How does the CIA keep its IT staff honest?

A look behind the CIA's networks

Be prepared to go through a lot of scrutiny if you want to work in the Central Intelligence Agency's IT department, says chief information officer Al Tarasiuk.

And it doesn't stop after you get your top secret clearance. "Once you're in, there are frequent reinvestigations, but it's just part of process here," says Tarasiuk, who also gets polygraphed regularly, though he won't be more specific.

For those senior IT managers who are the "privileged users," meaning system administrators, "there is certainly more scrutiny on you," Tarasiuk says. "It's interesting: there's so much scrutiny that a normal person might not want to put up with that. But it's part of the mission."

There's so much top secret information contained within the CIA's systems that IT plays a key infosecurity role in making sure that CIA employees are not doing anything nefarious. There's also the persistent threat of foreign government intelligence agencies trying to break into the CIA's networks and databases.

"We have a counterintelligence centre that helps us with that," Tarasiuk says. "They are very concerned about foreign intelligence services that are interested in penetrating the CIA. Because of that we pay particular attention to the kinds of things we put on our network."

The CIA's networks aren't directly connected to the internet. "We have a very closed network that's connected to an intelligence community enterprise," Tarasiuk says, "so I don't necessarily have the worries about the hackers from the internet trying to break through."

What he does have to be concerned with is those who are allowed on the CIA's networks: whether it's a simple computing oversight by a CIA analyst or a disgruntled spy intent on selling top secret intel to Chinese government officials. "Anyone who logs into any one of our systems knows they are being audited, and we look for anomalies," he says. "We always have some worries about a rogue person on a network doing this. But we can catch them."

So you have caught people? "We catch people getting into places they shouldn't go, from time to time," Tarasiuk responds.

When asked about the fact that human beings are typically the weakest link in any IT system, Tarasiuk concurs. "Nothing's perfect. The system's not perfect," he says. "Some of [the infosec alerts] might be legitimate results of why they are doing it; some might be false positives. But for the most part we feel very strongly that we can detect when someone is doing something of a malicious nature."

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cia

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Thomas Wailgum

Computerworld
Show Comments

Essentials

Mobile

Exec

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Aysha Strobbe

Microsoft Office 365/HP Spectre x360

Microsoft Office continues to make a student’s life that little bit easier by offering reliable, easy to use, time-saving functionality, while continuing to develop new features that further enhance what is already a formidable collection of applications

Michael Hargreaves

Microsoft Office 365/Dell XPS 15 2-in-1

I’d recommend a Dell XPS 15 2-in-1 and the new Windows 10 to anyone who needs to get serious work done (before you kick back on your couch with your favourite Netflix show.)

Maryellen Rose George

Brother PT-P750W

It’s useful for office tasks as well as pragmatic labelling of equipment and storage – just don’t get too excited and label everything in sight!

Cathy Giles

Brother MFC-L8900CDW

The Brother MFC-L8900CDW is an absolute stand out. I struggle to fault it.

Luke Hill

MSI GT75 TITAN

I need power and lots of it. As a Front End Web developer anything less just won’t cut it which is why the MSI GT75 is an outstanding laptop for me. It’s a sleek and futuristic looking, high quality, beast that has a touch of sci-fi flare about it.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?