11 May 2014
Insider Threat Warfare Prospects
This traces the rise of global insider threat warfare prospects generated
by unauthorized disclosures. This rise among global governments indicates
that unauthorized disclosures, especially online, by insiders and their media
outlets, are considered to be espionage and thereby subject to prosecution
and punishment as harmful to national security.
In preparation (contributions welcome -- cryptome[at]earthink.net:
Part 1: US Governmental
Part 2: Commercial
Part 3: Academic
Part 4: NGO
Part 5: Social Media
Part 6: Wild Cards
Part 7: Other Governmental
Part 1: US Governmental
http://www.whitehouse.gov/the-press-office/2012/11/21/presidential-memorandum-national-insider-threat-policy-and-minimum-stand
The White House
Office of the Press Secretary
For Immediate Release
November 21, 2012
Presidential Memorandum -- National Insider Threat Policy and Minimum Standards
for Executive Branch Insider Threat Programs
MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES
SUBJECT: National Insider Threat Policy and Minimum Standards for Executive
Branch Insider Threat Programs
This Presidential Memorandum transmits the National Insider Threat Policy
and Minimum Standards for Executive Branch Insider Threat Programs (Minimum
Standards) to provide direction and guidance to promote the development of
effective insider threat programs within departments and agencies to deter,
detect, and mitigate actions by employees who may represent a threat to national
security. These threats encompass potential espionage, violent acts against
the Government or the Nation, and unauthorized disclosure of classified
information, including the vast amounts of classified data available on
interconnected United States Government computer networks and systems.
The Minimum Standards provide departments and agencies with the minimum elements
necessary to establish effective insider threat programs. These elements
include the capability to gather, integrate, and centrally analyze and respond
to key threat-related information; monitor employee use of classified networks;
provide the workforce with insider threat awareness training; and protect
the civil liberties and privacy of all personnel.
The resulting insider threat capabilities will strengthen the protection
of classified information across the executive branch and reinforce our defenses
against both adversaries and insiders who misuse their access and endanger
our national security.
BARACK OBAMA
http://www.ncix.gov/issues/ithreat/index.php
Insider Threat
An insider threat arises when a person with authorized access to U.S. Government
resources, to include personnel, facilities, information, equipment, networks,
and systems, uses that access to harm the security of the United States.
Malicious insiders can inflict incalculable damage. They enable the enemy
to plant boots behind our lines and can compromise our nation's most important
endeavors.
Over the past century, the most damaging U.S. counterintelligence failures
were perpetrated by a trusted insider with ulterior motives. In each case,
the compromised individual exhibited the identifiable signs of a traitor
but the signs went unreported for years due to the unwillingness or
inability of colleagues to accept the possibility of treason.
Insiders convicted of espionage have, on average, been active for a number
of years before being caught. Today more information can be carried out the
door on removable media in a matter of minutes than the sum total of what
was given to our enemies in hard copy throughout U.S. history. Consequently,
the damage caused by malicious insiders will likely continue to increase
unless we have effective insider threat detection programs that can proactively
identify and mitigate the threats before they fully mature.
Relevant Reports, Briefings & Reading Material:
CERT:
Common Sense Guide to the Prevention & Detection of Insider Threat 4th
edition
FBI:The
Insider Threat: An introduction to detecting and deterring an insider spy
David
L. Charney, M.D.: True Psychology of the Insider Spy
Insider Threat Websites
www.cert.org/insider_threat
www.fbi.gov/about-us/investigate/counterintelligence/the-insider-threat
http://www.ncix.gov/issues/cyber/index.php
Cybersecurity
The United States is increasingly the target of foreign-based cyber operations.
The United States relies on its cyber infrastructure for everything from
communications, to the management of critical infrastructure, to the command
and control of our military. This dependence on technology, along with the
rapid rate of technological innovation, creates numerous vulnerabilities
that our adversaries seek to exploit.
Foreign adversaries can conduct cyber operations to collect intelligence
or to disrupt and degrade the effectiveness of the technologies on which
we depend. Cyber operations are very attractive to foreign intelligence
organizations, non-state actors, criminals, and terrorists because they can
be conducted relatively cheaply and easily and offer high returns with a
low degree of risk. The risk of exposure is low because cyber operations
can be carried out remotely and with a high degree of anonymity. In addition,
cyber operations are comparatively inexpensive, and can be conducted rapidly.
For all of these reasons, state and non-state actors are increasingly turning
to the cyber domain to augment and bolster their respective intelligence
activities against the United States in an effort to gain advantage.
Counterintelligence can play a critical role in reversing the benefits that
cyber operations afford our adversaries. Insider threat detection programs
can increase the likelihood of identifying insider threat activities on our
networks. CI collection and analysis increases our understanding of cyber
threats and how to defend against them. For these reasons, counterintelligence
plays a critical role in enhancing the cybersecurity posture of the United
States in an increasingly connected world.
