Narada, T.
(2007). Information Access Policy
for TSA
Personnel. Retrieved
July 19, 2007, from the
Government Accountability Office. http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_tsasida.pdf
Revisiting SIDA: The Collection and Protection of Vital
Information DEFINITIONS What an
Access Policy is not… Gathering
data is not the act of accessing it. Safeguarding
data is not the act of gathering
it. Accessing information represents the
third member of a data triune that enables movement between users and
retrieval
systems. Throughout this paper, you will
read certain words: Data
Set – is metadata derived from any activity through
observation or analysis. Data
Users – are granted access to a Data Set. Data
Set Creator – is someone who authors or
produces a Data Set Data
Set Owner – holds the intellectual property
rights to a given dataset. Data
Set Distributor - individual or institution
providing access to the Data Sets. Data
Set Contact - party designated in the
accompanying metadata of the Data Set as the primary contact for the
Data Set. PURPOSE Because
TSA exists implicitly for the safety of passengers,
TSA and the public are intrinsically involved, more so than any other
branch of
government. We know where you live. WHAT
IS THE SCOPE OF ACCESS POLICY TSA
access policy covers Routine and Specific data uses
from system-wide to highly guarded. A
lot of public information is, ironically, already publicly accessible –
most
people just don’t know that. BACKGROUND Following
the events of September 11, 2001, and in
accordance with the Aviation and Transportation Security Act, TSA took
action
to enhance passenger prescreening operations. In March 2003, TSA began
developing a new Computer-Assisted Passenger Prescreening System, known
as
CAPPS II, as a means of enhancing security through passenger
prescreening.
However, following our review of this program in February 2004, and a
DHS
internal review, DHS canceled CAPPS II’s
development
in August 2004, due in part to concerns about privacy issues. REVISION
HISTORY Electronic
Archives Are: Publicly
accessible Permanent
Searchable
Why
Public Access? Archive -
A central archive
of NIH-funded research publications preserves these vital published
research
findings for years to come. Advance
Science - The
repository is an information resource for scientists to mine more
easily
medical research publications and for NIH to manage better its entire
research
investment. Access -
The policy
provides patients, families, health professionals, scientists,
teachers, and
others electronic access to research publications resulting from
NIH-funded
research. Authors
and journals can
continue to assert copyright in scientific publications resulting from
NIH-funding, in accordance with current practice. While
individual copyright
arrangements can take many forms, NIH encourages investigators to sign
agreements
that specifically allow the manuscript to be deposited with NIH for
public
posting on PubMed Central. Ensuring
access to the full
text of NIH-funded research publications will improve the public's
understanding and appreciation of biomedical research findings. Enhanced
access to
information strengthens and expands the impact of research while
disseminating
results in a timelier manner. The online archive will increase the
public's
access to health-related publications at a time when demand for such
information is on a steady rise. This
system also
facilitates the creation of an end-to-end, paperless grants management
process. Data There are
two data types: Type I –
data are to be
released to the general public according to the terms of the general
data use
agreement (see Section 3 below) within 2 years from collection and no
later
than the publication of the main findings from the dataset and, Type II -
data are to be
released to restricted audiences according to terms specified by the
owners of
the data. Type II data are considered to be exceptional and should be
rare in
occurrence. Researchers
that make use
of Type II Data may be subject to additional restrictions to protect
any
applicable commercial or confidentiality interests. Finally,
some data may be
determined of lowest priority for archiving on the grounds that they
are
interim data that led to final products that carry the scientific
value. These
might include data files created during stages within an analytic
workflow, raw
or replicate data values that were subsequently aggregated or processed
for
release, or individual outputs from stochastic models. Metadata Metadata
documenting
archived/online data sets of all types listed above will be made
available
when, or before, the dataset itself is released according to the terms
above. All
metadata will be
publicly available regardless of any restrictions on access to the
data. All
metadata will follow
LTER recommended standards and will minimally contain adequate
information on
proper citation, access, contact information, and discovery. Complete
information
including methods, structure, semantics, and quality control/assurance
is
expected for most datasets and is strongly encouraged. LTER
Network Data Access
Requirements The
access to all LTER data
is subject to requirements set forth by this policy document to enable
data
providers to track usage, evaluate its impact in the community, and
confirm
users' acceptance of the terms of acceptable use. These requirements
are
standardized across the LTER Network to provide contractual exchange of
data
between Site Data Providers, Network Data Providers, and Data Users
that can be
encoded into electronic form and exchanged between computers. This will
allow
direct access to data via a common portal once these requirements have
been
fulfilled. The
following information
may be required directly or by proxy prior to the transference of any
data
object: Registration Acceptance
of the General Public Use Agreement or Restricted Data Use Agreement,
as
applicable. A
Statement of Intended Use
that is compliant with the above agreements. Such statements may be
made
submitted explicitly or made implicitly via the data access portal
interface.
