SlideShare uma empresa Scribd logo
1 de 21
Ken Zabella
Intel Analyst Sr Manager
COUNTERINTELLIGENCE &
THE INSIDER THREAT
AGENDA
Understanding the Insider Threat
Insider Threat Trends
Insider Threat Program
WHAT IS
COUNTERINTELLIGENCE?
DETER - DETECT -
MITIGATE
Simply Stated:
Counterintelligence (CI) is about
identifying intelligence threats and
developing mitigation strategies to
address and neutralize those threats
2017 DSS TRENDS
How
?
Who
?
Wha
t?
Telephone
Résumé - Professional
Phishing Operation
Mail
Email
Conference, Conventions, or Trade Shows
Web Form
Social Networking Service
Résumé - Academic
Personal Contact
Foreign Visit
Cyber Operations
Exploitation of Business Activities
Attempted Acquisition of Technology
Exploitation of Experts
Exploitation of Cyber Operations
Exploitation of Relationships
Exploitation of Insider Access
Exploitation of Supply Chain
Exploitation of Security Protocols
RFI/Solicitation
Résumé Submission
Theft
Surveillance
Search/Seizure
METHODS OF CONTACT
The approach used to connect the foreign actor to the targeted individual, information,
network, or technology in order for the foreign actor to execute the MO(s)
METHODS OF OPERATION
A distinct pattern or method of procedure thought to be characteristic of or habitually
followed by an individual or an organization involved in criminal or intelligence activity
IDENTIFYING THE INSIDER
It’s not this easy! The Insider can be easily missed
WHAT IS THE INSIDER?
INSIDER: Any person with authorized access to any US Government resource, to include
personnel facilities, information, equipment, networks, or systems.
INSIDER THREAT: “The threat presented by a person who has, or once had, authorized
access to information, facilities, networks, people, or resources; and who wittingly, or
unwittingly, commits: acts in contravention of law or policy that resulted in, or might
result in, harm through the loss or degradation of government or company information,
resources, or capabilities; or destructive acts, to include physical harm to others in the
workplace.”
someone with authorized access
doing unauthorized things
TYPES OF INSIDERS
• Unintentional Insiders. Getting a laptop stolen or uploading the wrong file may seem innocuous, but these actions can
unintentionally cause massive damage. A recent survey by the International Security Forum found that the vast majority of insider
breaches are actually accidental. This is small solace in the aftermath of an incident.
• Exploited Insiders. External attackers commonly target high-value employees who have privileged access with spear
phishing emails. On average, for every 10 phishing emails sent out, at least one employee will click on a link that infects his
machine, giving attackers the foothold they need to execute an attack. Once attackers gain access to an endpoint, they target and
steal privileged credentials, exploiting them to escalate access privileges and move laterally through the network until they reach
and gain full domain-level access. This gives them full control over sensitive data and IT systems.
• External Insiders. More than 60 percent of organizations allow third-party vendors to remotely access their internal
networks with the same privileges and access levels as internal employees. Despite this access, these users are not managed by
the host organization, but by the contractor, making it incredibly difficult to secure their privileged access to IT resources. Further,
contractors are often targeted by external attackers, as in the hack at the Office of Personnel Management where a contractor was
hacked and his privileged credentials were used to infiltrate the system.
• Malicious Insiders. These are the real bad guys -- malicious, disgruntled employees who knowingly and purposely abuse
their internal access to wreak havoc. They typically have the knowledge, access, information and desire needed to bypass existing
security solutions to complete their task. Malicious insiders are often the most difficult to detect and the costliest to clean up after.
GCN.com
IDENTIFYING THE INSIDER –
MOTIVES
“MICE”
– Money
– Ideology (includes divided loyalty)
– Coercion/Compromise
– Ego
The model now also includes:
– Disgruntlement
– Revenge/Vindictiveness
– Alcoholism/Drug Abuse
– Ingratiation
POTENTIAL INSIDER THREAT INDICATORS -
BEHAVIORS
• Selfish
• Manipulative
• Irritable
• Threatening
• Domineering
• Harassment
• Argumentative
• Poor teamwork
• Retaliatory behavior
• Superiority complex
• Above following rules
• Marriage problems
• Divorce
• Stress at home
• Inappropriate response to
stress at home
• Inability to cope with
stress at home
• Sudden, unexplained
affluence
• Financial trouble
• Irresponsibility
• Sudden change in work
performance
• Inappropriate response to
stress at work
• Inability to cope with
stress at work
• Responds poorly to
criticism
• Difficulty controlling emotions
• Unusual level of pessimism
• Unusual level of sadness
• Change in beliefs
Disgruntled
Emotional
Ego
Relationship,
Personal,
Financial
Issues
POTENTIAL RISK INDICATORS - ACTIVITIES
• Attempts to bypass security controls
• Request for clearance or higher level access
