natacs-logo-192x85

Insider Threat

Insider threat refers to individuals with privileged access to sensitive areas and/or information who intentionally or unwittingly misuse or allow others to misuse this access to exploit vulnerabilities in an effort to compromise security or facilitate criminal activity, terrorism, or other illicit actions that inflict harm to people, an organization, the air transportation system or national security.

 

This Sneaky Fraud Attack Looks Like an Email Forwarded by Your Boss

Published by ZDNet 4 October 2022

"A business email compromise (BEC) campaign is using an email thread that pretends to have been forwarded by the boss in a bid to trick targets into handing over big sums of money.

"Not only are BEC attacks one of the most lucrative forms of cybercrime – the FBI says they've cost victims a combined total of more than $43 billion in recent years – but they're also one of the simplest to carry out because all attackers really need is an internet connection, an email account and perhaps some background research into their targets."

To read this article, click here.

 

 

AAAE and TSA Offer Airports Virtual Training to Mitigate the Insider Threat

Published by Homeland Security Today 20 September 2022

"For National Insider Threat Awareness Month, the Transportation Security Administration (TSA) and the American Association of Airport Executives (AAAE) are encouraging the use of a recently developed virtual insider threat training course. 

"The two organizations jointly developed the virtual training to help badged employees at airports recognize and report behaviors and activities that could indicate a threat to airport safety and security. The association is making the course available to aviation workers through its various training services that are used by hundreds of airports across the country."

To read this article, click here.

 

 

Tupelo Regional Airport Officials To Review Security After Stolen Plane Incident

Published by AviationPros 7 September 2022

"Sep. 6—TUPELO — Officials with the Tupelo Regional Airport say they will review security procedures after Saturday's incident in which a plane was stolen by a Flight-Based Operator (FBO) employee.

"We're doing a review to see if there's anything we could have done," said airport director Joe Wheeler. "We'll be meeting with the TSA (on Sept. 7) for a debriefing, and we'll go from there."

To read this article, click here.

 

 

Crash Threat Over Mississippi Skies Ends with Pilot’s Arrest

Published by AP News 3 September 2022

"RIPLEY, Miss. (AP) — An airport worker who knew how to take off but not land stole a small airplane Saturday and threatened to crash it into a Walmart, circling for five hours over unnerved Mississippians before ending the flight safely in a soybean field where police arrested him."

To read this article, click here.

 

 

September is National Insider Threat Awareness Month

The National Insider Threat Awareness Month (NITAM) website states: "an insider threat will use her/his authorized access, wittingly or unwittingly, to do harm to the security of the United States. This threat can include damage to the United States through espionage, terrorism, unauthorized disclosure of national security information, or through the loss or degradation of departmental resources or capabilities. Use these tips to counter insider threats in your organization."

Visit the NITAM website here.

 

 

What is a Social Engineering Attack?

Published by Small Business Trends 11 August 2022

"Social engineering attacks refer to a wide range of tactics that rely on human error rather than vulnerabilities in systems. Hackers employ social engineering to trick users into getting money, collecting sensitive information, or installing malware on their computer systems.

"In this article, we will explore critical types of social engineering attacks and how you can prevent them. Let’s dive in:"

To read this article, click here.

 

 

Spanish Police Arrest 2 Nuclear Power Workers for Cyberattacking the Radiation Alert System

Published by The Hacker News 29 July 2022

Insider threat is a risk that impacts every industry. Whenever a company grants access to sensitive systems or data, it becomes vulnerable. Here is an example of a recent insider threat that could have led to a catastrophic event. 

To read this story, click here.

 

 

Ex-CIA Engineer Convicted in Massive Theft of Secret Info

Published by Associated Press 13 July 2022

"NEW YORK (AP) — A former CIA software engineer was convicted Wednesday of federal charges accusing him of the biggest theft of classified information in CIA history..."

"Prosecutors alleged the 33-year-old Schulte was motivated to orchestrate the leak because he believed the CIA had disrespected him by ignoring his complaints about the work environment. So he tried “to burn to the ground” the very work he had helped the agency to create, they said."

To read this article, click here.

 

 

Former Cargo Handler at LAX Sentenced to One Year in Prison for Stealing Four Gold Bars Headed from Australia to New York

Published by United States Department of Justice 27 June 2022

"LOS ANGELES – A former cargo handling company employee at Los Angeles International Airport was sentenced today to 12 months in federal prison for stealing four gold bars that were part of a larger shipment headed from Australia to New York."