Data Use
Agreements Datasets
released by LTER sites or the network will be accompanied with a use
agreement
that specifies the conditions for data use. For Type
I data, this shall
be the General Data Use Agreement (see appendix II). This document
specifies
general roles and the obligations and rights enjoyed by each regarding
the use
of most dataset released for general public use. For Type II datasets,
a
Restricted Data Use Agreement must be provided with the dataset that
identifies
the specific restrictions on the use of the data and their
justification. Because
these are expected
to be unique to the dataset, no template is provided although in most
cases the
General Data Use Agreement can be modified to serve. Grounds
for restricting
data may include the need to restrict access to species, habitats or
cultural
resources protected by legislation; rights of privacy granted by human
subjects
legislation; or protection of intellectual, financial or legal rights
over the
data held by a third party. This
policy becomes
effective when approved by the LTER Network Coordinating Committee. It
may be
revised by, or at the request of, the same body. Conditions
of Use 1.
Acceptable use – is restricted
to a forum for which the data was created: Academic, research,
educational,
government, recreational or other not-for-profit professional purposes. Any other
use requires the explicit
permission from dataset owner. 2.
Redistribution – a metadata
license must accompany all copies. The
Data User will not redistribute the original Data Set beyond this
collaboration
sphere. 3.
Citation – it is a
matter of professional ethics to acknowledge the work of an author. [Creator,
Year of Data
Publication, Title of Dataset, Publisher, Dataset identifier] 4.
Acknowledgement – of institutional
support or specific funding awards. 5.
Notification – includes an
explanation of how the Data Set was used to produce the derived work. 6.
Collaboration – when
someone uses a dataset, that person becomes responsible per se. Remote
Access Policy
helps to mitigate dangers The
policy should address: - How
decisions are made as
to which employees are eligible for telecommuting assignments and
remote access
privileges. - What
behavior constitutes
acceptable use of remote access connections. -
Acknowledgement that any
organization equipment provided to employees remains the organization's
property. -
Potential penalties
resulting from violations of the organization's remote access policy. Data
Access Policy Guidelines The
Chief [data] Stewards
assign data stewardship responsibilities, manage data
subsets and appoint Data Coordinators to assist with data
classification. Data
Coordinators grant access
to the data within their purview
according to criteria defined for specific access requirements. Data
Administrators will
maintain electronic archives of all requests,
serve as the point of contact for audit reviews
and maintain a repository of information classified by properly
credentialed Stewards,
Coordinators and authorized contributors. Employee
Access to
Organizational Data Employee
Internet Access
Policy or an Acceptable Use Policy INTERNET
ACCEPTABLE USE POLICY Internet
access or acceptable use policies are usually
designed to prevent encounters with questionable or potentially
offensive
documents, graphics and so forth, in the workplace. The idea is to draw
boundaries on the limits of what users may view or read while in the
workplace,
so as to prevent possible perceptions of or accusations regarding
creation of a
hostile or negative work environment. Most
companies deploy firewall filters that block known sources of
questionable
content and use policy to warn users in advance to stay away from other
examples of such information that might escape filters. TSA’s COMPUTER ACCESS AGREEMENT 1.
Classified Processing – is
conducted only on equipment specifically designated per se. 2.
Credential Protection – passwords
have one upper & lower alpha + 1 no. + 1 special. 3. User
Accounts – Each
user is responsible for their account activity. 4. Data
Protection – protect
all data storage devices. 5.