• Unjustified work pattern
• Chronic violation of organization policies
• Decline in work performance
• Irresponsible social media habits
• Unexplained sudden affluence
• Outward expression of conflicting loyalties
• Unreported foreign contacts / foreign travel
• Maintains access to sensitive data after termination notice
• Visible disgruntlement towards employer
• Use of unauthorized digital external storage devices
CASE STUDY: ???
• Disgruntled
• Superiority Complex
• Background full of falsehoods, exaggerations and omissions
• Clearance concerns
• Told security investigators he should not be given access to secrets
• Incomplete investigation and security violation
• Arrogant
• Argumentative
• Inconsistent and unauthorized work hours
• Conflicting loyalties
• “the United States caused problems for China but China never
caused problems for the United States”
• Openly defended previous Army insider
• Attempts to bypass security controls … Successfully
CASE STUDY: ???
• Drinking problems
• Drunk driving arrest
• Unpaid tax bills
• Two divorces
• Computer harassment charge
• Posed as police officer during traffic dispute
• Drafted a message criticizing the government’s internal
security measures
• Mental health concerns
• Hoarder
CASE STUDY: ???
• Wrote on Twitter “the most dangerous entry to this country was the
orange fascist we let into the White House”
• Facebook described President Trump as “a soulless ginger orangutan”
• Expressed support for Taliban leaders and Osama bin Ladin
• Stated: “It’s a Christlike vision to have a fundamentalist Islamic State”
• Praised Edward Snowden
• Retweeted government leaks
• Handwrote notes about “burning down the White House, fleeing to
Afghanistan and joining the Taliban”
CASE STUDY: ???
• Anger, anxiety and potential mental heath issues
• After receiving clearance, cited at least 8 times for misconduct
over 3 years in the Reserve
• disorderly conduct, drunkenness and absence without leave, all later
dropped
• Arrested for shooting the rear tire of a construction vehicle
because the worker disrespected him
• Fired a bullet into his ceiling and through the apartment above
• Arrested on disorderly conduct charge for destroying furnishings
in a nightclub
• Complained that individuals were using a microwave to send
vibrations into his body
• Roommate reported frequent drinking and paranoia that people
were “coming to get him”
INSIDER THREAT TRENDS – WHEN DOES IT
HAPPEN?
• 59% of employees leaving a company admit to taking proprietary information with them (FBI)
• Out of 800 adjudicated insider threat cases, an overwhelming majority of subjects took the information within the
last 30 days of employment (CERT; Carnegie Mellon)
• 60% of cases were individuals who had worked for the organization for less than 5 years (CPNI)
• Majority of acts were carried out by staff (88%), 7% were contractors, and 5% temporary staff (CPNI)
HOW TO CATCH A SPY?
What is the most common way that spies within the U.S.
Government and U.S. cleared defense contractors are
detected and caught?
A: Routine counterintelligence monitoring
B: Tip from friend, family, co-worker
C: Their own mistakes
D: Reporting by U.S. sources within foreign
intelligence services
Answer: D – There is no loyalty in the spy business, and intelligence officers
who have been recruited as sources by the U.S. Intelligence Community
eagerly betray the U.S. persons who have given them information
WHAT ARE WE DOING?
• Invested in a dedicated CI program
• Identification of Critical Assets
• Risk Analysis and Mitigation System (RAMS)
• Sharkcage
• FSO CI Awareness Report
• Middle Way Initiative
• Off the Grid Program
Overarching Goal
Deter – Detect -
Mitigate
METHODS OF OPERATION
Criminal Activity
• CLEAR / TIP
• Training & Awareness
• Location-specific Threat Product
Mitigation Strategy
Surveillance
• Training & Awareness
• Trade / Airshow Support
Foreign Visit
• Visit Management System
• Training & Awareness
• FLE / IC Engagement
• ISTART Post-travel Security Survey
Solicitation / Marketing Services
• Training & Awareness
• Trade / Airshow Support
• ‘Contact Us’ Email Box Reporting
Request For Information
• Trade / Airshow Support
• Training & Awareness
• ‘Contact Us’ Email Box Reporting
Exploitation Of Relationships
• Training & Awareness
• Program Management (Joint Ventures)
Targeted Training
Academic Solicitation
• LM Fellows Training & Awareness
• FLE / IC Engagement
• Foreign University IP Tracking
Suspicious Network Activity
• Embargoed VPN
• Shark Cage
• DSC Loaner Laptop Policy
• CIRT Reporting To DC3 And DCISE
Seeking Employment
• Cyber Alerts On Letter From Direct
Competitors
• Talent Acquisition Training
Search / Seizure
• DSC Loaner Laptop Policy
• Training & Awareness
• Foreign Travel Pre-briefs
Acquisition Of Technology
• Supply Chain / Procurement Training
• ‘Contact Us’ Email Box Reporting
• Support To Mergers & Acquisitions
• FLE / IC Engagement
• Trade / Airshow Support
CONTACT INFORMATION
Ken Zabella
Enterprise Operations
CI & Investigations Senior Manager
407-306-6764
Ken.J.Zabella@lmco.com
Counterintelligence & The Insider Threat January 2019 (1).pptx