To read this press release, click here.

 

 

Jury Convicts Former CIA Officer of Espionage

Published by United States Department of Justice 8 June 2022

"ALEXANDRIA, Va. – A federal jury convicted a former Central Intelligence Agency case officer today on espionage charges related to his transmission of classified documents to an agent of the People’s Republic of China.

"According to court records and evidence presented at trial, in March and April 2017, Kevin Patrick Mallory, 61, of Leesburg, travelled to Shanghai and met with an individual, Michael Yang, whom he quickly concluded was working for the People’s Republic of China Intelligence Service (PRCIS). During a voluntary interview with FBI agents on May 24, 2007, Mallory stated that Yang represented himself as working for a People’s Republic of China think tank, however Mallory stated that he assessed Yang to be a Chinese Intelligence Officer."

To read this press release, click here.

 

 

Combatting the Malicious and Unwitting Insider Threat

Published by techradar 3 June 2022

"Adage tells us that a chain is only as strong as its weakest link. This maxim can be applied to many walks of life, but it feels particularly pertinent in the cybersecurity space as an organization's cyber posture is only as secure as its own employees. This is not to say that employees are always at fault for security lapses – staff can be a huge asset to their firm’s security posture when properly educated on best practice – but they can certainly be a vulnerability and are often seen by hackers as a potential chink in the armor of cyber defenses."

To read this article, click here.

 

 

Chemist Sentenced for Stealing Trade Secrets, Economic Espionage and Wire Fraud

Published by The United States Department of Justice 9 May 2022

"A federal judge in Greeneville, Tennessee, sentenced a Michigan woman today to 168 months, the equivalent of 14 years, in prison for a scheme to steal trade secrets, engage in economic espionage and commit fraud. The defendant was also ordered to serve three years of supervised release and pay a $200,000 fine."

To read this press release, click here.

 

 

Jack Dorsey's Block Confirms Data Breach After Former Employee Accessed Consumer Info of Cash App

Published by Tech Times 5 April 2022

To prevent a data breach when an employee leaves, organizations should have policies in place that immediately removes that person's access to sensitive data. A recent breach shows what can happen when this does not occur. 

To read this article, click here.

 

 

Insider Threats and How to Beat Them!

Published by IOT-NOW.COM 25 March 2022

"If you want advice on how to protect your organisation from Insider Threats go to the top as we did. In the latest Trending Tech Podcast, Eric Chilton, retired Special Agent in Charge of the USA’s Defense Counterintelligence & Security Agency outlines the key threatsAnd Ed Finegold, Chicago-based Tech Author & Analyst, discusses new research showing the scale of the cyber security problem facing every business today."

To listen to this podcast, click here.

 

 

The Enemy Within: Are Insider Threats Damaging Our Trust With Employees?

Published by Forbes 24 March 2022

"Trust: It's an essential component of organizational effectiveness. Companies that build a culture of accountability are acknowledged to operate more effectively than companies that don't. Employers need to trust their workforce to become successful—that's a fact.

"So, with this in mind, will it ever be possible to stop an attack from within?"

To read this article, click here.

 

 

FBI Director Wray Says Scale of Chinese Spying In The U.S. 'Blew Me Away'

Published by NBC News 1 February 2022

"Chinese spying in the U.S. has become so widespread that the FBI is launching an average of two counterintelligence investigations a day to counter the onslaught, FBI Director Christopher Wray said in an interview."

To watch the interview, click here.

 

 

Home Working Drives 44% Surge in Insider Threats

Published by Infosecurity Magazine 26 January 2022

"Insider threats cost organizations an average of over $15m annually to remediate last year, with stolen credentials a growing risk, according to Proofpoint.

"The security vendor’s 2022 Cost of Insider Threats Global Report was compiled from interviews with over 1000 IT professionals and analysis of more than 6800 incidents across the globe."

To read this article, click here.

 

 

Careless Employees Behind The Majority Of Insider Threat Incidents: Report

Published by Cybersecurity Dive 25 January 2022

"Over the last 12 months, more than half of insider threat security incidents, 56%, were caused by negligent or careless employees, according to research from Ponemon Institute and sponsored by Proofpoint. The report, released Tuesday, surveyed more than 1,000 IT and IT security professionals globally in organizations that experienced at least one material event from an insider."