Physical Security – government
property will not be removed. 6. E-mail
– is for official
TSA business only and is regarded no less official than hardcopy. 7.
Internet Use – is
limited to official TSA business. 8.
Unauthorized Software –
do not down/up load from the Internet or non-TSA media. 9.
Consent to
Monitor/Privacy – government may audit my computer use at any time. 10.
Protection of Displayed
Data – logoff computer when absent / password screensaver. 11.
Copyright Protection –
do not duplicate government software. 12.
Termination of Employment
– return all issued equipment to the government. CONCLUSION There
is an extremely critical flaw that the entire IT
world is ignoring. Somebody somewhere
came up with the idea that a data object in the digital world is as
tangible as
a paper object in the corporeal / physical world. Where
a paper object can be shredded and
incinerated, a data object does not just disappear.
In
much the same way that fingerprints will not be changed
once biometric access is perfected, The
policy should contain
information on access and acceptable use technology resources in your
agency. If you
already have a
policy in this area, please review it and make suggestions on updating
the
policy. Your
final paper should
consist of the policy and your justification(s) for the various
critical
elements of the policy. If you
critique your
existing policy, please show where and why you made changes. Remember
to use your
security assessment as a resource for the
policy! Here are
some examples of
access policies from other organizations:
We’ve heard, “What you don’t know can’t hurt you,” which may be true in those perspectives in which it applies. I’d like to recommend a prerequisite etiquette level or protocol in how information is disseminated based on local observations and comments by others. I think because the obvious can cause embarrassment, the issue is ignored. Almost any object of danger, this side of a rock, requires some kind of protocol training. Because ‘Knowledge is Power,’ there are those who can’t resist announcing to subordinates that they know something classified or confidential. Finally, someone in a room full of blank stares will ask, “OK. What it is?” The response is, “That’s on a need to know.” What doesn’t get said is, “OK then -- why did you bring it up?” Even more bluntly, “What sort of psychosis compels you to repeat this performance with or without being asked for details?” A non-verbal variety of the same absurdity is exemplified by someone who wears 5 SITA ID lanyards and 4 jump drives in plain view so that everyone will recognize just how important that person is. Nobody says anything about that either; perhaps there’s a plausible reason for parading SSI devices outside of a secure area: Imagine what could happen if a bad guy knocked one of those characters upside the head and made off with 4 jumpers and 5 SITA badges? I’ve had installation technicians get stuck and ask me for ideas. Privately, I’m thinking, “How did you manage to wrangle a ‘title of expertise’ that pays you three times what I make, so that I can solve your problem?” I would be very paranoid to take that kind of chance and I suppose that’s why I don’t claim any particular title. I have observed a quantum anomaly that coincides: “As income approaches infinity, relative usefulness reaches zero.” I’ve noticed that the non-operational side of many corporations develop their greatest assets on the golf course. They can’t give their producers a pay raise though. Sorry, I went off topic. The chart presented in the powerpoint presentation listed a 6-stage
cycle: External Monitoring – this
is how we
assess access attempts on our server / frontal / gate.