Mais conteúdo relacionado

Semelhante a Counterintelligence & The Insider Threat January 2019 (1).pptx

powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
deveraralph2
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
banerjeea
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
ramsetl
 

Semelhante a Counterintelligence & The Insider Threat January 2019 (1).pptx (20)

Chapter2
Chapter2Chapter2
Chapter2
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
 
Whitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-badWhitepaper-When-Admins-go-bad
Whitepaper-When-Admins-go-bad
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Why_TG
Why_TGWhy_TG
Why_TG
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering AttacksPACE-IT, Security+3.3: Summary of Social Engineering Attacks
PACE-IT, Security+3.3: Summary of Social Engineering Attacks
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Cyber Threat Landscape
Cyber Threat LandscapeCyber Threat Landscape
Cyber Threat Landscape
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 

Último

💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...
💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...
💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...
Sheetaleventcompany
 
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
Sheetaleventcompany
 
Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...
Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...
Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...
Sheetaleventcompany
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Ifra Zohaib
 

Último (20)

9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 51 (Delhi) Call Girl Service
 
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICEBHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
BHOPAL CALL GIRL 9262871154 HIGH PROFILE BHOPAL ESCORT SERVICE
 
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
Davangere ❤CALL GIRL 9973520673 ❤CALL GIRLS IN Davangere ESCORT SERVICE❤CALL ...
 
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book nowJamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
Jamnagar 💋 Call Girl 9748763073 Call Girls in Jamnagar Escort service book now
 
💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...
💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...
💚Amritsar Call Girls Service 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Adv...
 
Satara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort serviceSatara call girl 8797040791♥️ call girls in satara escort service
Satara call girl 8797040791♥️ call girls in satara escort service
 
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
VIDEO CALL SERVICE CALL GIRL LIVE SERVICE REAL GIRL LIVE VIDEO CALL SERVICE C...
 
chittorgarh 💋 Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
chittorgarh 💋  Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...chittorgarh 💋  Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
chittorgarh 💋 Call Girl 9748763073 Call Girls in Chittorgarh Escort service ...
 
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEAGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
AGARTALA CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
❤️Amritsar Call Girl☎️9815674956☎️ Call Girl service in Amritsar☎️ Amritsar C...
 
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
❤️Zirakpur Escort Service☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirak...
 
RAIPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE RAIPUR
RAIPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE RAIPURRAIPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE RAIPUR
RAIPUR CALL GIRL 9661985112 LOW PRICE ESCORT SERVICE RAIPUR
 
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book nowAgra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
Agra 💋Call Girl 9748763073 Call Girls in Agra Escort service book now
 
Rehabilitation centres in zimbabwe | 📲 +263788080001
Rehabilitation centres in zimbabwe |  📲 +263788080001Rehabilitation centres in zimbabwe |  📲 +263788080001
Rehabilitation centres in zimbabwe | 📲 +263788080001
 
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICEMORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
MORADABAD CALL GIRL 9661985112 IN CALL GIRLS ESCORT SERVICE
 
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call GirlsMainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
Mainpuri Escorts 📞 8617370543 | Mainpuri Call Girls
 
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
💚Amritsar Call Girl 💯Jiya 📲🔝8725944379🔝Call Girls In Amritsar No💰Advance Cash...
 
Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...
Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...
Call Girls In Chandigarh ☎ 08868886958✅ Just Genuine Call Call Girls Chandiga...
 
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
Call Girls In Lahore-->>03274100048<<--Independent Call Girls & Escorts In La...
 
