1 Counterintelligence & The Insider Threat An Enterprise Operations Counterintelligence Presentation Presented by: Ralph Butler SSC Counterintelligence.

Slides:



Advertisements
Similar presentations
Trustworthy: to have belief or confidence in the honesty, goodness, skill or safety of a person, organization or thing.
Advertisements

Adverse Information Adverse Information:
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
EFFECTIVE DOCUMENTATION In Search of Improved Performance.
Values & Ethics in Business X420 Discussion Session #80 Kelley School of Business.
Workplace Bullying and Harassment Training and Legal Duties [Insert Presenter Name] [Company Name] [Date]
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
By: Clare Dewan and Associates This presentation is subject to copyright and is not to be reproduced except by express permission.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Approvals 1. 2 Chg #DateChangeSlide #Completed ByReason 18/9/2013From G Washington to B Arnold12Chris OWrong threat profile.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Security from the Inside Michael Tillison Senior Vice President ManTech International Corp.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Recruitment and Retention in Front-line Services: the case of childcare Mark Smith, Marilyn Carroll, Gwen Oliver University of Manchester.
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
Espionage Indicators Briefing 1 U.S. Department of Commerce
ETHICS IN THE WORKPLACE
We are what we repeatedly do. Excellence, therefore, is not an act but a habit Aristotle We are still masters of our fate. We are still captains of.
Network security policy: best practices
WORKPLACE BULLYING & HARASSMENT TRAINING PRESENTATION 1 BENEFITS As workplace bullying, harassment and violence have become more common, the OHS laws have.
Termination Process Team 1: Anuj Kumar Agrawal Mohaammed Al-baqmi
STRESS MANAGEMENT TRiO Workshop Fall What is Stress?  Stress can be defined as our mental, physical, emotional, and behavioral reactions to any.
NSF Cyber Security Conference FBI Counterintelligence Domain Program Briefing.
Behavior Based Safety & Safety Observations
Security Education and Awareness Security 101 February 28, 2007 JSAC.
A Leader’s Guide to Promoting a Safer Work Environment © 2009 Magellan Health, Inc.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
1 CREATING A LEARNING ORGANIZATION AND AN ETHICAL ORGANIZATION STRATEGIC MANAGEMENT BUAD 4980.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Counterintelligence Briefings for Foreign Travelers September 26, 2012
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
What is it?? How can I build it? What can impede resilience? Poulsbo Middle School Building Resilience.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
2010 Pherson Associates, LLC Proprietary 1. PHERSON ASSOCIATES IS LOCATED IN RESTON, VIRGINIA AND IS HOME TO “THE FORUM”, A STATE-OF-THE-ART TRAINING.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Are your interpersonal skills well developed?. Objectives Examine interpersonal skills in the context of entrepreneurial behaviors Explore the impact.
BUILDING SOLUTIONS TO PREVENT DOMESTIC VIOLENCE Dennis Butler, SPHR VP, Workplace Solutions Liz Claiborne Inc.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
DEFENSE SECURITY SERVICE DSS Role in International Security.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
07/02/2013. Points to consider The Strategic importance of Managing HR Gaining and sustaining a competitive advantage A Framework for managing HR The.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
A Piece of Cake.  What is a security clearance?  A security clearance is a determination by the United States government that a person or company is.
© 2011 Delmar, Cengage Learning Part IV Control Processes in Police Management Chapter 12 Control and Productivity in the Police Setting.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
ETHICS IN THE WORKPLACE
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
INTERNAL CONTROLS What are they? Why should I care?
A Leader’s Attitude Elisabeth thinks highly of her organization and team members. She is so enthusiastic, and solutions-oriented, that everyone enjoys.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Insider Threat. CSCE Farkas2 Reading List The National Infrastructure Advisory Council’s (NIAC) Final Report and Recommendation on the Insider Threat.
AREA REP SUPPORT SKILLS B. This training follows Skill Building A Area Reps will continue with advanced trainings Area Reps will join monthly support.
In support of the National Industrial Security Program (NISP) Presenter: Kenneth McKnight, FSO Presentation Date: May 2016.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Substance Abuse in the Workplace: Supervisory Training FIRSTCALL presents:
LEADERSHIP, INFLUENCE, AND COMMUNICATION IN BUSINESS.
Insider Threat Awareness
Aloka Krishnan Chandran Mudhliar John Cann Nihar Sanghvi
Ethical Decision Making and Ethical Leadership
INSIDER THREAT AWARENESS
Cybersecurity Awareness
Interpersonal Communications in Job Hunting--Chapter 13
ETHICS IN THE WORKPLACE
Detecting Insider Threats: Actions Speak Louder than Words
Organizational Behavior and Human Resource Management
Presentation transcript:

1 Counterintelligence & The Insider Threat An Enterprise Operations Counterintelligence Presentation Presented by: Ralph Butler SSC Counterintelligence Lead

2 Overview Understanding the Insider Threat Insider Threat Trends Insider Threat Program

3 Understanding the Insider Threat

4 Define the Insider Authorized people using their trusted access to do unauthorized things Threat actors vs. threats Boils down to actors with some level of legitimate access, and with some level of organizational trust Inadvertent or Malicious Insiders

5 Robert Hanssen – FBI Spied for Russian Intel Aldrich Ames – CIA Spied for KGB Paid $4.6 million Felt CIA superiors failed to see his talent Motivation Money Disgruntled Ego Felt the FBI didn't appreciate his brilliance, his ability and his skills Did not get promotions they felt they deserved