To read this article, click here.

 

 

Insider Threat Mitigation

Published by Cybersecurity & Infrastructure Security Agency

"Insider threat incidents are possible in any sector or organization. An insider threat is typically a current or former employee, third-party contractor, or business partner. In their present or former role, the person has or had access to an organization's network systems, data, or premises, and uses their access (sometimes unwittingly). To combat the insider threat, organizations can implement a proactive, prevention-focused mitigation program to detect and identify threats, assess risk, and manage that risk - before an incident occurs."

To read this article, click here.

 

 

Insider Threats: An Age-Old Problem

Published by Forbes 2 November 2021

"Most people agree that insiders pose a significant risk to business. This isn’t breaking news.

"Chris Krebs, previous CISA Director, recently spoke about this issue and called for legislation to crack down on insider threats, stating, “When you’re talking about companies that are providing a service to the federal government — not just the Department of Defense but the civilian agencies as well — I would expect to see enhanced requirements not just on the external threat management, but also insider threat management.

"Insider threats are indeed an issue — not just for defense contractors, but arguably for any organization with sensitive information."

To read this article, click here.

 

 

Four Insider Threats Putting Every Company At Risk

Published by Forbes 6 October 2021

"Few concerns keep business leaders up at night like the threat of a cybersecurity incident. With the average cost of a data breach exceeding $4 million for the first time and public sentiment, regulatory requirements and practical functionality firmly against companies that can’t protect their digital landscape, many leaders are reprioritizing cybersecurity in response to this increasingly urgent reality. 

"According to Gartner’s 2021 CIO Agenda Survey, cybersecurity is the top spending priority for 61% of leaders as they work to address rapidly shifting risks and responsibilities."

To read this article, click here.

 

 

Cyber Improvements Could Lead To More Insider Targeting, Intel Official Says

Published by Federal News Network 5 October 2021

"As federal agencies and U.S. industry bolster their cybersecurity defenses, foreign intelligence agencies are likely to ramp up their targeting of trusted insiders, according to the director of the National Insider Threat Task Force.

"Bob Rohrer, who has led the task force since January, said the successful implementation of zero trust architectures and other least-privilege principles could make it harder for foreign spies to pilfer U.S. secrets by exploiting gaps in network defenses. President Joe Biden has directed agencies to adopt zero trust architectures as part of his May cyber executive order."

To read this article, click here.

 

 

National Insider Threat Awareness Month Focuses on Workplace Culture

Published by Homeland Security Today 3 September 2021

"The NITAM campaign seeks to encourage employees in government and the private sector to recognize behaviors of concern and report them so early intervention can occur.

"The National Counterintelligence and Security Center (NCSC), the National Insider Threat Task Force (NITTF), the Office of the Under Secretary of Defense Intelligence and Security, the Defense Counterintelligence and Security Agency, and the Department of Homeland Security launched the third-annual “National Insider Threat Awareness Month” (NITAM)."

To read this article, click here.

 

 

25 Tips for Preventing, Detecting, and Responding to Today’s Insider Threat

Published by Loss Prevention Magazine 1 September 2021

"The insider threat has evolved beyond the reach of employee bag checks and point-of-sale cameras. For all organizations, retailers included, the threat surface that employees can attack has grown, and so have the types of assets that they can exploit, misuse, or mistakenly expose. Never has so much of value been this accessible to a company’s workforce. Never have companies been so vulnerable to their dishonesty, mistakes, or retribution."

To read this article, click here.

 

 

Navigating Old and New Threats as Employees Return to Office Post-Pandemic

Published by Homeland Security Today 6 July 2021

Company executives face several challenges in moving employees from remote work back to the office environment. Before making the shift, it is a good idea to sit down and consider the potential threats that could arise and how to mitigate the risks. 

To read this article, click here

 
 
 
 

Off-Duty Flight Attendant Identified as 'Unruly Passenger' Who Forced Delta Flight to Divert

Published by USA Today 12 June 2021

In the past year, the number of incidents involving misbehaving passengers and flight attendants has risen substantially. In a recent case, the passenger turned out to be an off-duty flight attendant for the airline.  