Relevant Reports, Briefings & Reading Material:
Internet
Social Networking Risks
Common
Sense Guide to the Prevention & Detection of Insider Threat
Best
Practices for Keeping Your Home Network Secure
Provides an indispensable series of basic steps every American can take to
safeguard their home networks from cyber intrusions
http://www.ncix.gov/issues/economic/index.php
Economic Espionage
America's adversaries throughout history have routinely taken their competitive
efforts beyond the battlefield. They frequently avoid using standing armies,
shirk traditional spy circles, and go after the heart of what drives American
prosperity and fuels American might. Nazi spies during World War II tried
to penetrate the secrets behind our aviation technology, just as Soviet spies
in the Cold War targeted our nuclear and other military secrets.
Today, foreign intelligence services, criminals, and private sector spies
are focused on American industry and the private sector. These adversaries
use traditional intelligence tradecraft against vulnerable American companies,
and they increasingly view the cyber environmentwhere nearly all important
business and technology information now residesas a fast, efficient,
and safe way to penetrate the foundations of our economy. Their efforts
compromise intellectual property, trade secrets, and technological developments
that are critical to national security. Espionage against the private sector
increases the danger to long-term U.S. prosperity.
Without corrective action that mobilizes the expertise of both the Federal
Government and the private sector, the technologies cultivated by American
minds and within American universities are at risk of becoming the plunder
of competing nations at the expense of long-term U.S. security.
The private sector alone lacks the resources and expertise to thwart foreign
efforts to steal critical American know-how. This is in large part because
counterintelligence is not a typical corporate function, even for well-trained
and wellstaffed security professionals.
Counterintelligence is a challenge for corporations for two reasons. Cost
is the first reason. CI measures absorb company resources that would otherwise
be used for growth. The second CI challenge is tied to the nature of public
corporations. American companies are driven into developing markets by
shareholders, growth ambitions, and the desire to beat Wall Street's quarterly
earnings expectations. The requirement to move quickly and unabashedly leaves
American companies vulnerable as they flock into spy-rich developing nations.
China and Russia are our most aggressive and capable adversaries using economic
espionage.
China and Russia are not the only perpetrators of espionage against sensitive
US economic information and technology. Some US allies abuse the access they
have been granted to try to clandestinely collect critical information that
they can use for their own economic or political advantage.
Relevant Reports, Briefings & Reading Material:
Foreign Spies Stealing US Economic Secrets in Cyberspace, 2011:
http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_2011.pdf
Protecting Key Assets: A Corporate Counterintelligence Guide
http://www.ncix.gov/publications/reports/fecie_all/ProtectingKeyAssets_CorporateCIGuide.pdf
http://www.ncix.gov/issues/supplychain/index.php
Supply Chain Threats
The globalization of the world economy has placed critical links in the
manufacturing supply chain under the direct control of U.S. adversaries.
Existing supply chain vulnerabilities cross both the military and commercial
domains.
Fittingly, just as the economies of nations become interwoven, the competition
for natural resources, global influence and military superiority has escalated
leaving the probability of a serious supply chain compromise a near
statistical certainty.
Today, companies have less control over their supply chains. Identifying
compromises when they occur is exceedingly difficult, unearthing the culprits
is a long-shot, and true attribution pivots on a scale of the rare
to the unheard-of. As a result, not only do U.S. adversaries
use access to the supply chain to pursue technologies and gain access to
sensitive systems, foreign manufacturers can also, simply and effectively,
insert counterfeit parts into products destined for the United States and
degrade the performance of U.S. systems.
This is poised to create many challenges for the U.S. government
especially in the intelligence and defense communities. As more and more
links in the supply chain globalize, the reliable suppliers and
trusted manufacturers will become increasingly scarce.
Insider Threat and Security Clearance, US Interagencies, Goal Leader(s):
James Clapper, Director of National Intelligence, Katherine Archuleta, Director
of the Office of Personnel Management, Michael Daniel, Senior Advisor to
the President and Coordinator for Cybersecurity, 2014:
http://cryptome.org/2014/05/insider-industry/performance-insider-threat.pdf
Insider Threat Industry Day, General Services Administration, May 7, 2014:
http://cryptome.org/2014/05/insider-industry/insider-threat-industry-day.pdf
National Insider Threat Policy, National Counterintelligence Executive, July
12, 2013:
http://cryptome.org/2014/05/insider-industry/national-insider-threat-policy.pdf
National Insider Threat Task Force, National Counterintelligence Executive,
October, 2011:
http://cryptome.org/2014/05/insider-industry/national-insider-threat-task-force.pdf
The Insider Threat: An introduction to detecting and deterring an insider
spy, Federal Bureau of Investigation, 2014:
http://cryptome.org/2014/05/insider-industry/fbi-insider-threat.pdf
Insider Threat Study: Computer System Sabotage in Critical Infrastructure
Sectors, US Secret Service, May 2005:
http://cryptome.org/2014/05/insider-industry/usss-insider-threat.pdf
Insider Threat, Department of Homeland Security, 2014:
http://cryptome.org/2014/05/insider-industry/dhs-insider-threat.pdf
Monitoring Database Management System (DBMS) Activity for Detecting Data
Exfiltration by Insiders, Northrop Grumman Information Systems, 17 September
2013:
http://cryptome.org/2014/05/insider-industry/northrup-insider-threat.pdf
Insider Threat Detection Using Lightweight Media Forensics, DHS Cyber Security
Division, October 10, 2012:
http://cryptome.org/2014/05/insider-industry/dhs-insider-cyber-threat.pdf
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S.
