Title: Prof' Angela Sasse
1Prof. Angela Sasse
University College London
2(No Transcript)
3Understanding Identifying the Insider Threat
CPNI - Personnel Security Behavioural
Assessment Slides not to be reproduced without
prior permission
4Content
- Introduction to CPNI Personnel Security
framework - Insider behaviour activities
- Research
- Factors increasing likelihood
- Triggers
- Behaviours of concern
5CPNI
Introduction - CPNI
- Holistic protective security advice to the
national infrastructure to reduce vulnerability
to terrorism and other threats
PHYSICAL SECURITY
ELECTRONIC SECURITY
PERSONNEL SECURITY BEHAVIOURAL ASSESSMENT
- Reducing vulnerability to Insider threat
6The Critical National Infrastructure
Telecommunications Energy Finance Government
Public Services Water Health Emergency
Services Transport Food
7Holistic view of Protective Security
8Elements of a good personnel security regime
9Definition of an Insider
- An Insider is someone who exploits, or has the
intention to exploit, their legitimate access to
assets for unauthorised purposes
10Insider activities ..
11Consequences of Insider activity
- Reputation
- Relationships
- Buildings assets
- Processes procedures
- IT systems
12Types of Insider Behaviour
Insider
13Who might be undertaking Insider activity?
- Terrorists or their associates
- Foreign Intelligence services
- Disaffected employees
- Single-issue groups
- Commercial competitors
- Journalists
14Motivations of Insiders?
- Financial gain
- Revenge
- Status/recognition
- Friendship/loyalty
- Ideological
- Fear/coercion
15Likelihood, Triggers, Opportunity Behaviours of
concern Current thinking
16Current thinking
- Review of US Insider research
- Literature review of Disaffection
- CPNI Insider study
- case study approach range of past cases
- identify common trends
- develop guidance on reducing vulnerability
- concludes 2009
-
17Likelihood of Insider Activity
Specific triggers
18Individual Vulnerabilities
- Life events history of
- Poor or chequered employment
- Excessive or addictive use of alcohol, drugs or
gambling - Petty crime
- Financial weaknesses
- Personal circumstances
- Familial ties to countries of concern (competing
identities) - Sympathy to specific causes/adversarial mindset
- Difficult family circumstances
- Change in financial situation
- Personality predispositions
- Low self esteem - desire for recognition/status
- Thrill seeker - desire for excitement
- Overinflated sense of worth/abilities desire
for revenge when not recognised - Brittle - oversensitive, unable to accept
criticism desire for revenge for perceived
injustices
19Organisational vulnerabilities
Certain situations have potential to increase
vulnerability
Poor organisational culture management
practices
20Possible triggers?
- Major life events
- Bereavement
- Divorce / marital problems
- Change in financial circumstances
- Work stressors
- Organisational change
- Demotion / lack of promotion
- Perceived injustices
- World events / crisis of conscience
- Direct approaches
21Opportunity
Likelihood in terms of Opportunity
Inadequate Personnel Security measures
Poor security culture
22Opportunity
Insider activity can be facilitated by
23Current thinkingPossible Indicators of Insider
threat
24Possible Indicators of Insider Threat
- Not one single factor
- Clusters specific combinations
- Alternative explanations
- Changes from normal behaviour
- Assessed in context of employees role
- opportunity and capability to cause harm
- Legality discrimination
25Possible Indicators of Insider Threat
Behaviours of concern
Changes in lifestyle work behaviours
Individual vulnerabilities
Suspicious behaviours
Unauthorised behaviours
Greater the number of indicators present, greater
the risk
Some indicator groups are of more concern
Combinations and clusters
26Examples of possible Indicators
- Relatives / close friends in countries known to
target UK citizens to obtain sensitive
information and/or is associated with a risk of
terrorism - Sympathy to specific causes/adversarial mindset
(particularly if in conflict with nature of
work/position) - Financial difficulties
- Addictions
- Specific personality traits
Individual vulnerabilities
27Examples of possible Indicators
- Obvious changes in financial status with no
rational explanation - Sudden or marked changes in religious, political
or social affiliation or practice which has an
adverse impact on performance or attitude to
security - Poor timekeeping / excessive absenteeism
- Decreased quantity quality of work
- Deteriorating relationships with colleagues/line
managers (inc complaints)
Changes in lifestyle work behaviours
28Examples of possible Indicators
- Unusually high interest in security measures or
history of unusually high security violations - Visiting classified areas of work after normal
hours, for no logical reason - Unusual questioning of co-workers about
information/areas which do not have access to - Abusing access to databases
Suspicious behaviours
29Examples of possible Indicators
30Detection
- Utilisation of existing personnel security
measures - Protective monitoring
- automated alerts and audits to detect
unauthorised entry/abnormal usage of IT systems
or work areas - Aim -gt development of practical and reliable
tools to support decision making about Insiders - Case studies have shown there was
- evidence of behaviours of concern about Insiders
- BUT
- not collected together in one place so that an
individual could make an informed judgement - lacked a framework to understand potential
warning signs
31Detection
- We aim to develop checklists that could be
- applied to an application form at recruitment
stage to check past history and capture potential
individual vulnerabilities - used to support appraisal and/or security
interviews, whether by security professionals or
line managers - used to structure confidential employee reporting
schemes
32Prevention Deterrence is key
33Summary Key messages
- Inter-relationships between factors in creating
Insider events - Individual v Organisational v Triggers
- Reducing cause opportunity is key (prevention)
- Detection more complicated
- Insider research is on-going
- findings 2009
- development of tools checklists to help
identify those who may merit further attention
34(No Transcript)