To read this article, click here

 

 
 
 

Airport Worker Arrested And Charged With Dug Trafficking And Money Laundering

Published by The Sydney Morning Herald 11 June 2021

Organized criminal groups are actively infiltrating its members into airports and aviation companies as employees, according to the Australian Federal Police (AFP). Hundreds of organized crime figures were recently arrested as a result of the AFP's latest operation.

To read this article, click here

 
 
 
 

Minimizing Threats From Employees As They Return To Work

Published by Intelligent CIO 25 May 2021

In the past year, many companies moved their employees to a remote working status in response to the COVID-19 pandemic. Now, as they make plans to bring these employees back into the office, compromised devices is a big concern. 

To read this article, click here

 
 
 

Defense Department Linguist Pleads Guilty to Transmitting Highly Sensitive Classified National Defense Information to Aid a Foreign Government

Published by United States Department of Justice 26 March 2021

There is always a level of risk involved when a person is provided access to sensitive and top secret information. If that person betrays the trust they are given, the lives of others can be put at risk. One woman is facing a prison term of up to life for her role in providing top-secret files to a terrorist organization. 

To read this press release, click here.

 
 
 
 

FAA Employee Charged After Self-described “Treason and Espionage”

Published by Plane&Pilot 4 March 2021

Employees who become insider threats are motivated by a number of factors, making it challenging for companies and agencies alike to identify them before they act. In this case, an FAA employee was seeking asylum and over $25 million from three different countries in exchange for sensitive information.

To read this article, click here

 
 
 

Insider Threat Resources

Published by Cybersecurity & Infrastructure Security Agency November 2020

Avoid falling victim to Insider Threats. Check out these multiple resources provided by the Cybersecurity & Infrastructure Security Agency (CISA):

To view these resources, click here.

 
 
 

TSA Officers Catch Contract Employee With Loaded Gun

Published by Homeland Security Today 31 October 2020

Insider threat doesn’t just involve employees, it can involve contractors as well. Recently, a loaded gun was confiscated from a contract employee. The firearm was discovered when the man was flagged for additional screening during a random inspection by TSA officers.

To read this article, click here

 
 
 

Data-Driven Resilience: How Agencies Can Protect Against Insider Threats

Published by Homeland Security Today 9 October 2020

During a two-year period, including 2020, there was a 47% increase in breaches caused by insider threat. In addition to this risk, agencies must also watch out for risks generated by the increasing number of employees working from home.

To learn more, click here

 

 
 
 

Is Your Agency’s Insider Threat Strategy Missing This Major Element?

Published by Homeland Security Today 29 September 2020

National Insider Threat Awareness Month (NITAM) may be coming to an end, but you can still take proactive steps in mitigating your operation’s risk. Insider threat can cause more damage than you think. Ensure your operation’s insider threat strategy isn’t lacking important factors.

To read this article, click here

 
 
 
 

Top 10 Tips to Prevent Insider Threats

Published by Security Boulevard 9 September 2020

Are you aware of the possible threats that could occur within your organization? Do you have a plan in place to prevent these threats? If not, take a moment to look over these top 10 tips to help mitigate insider threat. Just because something hasn’t happened yet, doesn’t mean it can’t happen eventually.

To read these tips, click here

 
 
 
 

Mapping the Motives of Insider Threats

Published by Help Net Security 8 September 2020

What are some of the motivators that lead insiders to commit a crime? What if there is no motive, and it was simply human error? Considering its National Insider Threat Awareness Month, it’s a great opportunity to educate yourself on this topic to help mitigate possible threats to your organization.

For more information on these motives, click here

 

 

Russian Arrested For Trying to Recruit an Insider and Hack a Nevada Company

Published by ZDNet 26 August 2020

A Nevada company’s employee, in partnership with the FBI, was able to prevent a Russian group from launching a planned ransomware attack. The FBI was brought in when the employee was approached by a member of the group in a recruiting attempt.

To read this article, click here

 
 
 
 

FBI Arrests Border Patrol Agent for Narcotics Trafficking

Published by Homeland Security Today 11 August 2020

Phoenix Sky Harbor International Airport was the scene of a recent alleged case of drug trafficking. A vehicle at the airport was found with two bags that were filled with fentanyl, cocaine and heroin. The bags were traced to a Border Patrol Agent, who is now facing up to life in prison and multiple charges.