Financial Services Sector, Software Engineering Institute, Carnegie Mellon,
July 2012:
http://cryptome.org/2014/05/insider-industry/sei-insider-cyber-threat.pdf
Insider Threat to Homeland Security, Office of Personnel Management, November
13, 2013:
http://cryptome.org/2014/05/insider-industry/opm-insider-threat.pdf
Insider Threat to Homeland Security, Department of Homeland Security, November
13, 2013:
http://cryptome.org/2014/05/insider-industry/dhs-insider-threat-2.pdf
Insider Threat to Homeland Security, National Counterintellignece Executive,
November 13, 2013:
http://cryptome.org/2014/05/insider-industry/ncix-insider-threat.pdf
Insider Threat to Homeland Security, Government Accountability Office, November
13, 2013:
http://cryptome.org/2014/05/insider-industry/gao-insider-threat.pdf
Insider Threat Program Support, US Marine Corps, February 12, 2014:
http://cryptome.org/2014/05/insider-industry/usmc-insider-threat.pdf
Insider Threat Software, Department of Homeland Security, June 20, 2012:
http://cryptome.org/2014/05/insider-industry/dhs-insider-threat-3.pdf
Treason 101, US Department of Agriculture, 2014:
http://cryptome.org/2014/05/insider-industry/usda-insider-threat.pdf
Combating the Insider Threat, Computer Emergency Readiness Team, May 06,
2014:
http://cryptome.org/2014/05/insider-industry/cert-insider-threat.pdf
Insider Threat program, Department of Energy, December 12, 2013:
http://cryptome.org/2014/05/insider-industry/doe-insider-threat.pdf
A Preliminary Examination of the Insider Threat Programs in the U.S. Private
Sector, September 2013:
http://cryptome.org/2014/05/insider-industry/insa-insider-threat.pdf
Digital Communication Analysis for Insider Threat, Combatting Terrorism Technical
Support Office, 2014:
http://cryptome.org/2014/05/insider-industry/cttso-insider-threat.pdf
Mitigating the Insider Threat (and Other Security Issues), Argonne National
Laboratory, May 9, 2011:
http://cryptome.org/2014/05/insider-industry/anl-insider-threat.pdf
IS-915: Protecting Critical Infrastructure Against Insider Threats, Federal
Emergency Management Administration, July 10, 2013:
http://cryptome.org/2014/05/insider-industry/fema-insider-threat.pdf
Predictive Modeling for Insider Threat Mitigation, Pacific Northwest National
Laboratory, 2014:
http://cryptome.org/2014/05/insider-industry/pnnl-insider-threat.pdf
Towards Insider Threat Detection using Web Server Logs, US Air Force, April
10, 2009:
http://cryptome.org/2014/05/insider-industry/usaf-insider-threat.pdf
More in preparation
Google site:.gov "Insider Threat"
About 20,400 results
Part 2: Commercial
In preparation
Insider Threat Defense, 2014:
http://www.insiderthreatdefense.com/index.html
Google site:.com "Insider Threat"
About 229,000 results
Google
About 736,000 results
NYTimes.com
About 330,000 results
Amazon.com
About 479,000 results
Part 3: Academic
In preparation
Google site:.edu "Insider Threat"
MIT.edu
About 368,000 results
Columbia.edu
About 367,000 results
Harvard.edu
About 269,000 results
Stanford.edu
About 219,000 results
Princeton.edu
About 124,000 results
Yale.edu
About 79,600 results
USNA.edu (Naval Academy)
About 47,500 results
USMA.edu (West Point)
About 32,300 results
Part 4: NGO
In preparation
https://www.google.com/search?q=site%3A.org+%22Insider+Threat
About 33,400 results
Part 5: Social Media
In preparation
Google site: [sm].com "Insider Threat"
Facebook
About 800,000 results
Twitter
About 784,000 results
LinkedIn
About 602,000 results
YouTube
About 454,000 results
Part 6: Wild Cards
In preparation
Tor
Blacknet
Disclosure sites
Leak sites
Pastebins
Dropboxes
Anonymizers
Anonymouses
Chats
Mail lists
Honeypots
Entrapment fakes of the Wild Cards
Part 7: Other Governmental
In preparation
All governments at all levels, individually and collectively
All rebellions and revolutions at all levels, individually and collectively
Entrapment fakes of the Other Governmental.
|