6 Glenn Shriver Recruited by China Studied at East China Normal University in Shanghai Paid 10k and 20k for taking the Foreign Service Exam, and finally 40k to apply with the CIA Responds to an ad to write a political paper in for $120 Lied on his security clearance paperwork and failed his pre- employment polygraph

7 Pvt. Bradley Manning U.S. Army “I’m not a source for you….I’m talking to you as someone who needs moral and emotional support” “I was actively involved in something that I was completely against” “Hopefully this will lead to worldwide discussion, debates, and reforms. If not, than we’re doomed as a species”

8 Edward Snowden CIA/NSA “I don’t want to live in a society that does these sort of things” (Surveillance on its citizens) “I’m neither a traitor nor hero. I’m an American” “I have no intention of hiding who I am because I know I have done nothing wrong”

9 Psychosocial Indicators Disgruntlement Responds poorly to criticism Inappropriate response to and/or inability to cope with stress at work Sudden change in work performance Disgruntlement Responds poorly to criticism Inappropriate response to and/or inability to cope with stress at work Sudden change in work performance Ego Domineering Harassment Argumentative Superiority complex Selfish Manipulative Rules do not apply Poor teamwork Irritability Threatening Retaliatory behavior Ego Domineering Harassment Argumentative Superiority complex Selfish Manipulative Rules do not apply Poor teamwork Irritability Threatening Retaliatory behavior Emotional Change in beliefs Unusual level of pessimism Unusual level of sadness Difficulty controlling emotions Emotional Change in beliefs Unusual level of pessimism Unusual level of sadness Difficulty controlling emotions Relationship/Financial Problems Divorce Marriage problems Stress at home Financial problems Inappropriate response to and/or inability to cope with stress at home Unexplained change in financial status Irresponsibility Selfish Relationship/Financial Problems Divorce Marriage problems Stress at home Financial problems Inappropriate response to and/or inability to cope with stress at home Unexplained change in financial status Irresponsibility Selfish

10 Potential Risk Indicators Attempts to bypass security controls Request for clearance or higher level access Unjustified work pattern Chronic violation of organization policies Decline in work performance Irresponsible social media habits Unexplained sudden affluence Outward expression of conflicting loyalties Unreported foreign contacts / foreign travel (when required) Maintains access to sensitive data after termination notice Visible disgruntlement towards employer Use of unauthorized digital external storage devices

11 Insider Threat Trends

12 Perspective Change “Espionage used to be a problem for the FBI, CIA and military, but now it's a problem for corporations…” - Joel Brenner, National Counterintelligence Executive, 2008 Courtesy CI CENTRE & SPYpedia

13 Steady Upward Trend 32% of all espionage arrests since 1945 have occurred in the last 5 years (FBI) 54% of all individuals involved with compromise of classified or proprietary information were employed in Private Sector (FBI) Industry SCRs up 600% from 2009 (DSS) –76% increase in SCRs evaluated “of CI interest” by DSS from 2010 to 2012 IIRs from Industry reporting up 500% from 2009 (DSS) USG Investigations & Operations predicated on Industry reporting up over 1000% from 2009 (DSS) Courtesy:; CI CENTRE & SPYPEDIA; CERT; DSS;

14 When Does it Happen? 59% of employees leaving a company admit to taking proprietary information with them (FBI) Out of 800 adjudicated insider threat cases, an overwhelming majority of subjects took the information within last 30 days of employment (CERT; Carnegie Mellon) 60% of cases were individuals who had worked for the organization for less than 5 years (CPNI) Majority of acts were carried out by staff (88%); 7% were contractors and 5% temporary staff (CPNI) Courtesy

15 Insider Threat Program

16 What is the most common way that spies within the U.S. Government and U.S. cleared defense contractors are detected and caught? A: Routine counterintelligence monitoring B: Tip from friend, family, co-worker C: Their own mistakes D: Reporting by U.S. sources within foreign intelligence services How to Catch a Spy? Answer: D – There is no loyalty in the spy business, and intelligence officers who have been recruited as sources by the U.S. Intelligence Community eagerly betray the U.S. persons who have given them information

17 Insider Threat Program All government agencies will have an insider threat detection and prevention program Designate Insider Threat “Senior Official” –Training Senior Official Cleared Employee – –Within first 30-days (New Employee Orientation briefing) – –Annually thereafter System to maintain training records NISPOM Conforming Change 2 Executive Order 13587

18 What are we doing? Invested in a dedicated CI program –Established Office of Counterintelligence Operations (OCIO) in 2011 –Designated CI Representatives in each business area OCIO Representation at DSS –Full Time analyst support –Access to timely and relevant threat data Increased CI emphasis within known target areas –CI in Contracts / Supply Chain Risk Analysis and Mitigation System (RAMS) What is the single greatest factor?

19 CI Awareness The Employee Mindset –Co-workers of former spies often knew something was “wrong,” but didn’t report the behavior for many reasons People don’t like to “tattle” It is common to doubt yourself and your intuitions It is common to deflect responsibility It seems too personal - We don’t understand how certain behaviors are tied to espionage Don’t miss the obvious signs!!!

20 What Can You Do? Help Me Justify My Paranoia

21 Our Challenging Equation “1 in 1,000 persons in a position of trust are eligible targets for recruitment” Bruce Held, Director of Intelligence and Counterintelligence for the Department of Energy and 25 year CIA veteran Education: Consider the Operator

22 Summary The insider threat is real and dramatically increasing The threat has shifted from government to industry Establish a solid CI program with emphasis on the insider threat Detection of insider threats has to use behavioral based techniques Employee’s are in the best position to observe potential risk indicators

23 Contact Info Ralph Butler Space Systems Company Counterintelligence Lead