirements.”

The new write-up reads: “The scope of this procurement is an enterprise solution to host-based monitoring and the collection of digital forensics information. The information assurance and cybersecurity division /focused operations branch supports areas of cyber threats and digital forensics. FO is seeking an enterprise technology that will automate enterprisewide host-based monitoring.”

The old scope read: “Focused operations is in need of a tool to help detect an insider threat. The focus is to monitor at the host level. FO has determined that the best method to monitor and detect insider threats is at the user host level. The scope of this procurement is an enterprise insider threat software package. In order to detect an insider threat, technology is required to monitor and obtain visibility into users’ actions.”

Both the original and the new order state that “The end user must not have the ability to detect this technology,” and should not be able “to kill the process.”

In other words, the agency does not want its employees to know they are being watched. The clear goal is to prevent leaks by whistle-blowers to anti-secrecy organizations such as wikileaks.

The TSA’s move to reissue the order comes in the wake of a DHS inspector general report, released in September, that concluded that the although the TSA has created an Insider Threat Working Group, and an Insider Threat Section, the agency does not have adequate countermeasures in place against potential information leaks.

The report recommended that the TSA should actively train all of it’s staff on data protection and “implement insider threat policies”.

 

Read more from this article:  http://www.infowars.com/tsa-reissues-order-for-software-to-spy-on-employees-communications/

 

For more articles check out:  http://www.designed-perception.com/in-the-news.html

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.