Next is Internal monitoring – My point isn’t to compare the different approaches that agencies take to safeguard information, but to address the criterion for possessing such information in the first place. If my other classmates also recognize this kind of behavior, then we could be exposing the most belligerent ‘weakest link’ in what otherwise should be a good information security plan. This is something that should be addressed before attempting to fortify a retrieval system. These are just my thoughts on the matter – feel free to modify and rearrange to taste. That is a rather exhaustive challenge: Investigation Analysis Logical Design Physical Design Implementation Maintenance But a lot of people make a lot of money to not know what they’re doing in this business. I would like to ask my classmates: Have any of you ever worked with IT personnel who knew less about what they were doing than you do? This happens to me on a routine basis…and I’m not soliciting. assess what attempts are made to slip data out the door within normal looking streams. That technique is how viruses migrate unless a filter can recognize a specific data strain. State 3 is Planning and Risk Management – that’s where we add detail to our model and assess what degree of risk is beyond our control? Beyond our Control represents anything unethical or accidental that ‘could’ happen. In those cases, although security has been breached, there is always the possibility that someone who acquires data doesn’t know what to do with it once they have it. Just because we have the launch manual to the space shuttle doesn’t mean that we can realistically launch the shuttle. Vulnerability Assessment and Remediation addresses every possible threat, real or imagined, and remedies those faults in practice. Readiness and Review is a tried and proven true method borrowed from the Military. If we can conceptualize every possible contingency and develop an effective response to those contingencies, we should stand the test of a real-world unauthorized access attempts. The last stage is Vulnerability Assessment which occurs any time a new breach is discovered or advisories forewarn of impending attacks from reliable sources. This is where we get as surgical and as specific as needed to protect aspects of the apparatus that are deemed most vulnerable. In theory: What remains is a fine tuned perfectly integrated security engine whose future faults can be intercepted and remedied before infecting protected data. My other extemporaneous comments can be considered fuel for the fire. =========== Part I http://www.sfaa.net/sfaagoal.html The society of Applied Anthropology does not seem to care whether it’s data is breached or not. I will hypothesize that entities unaffected by industrial espionage will possess a negligent or non-existent security aptitude. http://www.okc.gov/mission/index.html The City of http://www.citgo.com/AboutCITGO/VisionMissionValues.jsp CITGO – claims to be the world’s benchmark energy corporation and makes no mention of security. So far, I have sampled one academic, one government and one business concern that do not mention security in their respective mission, vision and values statements. For part II of the question, I will randomly select a company that MUST have information security concerns due to my claim in part I; that industrial espionage is a determining factor to include / not include security in a mission, vision and values statement. Boeing Aircraft is a DoD contractor and I could not even find a mission statement. http://www.microsoft.com/about/default.mspx#values The Microsoft Corporation did not mention security in their values statement. I checked Colt and Ruger firearms manufactures, for irony, and did not find vision, mission or values statements. I must revoke my hypothesis that entities with industrial espionage concerns will automatically address said awareness in their mission statements. Part III 1. Hackers penetrate T-mobile at http://www.securityfocus.com/news/10271 2. Credit Card breach exposes 40 Million accounts at http://news.com.com/Credit+card+breach+exposes+40+million+accounts/2100-1029_3-5751886.html 3. This one I thought was rather fascinating because
SANS
not only identifies the threats but identifies how the threat can be
corrected. It is said that memory
retention is much greater when you can “observing the process” rather
than read
about it. This provides a glimpse of the identify and correct process: http://www.sans.org/top20/
Security
Threat Assessment for SIDA and Sterile
Area Workers
The
Security Threat Assessment for ‘Security Identification
Display Area’ [SIDA] and Sterile Area Workers identify 13 components
for
handling sensitive employee data. The
need to safeguard private information is not questioned; however,
meaningful
information was occluded by redundancies in writing style.
Twelve separate sentences, each one containing
a single adjectival variance, could have been reshaped into one
intelligent sentence. This narrative seeks
to overcome that
encumbrance for faster understanding. l Vital
information is gathered by TSA on all interagency, air carrier and
airport
applicants by “named-based” and “biometric” means.
A SIDA badge must be visible in sterile
areas. l Biometric information i.e.
electronic fingerprints are submitted to the American Association of
Airport
Executives [AAAE] who acts as a single point of contact for TSA. A single agency maximizes efficiency,
expedites turn-around and eliminates the cumbersome procedural
variations that
existed when multiple formats were attempted.
TSA takes every precaution to protect vital information
from unauthorized use, hackers and malicious intent using a layered
security
approach. Vital information is shared
with DHS, intergovernmental agencies and contractors who by law, are
subject to
the Privacy Act. More exhaustive
treatment will follow in part II of this threat assessment.
The Homeland Security Act of 2002 authorized the
implementation of all possible means to prevent another 9/11. On March 1, 2003, the Act of 2002 was brought
to fruition when 180,000 employees representing 22 agencies integrated
under the
Department of Homeland Security [DHS]. The
Transportation Security Administration [TSA], a component of DHS, took
control
of 700+ security checkpoints and 7,000 baggage screening areas at
domestic shipping
ports, railways, boarders and airports. TSA
began screening 80% of US-bound cargo at more than 40
foreign ports.
