Insider Threat Defense Security Service Wajih Harroum CI Special Agent

Slides:



Advertisements
Similar presentations
Adverse Information Adverse Information:
Advertisements

How to Obtain and Keep a Security Clearance?. What Is A Security Clearance? A determination made by the government that you are stable and trustworthy,
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Section Six: Foreign Ownership, Control, or Influence (FOCI)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
Approvals 1. 2 Chg #DateChangeSlide #Completed ByReason 18/9/2013From G Washington to B Arnold12Chris OWrong threat profile.
A Combat Support Agency 11 Tim Sullivan Chief of Security Defense Information Systems Agency 7 May 2009 Security Clearances A Combat Support Agency Defense.
Security from the Inside Michael Tillison Senior Vice President ManTech International Corp.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
THE INSIDER THREAT AND DATA LOSS PREVENTION CSCE 727.
Espionage Indicators Briefing 1 U.S. Department of Commerce
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
1 Counterintelligence & The Insider Threat An Enterprise Operations Counterintelligence Presentation Presented by: Ralph Butler SSC Counterintelligence.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Cleared Employee Reporting Requirements. Reporting Regulations  Defense Security Service (DSS)  The National Industrial Security Program Operating Manual(NISPOM)1-300.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
Section Eleven: Threat Awareness and Defensive Measures Note: All classified markings contained within this presentation are for training purposes only.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Information Warfare Playgrounds to Battlegrounds.
Insider Threat. CSCE Farkas2 Reading List The national Infrastructure Advisory Council’s Final Report and Recommendation on the Insider Threat to.
5/159 TH AVN REG THE COST OF FREEDOM IS HIGH BUT SOME PEOPLE WILL SELL US OUT FOR NOTHING!! FITZ.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
DEFENSE SECURITY SERVICE DSS Role in International Security.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Salary Possibilities Newly assigned Special Agents start at a yearly salary of $43,441, or also recognized as a GS-10, plus multiple other pay increases.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Moral Choices Facing Employees Unit 8 Ethical Awareness.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Information Warfare Playgrounds to Battlegrounds.
11 th Grade Graduation Project.  Military  The nature of work depends on type of job you are doing in the military.  Must be both physically, educationally,
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Insider Threat. CSCE Farkas2 Reading List The National Infrastructure Advisory Council’s (NIAC) Final Report and Recommendation on the Insider Threat.
FY10 Annual Security Briefing Defensive Security for Foreign Travel Prior to Departure Remember, as a cleared person you should report any travel out of.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Civil Aviation Security Program The FBI’s Counterterrorism Division’s (CTD) Civil Aviation Security Program (CASP) is responsible for Criminal and Terrorism.
Presentation subhead March 3, 2011 Criminal Justice Investigations – Unit 9.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Presidential Advisers and Executive Agencies. Organization of the Executive Branch President Officials handpicked by the president Lesser officials and.
Insider Threat Awareness
LISTENING IN… Debating the Legitimacy of Eavesdropping on American Citizens With or Without Just Cause.
Insider Threat Awareness Training
Fraud & Internal Controls
Aloka Krishnan Chandran Mudhliar John Cann Nihar Sanghvi
Melissa McBee Anderson Ethan Via Federal Bureau of Investigations
Unit 32 – Networked Systems Security
Cyber Security: State of the Nation
INSIDER THREAT AWARENESS
Unauthorized Disclosure Training
Forensics Week 11.
Initial Security Indoctrination
Overall Classification of this Briefing is UNCLASSIFIED
Department of Energy Department of Energy Insider Threat Program Overview Energy Facilitators Contractors Group (EFCOG) Sandia National Laboratory (SNL)
Chapter # 3 COMPUTER AND INTERNET CRIME
THREATS AND THE DARK WEB
Presentation transcript:

Insider Threat Defense Security Service Wajih Harroum CI Special Agent

Overview What is “Insider Threat?” Why is the Insider Threat significant? How do you recognize the Insider Threat? How can you help defeat the Insider Threat?

