Behavioral Indicators of Insider Threat: Looking Forward Dr. - - PowerPoint PPT Presentation

behavioral indicators of insider threat looking forward
SMART_READER_LITE
LIVE PREVIEW

Behavioral Indicators of Insider Threat: Looking Forward Dr. - - PowerPoint PPT Presentation

Behavioral Indicators of Insider Threat: Looking Forward Dr. Robert Gallagher Guardian Defense Group NITSIG Board Member Insider Threat Indicator Lists Everybody loves a list If we had a single and comprehensive list of THE behavioral


slide-1
SLIDE 1

Behavioral Indicators of Insider Threat: Looking Forward

  • Dr. Robert Gallagher

Guardian Defense Group NITSIG Board Member

slide-2
SLIDE 2

Insider Threat Indicator Lists

  • Everybody loves a list
  • If we had a single and comprehensive list of THE behavioral

indicators of insider threat, all we would need to do is screen for or monitor those indicators and we could eliminate all insider threats

  • Everybody has a list
  • Cursory search turned up more than 20 distinct lists of behavioral

indicators

  • Lists vary from a handful to hundreds of items
slide-3
SLIDE 3

Three Primary Approaches to List Development

  • Reverse Engineering Cases
  • Study and identify precursors to action in known cases
  • Rational Approach – SME
  • Rely on logic and experience
  • Science
  • Those items that discriminate between good and bad actors
slide-4
SLIDE 4

The Problem With Lists

  • Humans are Messy:
  • An indicator in one setting may not be an indicator in another
  • An indicator for one person may not be an indicator for another
  • An indicator for me one day may not be an indicator on another day
  • False Positives:
  • The base rate of insider threat is very small
  • For almost any indicator there will be more non-malicious actors doing it than

malicious actors

  • General Flaws:
  • Reverse engineering of past events leads to a backwards orientation
  • Lists tend to treat all indicators as equally indicative
  • People tend to personalize and minimize selected items
  • Lists tend to reduce critical thinking
slide-5
SLIDE 5

Alternate Approaches

  • Anomaly detection
  • Identify and assess any behavior that violates statistical norms
  • Cultural and contextual aberrance
  • Identify and assess any behaviors that violate the behavioral norms of the
  • rganization
  • Critical Pathway Modelling
  • Logical progression of risk from Precursors to full Insider Threat
slide-6
SLIDE 6

The “Critical Path” to Insider Threat Risk: A Behavioral Model

Sources: Shaw, E. and Sellers, L. (2015); Carnegie Mellon Univ. (2006-present)

PERSONAL PREDISPOSITIONS

M edical/ psychiatric conditions Affiliation risks Attitudinal Challenges Authority Problems Personality or social skill deficits Previous rule violations Decision making deficits

STRESSORS

Personal Financial Professional

CONCERNING BEHAVIORS

Interpersonal Technical Financial Personnel M ental health social network Suspicious travel INSIDER THREAT LIKE BEHAVIORS Malicious Acts

NOT EVERYONE WITH THESE ISSUES is an Insider Threat NOT EVERYONE WITH THESE ISSUES is an Insider Threat NOT EVERYONE WITH THESE ISSUES is an Insider Threat Problematic Organizational Response: Inattention No risk assessment process Inadequate investigation

  • ther actions escalate risk
slide-7
SLIDE 7

Concerning Behaviors

Frequent duels Multiple resignations Circumvents Congress Deifies orders Use position for personal gain Secret comms with enemy Marries loyalist

Insider Threat

Espionage Defection

Case Example: Benedict Arnold

Predispositions

Arrogant Imaginative Innovative Daring Reckless Narcissistic Entitled Overly Sensitive Quick to anger Quick to action Financially driven Rule violator Saboteur Subversive Previous arrests Few Consequences Enemy affiliations

Stressors

Alcoholic father Crippling physical injuries War trauma Professional reversals Personal losses Family deaths Crushing debts Interpersonal conflicts Constant Disgruntlement

Organizational Response

Congressional censure Washington rebuke Court martial Passed over for command Billed for war debts

t

slide-8
SLIDE 8

Conclusions

  • There is no single definitive list of behavioral indicators of insider

threat (and perhaps there never should be)

  • Insider threat is a dynamic human problem and requires a dynamic

human solution

  • Overreliance on lists of behavioral indicators may cause us to focus
  • n the wrong behaviors, suspend critical thinking, or reach inaccurate

conclusions

  • All concerning behaviors should be viewed within the individual,
  • rganizational and cultural context
slide-9
SLIDE 9
  • Dr. Robert Gallagher

rgallagher@gdgllc.us 301-318-0245

Questions