Areas that require screening protocols to access
are
called ‘Sterile Areas.’ Persons allowed
to enter a sterile area unescorted wear a ‘Security Identification
Display
Area’ or SIDA badge. Persons without a
SIDA credential will undergo standard screening procedures per TSA SOP.
TSA gathers vital information on all interagency,
air carrier, rail, shipping port and
airport
applicants using a “named-based” and “biometric” validation process. The American Association of Airport
Executives [AAAE] consolidates information from the airlines / airports
and
provides it to TSA as the single point-of-contact.
TSA forwards the information to the FBI.
The FBI bumps the information against its
Criminal Justice Information System [CJIS] and return
the results back to TSA, who posts the results on a secure, password
protected
website. That information is shared with
intergovernmental agencies within DHS that have a need to know. Individuals who pass a
fingerprint-based
records check may be issued a Security Identification Display
Area [SIDA]
badge.
“Name Based” security threat assessments refer
known
terrorists, violent criminals and others listed on the “No Fly List”
for
further questioning. This check includes
an immigration status check. Flagged
applications
are forwarded to the most logical intelligence or law enforcement
agency for
review, who will in turn, advise TSA to
rescind or
permit an applicant to correct the questionable information. Applicants not flagged by this process are
approved
for a SIDA badge by their gaining agency.
l The information collected
in compliance with statutory mandate contains the applicant’s: Full
name,
aliases, date and place of birth, citizenship, immigration status,
gender and race,
height and weight, eye and hair color, fingerprints, social security
number and
employer’s name and address.
l Biometric capabilities
are being used at ports of entry at land, air, and sea. By
checking finger scans, someone’s identity
can be confirmed against a passport, watch list and immigration record. Electronic fingerprints are submitted to the
FBI’s networked law enforcement database, ‘Fingerprint Results
Distribution’ [FPRD]
to authenticate new hire applications and alert authorities to
falsified,
misrepresented or incomplete data. TSA
shares this information with AAAE who overseas the quality control
procedures
used at airports by air carriers and AAAE members.
TSA and AAAE have a synergetic relationship
that maximizes turn-around time where previously multiple formats
created cumbersome
delays. AAAE can also convert paper
fingerprints into an electronic format when a member-employer does not
have the
means to do so.
TSA retains rap sheet information at the FBI’s FRPD
website for up to sixty days in the event that an employee’s
credentials fall
into question and require adjudication. This
affords the affected employee to seek redress and
appeal. This precautionary measure also
facilitates
airport and airline auditing. Files on
individuals who no longer possess SIDA credentials are purged. If an individual applying for a credential
disputes the disposition of a charge, the applicant can provide court
documentation to his or her employer’s security office. If
new evidence proves that the charge does
not fall under a disqualifying category; the employee will be granted a
credential provided that the FBI can verify with NCIC that both records
match. Immigrations issues will be
referred to ICE.
DHS contractors also hold appropriate facility security
clearances.
l New
technology helps to minimize the damage from possible future
terrorist
attacks. Improvements in border
security, explosives detection, consumables and public perception aid
incident
management teams. Improved radiation
detection monitors screen cargo for radiological and nuclear threats.
l SIDA and Sterile Area Workers
are provided with a Privacy Act notice that describes the
authority and purpose
for collecting personal data and how biographic and biometric data will
be
used. TSA’s method of personal information collection does NOT create a
‘new’
system of records. TSA’s
data collection method does facilitate the
performance of background investigations to ensure transportation
security.
l TSA protects data against
unauthorized intrusion using a layered security approach. This approach combines advanced encryption
technology, password-protection, network firewalls and hard-bolting
retrieval
systems and workstations so that they can not be casually removed
without a
colleague noticing. There will be
limitations on data tracking and greater training on telecommunications
security. ‘Physical’ security
layers include screening cargo at land, sea and air ports, swabbing
luggage for
traces of explosives, tracking border activity with cameras, posting
armed / unarmed
guards where necessary and implementing credential card readers for
sterile
area access. Some persons have
legitimate limited access to databases and / or workstations but should
not be
left unattended.
Each new innovation and security layer helps to minimize
the risk
of a terror attack. Positives: Implementation of more BDO’s to screen new hires. Precognitive interdiction
techniques by it’s many names. |