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICEULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
ULHASNAGAR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 

Counterintelligence & The Insider Threat January 2019 (1).pptx

  • 1. Ken Zabella Intel Analyst Sr Manager COUNTERINTELLIGENCE & THE INSIDER THREAT
  • 2. AGENDA Understanding the Insider Threat Insider Threat Trends Insider Threat Program
  • 3. WHAT IS COUNTERINTELLIGENCE? DETER - DETECT - MITIGATE Simply Stated: Counterintelligence (CI) is about identifying intelligence threats and developing mitigation strategies to address and neutralize those threats
  • 4. 2017 DSS TRENDS How ? Who ? Wha t? Telephone Résumé - Professional Phishing Operation Mail Email Conference, Conventions, or Trade Shows Web Form Social Networking Service Résumé - Academic Personal Contact Foreign Visit Cyber Operations Exploitation of Business Activities Attempted Acquisition of Technology Exploitation of Experts Exploitation of Cyber Operations Exploitation of Relationships Exploitation of Insider Access Exploitation of Supply Chain Exploitation of Security Protocols RFI/Solicitation Résumé Submission Theft Surveillance Search/Seizure METHODS OF CONTACT The approach used to connect the foreign actor to the targeted individual, information, network, or technology in order for the foreign actor to execute the MO(s) METHODS OF OPERATION A distinct pattern or method of procedure thought to be characteristic of or habitually followed by an individual or an organization involved in criminal or intelligence activity
  • 5. IDENTIFYING THE INSIDER It’s not this easy! The Insider can be easily missed
  • 6. WHAT IS THE INSIDER? INSIDER: Any person with authorized access to any US Government resource, to include personnel facilities, information, equipment, networks, or systems. INSIDER THREAT: “The threat presented by a person who has, or once had, authorized access to information, facilities, networks, people, or resources; and who wittingly, or unwittingly, commits: acts in contravention of law or policy that resulted in, or might result in, harm through the loss or degradation of government or company information, resources, or capabilities; or destructive acts, to include physical harm to others in the workplace.” someone with authorized access doing unauthorized things
  • 7. TYPES OF INSIDERS • Unintentional Insiders. Getting a laptop stolen or uploading the wrong file may seem innocuous, but these actions can unintentionally cause massive damage. A recent survey by the International Security Forum found that the vast majority of insider breaches are actually accidental. This is small solace in the aftermath of an incident. • Exploited Insiders. External attackers commonly target high-value employees who have privileged access with spear phishing emails. On average, for every 10 phishing emails sent out, at least one employee will click on a link that infects his machine, giving attackers the foothold they need to execute an attack. Once attackers gain access to an endpoint, they target and steal privileged credentials, exploiting them to escalate access privileges and move laterally through the network until they reach and gain full domain-level access. This gives them full control over sensitive data and IT systems. • External Insiders. More than 60 percent of organizations allow third-party vendors to remotely access their internal networks with the same privileges and access levels as internal employees. Despite this access, these users are not managed by the host organization, but by the contractor, making it incredibly difficult to secure their privileged access to IT resources. Further, contractors are often targeted by external attackers, as in the hack at the Office of Personnel Management where a contractor was hacked and his privileged credentials were used to infiltrate the system. • Malicious Insiders. These are the real bad guys -- malicious, disgruntled employees who knowingly and purposely abuse their internal access to wreak havoc. They typically have the knowledge, access, information and desire needed to bypass existing security solutions to complete their task. Malicious insiders are often the most difficult to detect and the costliest to clean up after. GCN.com
  • 8. IDENTIFYING THE INSIDER – MOTIVES “MICE” – Money – Ideology (includes divided loyalty) – Coercion/Compromise – Ego The model now also includes: – Disgruntlement – Revenge/Vindictiveness – Alcoholism/Drug Abuse – Ingratiation
  • 9. POTENTIAL INSIDER THREAT INDICATORS - BEHAVIORS • Selfish • Manipulative • Irritable • Threatening • Domineering • Harassment • Argumentative • Poor teamwork • Retaliatory behavior • Superiority complex • Above following rules • Marriage problems • Divorce • Stress at home • Inappropriate response to stress at home • Inability to cope with stress at home • Sudden, unexplained affluence • Financial trouble • Irresponsibility • Sudden change in work performance • Inappropriate response to stress at work • Inability to cope with stress at work • Responds poorly to criticism • Difficulty controlling emotions • Unusual level of pessimism • Unusual level of sadness • Change in beliefs Disgruntled Emotional Ego Relationship, Personal, Financial Issues