Internal and External Threats External (City of Troy) Foreign Intelligence Services (FIS) Cyber Attacks Targeting of Official Travelers Soliciting of Marketing and Services Attempted Acquisition of Controlled Technology Internal (Trojan Horse) Volunteers Sleeper Agents Co-opted Individuals

Insider Threat: A CI Perspective An employee with access to a classified or controlled environment who has the opportunity, capability, and intent to purposefully compromise sensitive information and/or materials for distribution to entities who pose a risk to the security interests of the United States The “insider threat” is the most damaging

Impact on National Security and Industry Loss or compromise of classified, export controlled, or proprietary information Weapons systems cloned, destroyed, or countered Technological superiority at risk Economic loss Loss of life

Spotting and Assessing (See Motivators) Recruitment and Handling Recruitment Process Spotting and Assessing (See Motivators) Development Recruitment and Handling

Insider Threat Motivators Problems at work: A lack of recognition, disagreements with co-workers or managers. Greed or Financial Need: Money can fix anything. Excessive debt or expenses. Ideology/Identification: A desire to help the “underdog” or a particular cause. Divided loyalty: Allegiance to another person or company, or country. Adventure/Thrill: Want to add excitement to their life, James Bond Wannabe. Vulnerability to blackmail: Extra-marital affairs, gambling, fraud, etc. Anger/Revenge: Disgruntlement to the point of wanting to retaliate Ego/Self-image: An “above the rules” attitude. Compulsive and destructive behavior: Drug or alcohol abuse. Family problems: Marital conflicts or separation from loved ones

Potential Espionage Indicators (PEI) Reported/unreported foreign travel and contact with foreign nationals Routine vacations to countries of interest Seeks to gain higher clearance/expand access Engages in classified conversations without a need-to-know Works hours inconsistent with job assignment/insists on working in private Exploitable behavior traits Adultery, drug abuse, alcohol abuse, and gambling activities Repeated security violations Attempts to enter areas not granted access Concern that they are being investigated; leaves traps to detect searches of their work area or home Remotely accessing the network while on vacation or at other odd times.

Espionage Now Trends of Individuals who have committed espionage since 1990: 1/3 of spies are naturalized U.S. citizens More than 1/3 of spies had no security clearance Twice as many spies volunteered as were recruited Most recent spies have been solo actors Nearly 85% passed information before being caught Out of the 11 most recent cases, 90% used computers in their espionage, 2/3 used Internet 80% received no payment for their spying and 95% went to prison

Insider Threat Case Studies Technology Transfer Dongfan Chung Noshir Gowadia Chi Mak

Mak Chi Mak Illegally sent U.S. Navy information to China FBI conducted extensive surveillance operations until Mak’s arrest

Chung Dongfan “Greg” Chung Suspected of providing China with proprietary information U.S. Government agents found Chinese tasking documents in Chung’s home

Gowadia Noshir Gowadia, 61, of Haiku, HI Principle design engineer of B-2 stealth technology Denied TS/SCI access twice Provided China with technology information valued at hundreds of millions of dollars for a sum of $2M

Walker John Anthony Walker, Jr. Navy Chief Warrant Officer and communications specialist Financial issues walked into the Soviet Embassy in Washington, D.C. and sold a Top Secret document (Codes) Recruited family members and a friend into a spy ring

Pollard Jonathan Jay Pollard Navy Intelligence Analyst Volunteered to spy provided Israel with about one million documents

The List is Long… Ana Belén Montes (DIA Senior Analyst) Bradley Edward Manning (Chelsea Elizabeth Manning) Kun Shan Chun (FBI Elect Technician) Edward Joseph Snowden (NSA Intel Analyst) Robert Philip Hanssen FBI Supervisor) Aldrich Hazen Ames (CIA Analyst) Charles H. Eccleston (DOE Analyst) Robert P. Hoffman (Navy Analyst)

Threat Mitigation – Roles and Responsibilities Employees Awareness Detection Reporting Enforcement of best security practices Security Manager/FSO Training/Awareness/Briefings Detection Reaction/Response Reporting Reportable Behavior Adverse Information Suspicious Contact/Activity Security/Counterintelligence Incidents Enforcement of best security practices Personnel Security Physical Security Information Security

Contractor Reporting of PEI NISPOM Guidance: 1-302 a. Adverse Information. Contractors shall report adverse information coming to their attention concerning any of their cleared employees. Reports based on rumor or innuendo should not be made. The subsequent termination of employment of an employee does not obviate the requirement to submit this report. If the individual is employed on a Federal installation, the contractor shall furnish a copy of the report and its final disposition to the commander or head of the installation. Becker vs. Philco and Taglia vs. Philco (389 U.S. 979): The U.S. Court of Appeals for the 4th Circuit decided on February 6, 1967, that a contractor is not liable for defamation of an employee because of reports made to the government under requirements of this manual and its previous versions.

Defense Security Service Questions?