  • 10. POTENTIAL RISK INDICATORS - ACTIVITIES • Attempts to bypass security controls • Request for clearance or higher level access • Unjustified work pattern • Chronic violation of organization policies • Decline in work performance • Irresponsible social media habits • Unexplained sudden affluence • Outward expression of conflicting loyalties • Unreported foreign contacts / foreign travel • Maintains access to sensitive data after termination notice • Visible disgruntlement towards employer • Use of unauthorized digital external storage devices
  • 11. CASE STUDY: ??? • Disgruntled • Superiority Complex • Background full of falsehoods, exaggerations and omissions • Clearance concerns • Told security investigators he should not be given access to secrets • Incomplete investigation and security violation • Arrogant • Argumentative • Inconsistent and unauthorized work hours • Conflicting loyalties • “the United States caused problems for China but China never caused problems for the United States” • Openly defended previous Army insider • Attempts to bypass security controls … Successfully
  • 12. CASE STUDY: ??? • Drinking problems • Drunk driving arrest • Unpaid tax bills • Two divorces • Computer harassment charge • Posed as police officer during traffic dispute • Drafted a message criticizing the government’s internal security measures • Mental health concerns • Hoarder
  • 13. CASE STUDY: ??? • Wrote on Twitter “the most dangerous entry to this country was the orange fascist we let into the White House” • Facebook described President Trump as “a soulless ginger orangutan” • Expressed support for Taliban leaders and Osama bin Ladin • Stated: “It’s a Christlike vision to have a fundamentalist Islamic State” • Praised Edward Snowden • Retweeted government leaks • Handwrote notes about “burning down the White House, fleeing to Afghanistan and joining the Taliban”
  • 14. CASE STUDY: ??? • Anger, anxiety and potential mental heath issues • After receiving clearance, cited at least 8 times for misconduct over 3 years in the Reserve • disorderly conduct, drunkenness and absence without leave, all later dropped • Arrested for shooting the rear tire of a construction vehicle because the worker disrespected him • Fired a bullet into his ceiling and through the apartment above • Arrested on disorderly conduct charge for destroying furnishings in a nightclub • Complained that individuals were using a microwave to send vibrations into his body • Roommate reported frequent drinking and paranoia that people were “coming to get him”
  • 15. INSIDER THREAT TRENDS – WHEN DOES IT HAPPEN? • 59% of employees leaving a company admit to taking proprietary information with them (FBI) • Out of 800 adjudicated insider threat cases, an overwhelming majority of subjects took the information within the last 30 days of employment (CERT; Carnegie Mellon) • 60% of cases were individuals who had worked for the organization for less than 5 years (CPNI) • Majority of acts were carried out by staff (88%), 7% were contractors, and 5% temporary staff (CPNI)
  • 16. HOW TO CATCH A SPY? What is the most common way that spies within the U.S. Government and U.S. cleared defense contractors are detected and caught? A: Routine counterintelligence monitoring B: Tip from friend, family, co-worker C: Their own mistakes D: Reporting by U.S. sources within foreign intelligence services Answer: D – There is no loyalty in the spy business, and intelligence officers who have been recruited as sources by the U.S. Intelligence Community eagerly betray the U.S. persons who have given them information
  • 17. WHAT ARE WE DOING? • Invested in a dedicated CI program • Identification of Critical Assets • Risk Analysis and Mitigation System (RAMS) • Sharkcage • FSO CI Awareness Report • Middle Way Initiative • Off the Grid Program Overarching Goal Deter – Detect - Mitigate
  • 18. METHODS OF OPERATION Criminal Activity • CLEAR / TIP • Training & Awareness • Location-specific Threat Product Mitigation Strategy Surveillance • Training & Awareness • Trade / Airshow Support Foreign Visit • Visit Management System • Training & Awareness • FLE / IC Engagement • ISTART Post-travel Security Survey Solicitation / Marketing Services • Training & Awareness • Trade / Airshow Support • ‘Contact Us’ Email Box Reporting Request For Information • Trade / Airshow Support • Training & Awareness • ‘Contact Us’ Email Box Reporting Exploitation Of Relationships • Training & Awareness • Program Management (Joint Ventures) Targeted Training Academic Solicitation • LM Fellows Training & Awareness • FLE / IC Engagement • Foreign University IP Tracking Suspicious Network Activity • Embargoed VPN • Shark Cage • DSC Loaner Laptop Policy • CIRT Reporting To DC3 And DCISE Seeking Employment • Cyber Alerts On Letter From Direct Competitors • Talent Acquisition Training Search / Seizure • DSC Loaner Laptop Policy • Training & Awareness • Foreign Travel Pre-briefs Acquisition Of Technology • Supply Chain / Procurement Training • ‘Contact Us’ Email Box Reporting • Support To Mergers & Acquisitions • FLE / IC Engagement • Trade / Airshow Support
  • 19.
  • 20. CONTACT INFORMATION Ken Zabella Enterprise Operations CI & Investigations Senior Manager 407-306-6764 Ken.J.Zabella@lmco.com