To read this article, click here

 

 

 

 

Soft Skill Strategies for Handling Insider Threats Ethically

Published by Info Security Group 6 July 2020

Insider threat can be detrimental to your organization; that’s why it’s important to have a strategy in place. This article provides detailed information on different, proactive tactics to mitigate against possible threats. Info Security Group says, “While technical skills and knowledge are critical in the information security landscape, it is unquestionably important to remember that insider threats involve humans, hence, we cannot neglect the use of soft skills to manage incidents.”

To learn more, click here. 

 

 

 

 

Protecting From Insider Threats in The Transportation Sector

Published by Federal News Network 1 June 2020

Learn more about protecting against insider threat with Transportation Security Specialist, Dean Walter and Supervisory Air Marshal in Charge, Serge Potapov. They both join Tom Temin, via podcast, as they discuss insider threats in the transportation sector.

To listen to this podcast, click here

 
 
 
 

Insider Threat Roadmap 2020

Published by Transportation Security Administration

The Transportation Security Administration (TSA) has released a new Insider Threat Roadmap. The roadmap focuses on three overarching priorities:

   1) promoting data-driven decision making to detect threats;
   2) advancing operational capability to deter threats; and
   3) maturing capabilities to mitigate threats to the transportation sector.
 

To view this roadmap, click here.

 

 

Insider Threat in Civil Aviation

Published by International Air Transport Association

The International Air Transport Association (IATA) provides an in-depth look into the impact insider threat has within the aviation industry. IATA gives a detailed description of insider threat and offers guidance to help operators mitigate possible risks. IATA also outlines the importance of having security measures in place to ensure proper visibility and awareness of the issue, with the purpose of putting a stop to it as soon as possible.

To read this article, click here. 

 
 
 
 

Department of Homeland Security - Insider Threat Overview

Published by Department of Homeland Security

It's important to educate yourself on the topic 'insider threat' so you can know what signs to look for and how to prevent the threat. The Department of Homeland Security (DHS) provides detailed information on their approach to help mitigate the risks and other helpful resources. DHS states, "Increasingly, insider threat cases and high-profile data leaks illustrate the need for strong insider threat programs within organizations. The number of infamous and damaging attacks against the government illustrates that the threat posed by trusted insiders is significant."

To read this overview, click here.

 
 
 
 

Flight Risk' Employees Involved in 60% of Insider Cybersecurity Incidents

Published by ZDNet 20 May 2020

ZDNet states, “Employees planning to leave their jobs are involved in 60% of insider cybersecurity incidents and data leaks, new research suggests.” Many aspects of the aviation industry are sensitive and require protection. Take a moment and think... what if one of your employees resigned and took with them critical security information regarding your operation? Do you have a plan in place to mitigate insider threat? If you don’t, you may want to look into it.

To read this article, click here.

 

 

Innocent Insider Threats: Defending Against Human Error

Published by Intelligent CIO 21 April 2020

The topic of insider threat involves entities or individuals that have access to and/or knowledge of an organization that is not intended for the public eye. The most common type of insider threat stems from employee’s lack of knowledge, which would be detrimental to an organization. It could be as simple as human error or employee's not following company guidelines. It’s important your organization have programs in place to avoid falling victim to these threats.

To read this article, click here.

 

 
 
 

Protecting Against Cybersecurity Threats When Working From Home

Published by The National Law Review 11 March 2020

How can we stop the spread of coronavirus? The answer - isolation. While the answer seems simple, it's not that easy to isolate yourself when you have to get up every morning and go to work. 

Organizations are taking extreme efforts to help stop the spread of COVID-19; some entities are advising staff to start working from home. Even though that helps mitigate exposure, there are concerns about how to keep sensitive information and data secured. The National Law Review provides some great tips on how to remain secure with remote employees.

To read this article, click here.

 

 

3 Tips to Stay Secure When You Lose an Employee

Published by Dark Reading 10 March 2020

Dorothy in ‘The Wizard of Oz,’ says it perfectly, “People come and go so quickly…” This still rings true today with regards to company turnover rates. Some employees stay with a company for years, some only a few weeks. Whatever the case - when a company and employee go their separate ways, it is important to have proper precautions in place to mitigate possible threats. This article spotlights three tips on how to remain secure when ending a business relationship.

To learn how to protect your operation, click here.

 
 
 
 

A Study of Insider Threat; What Can We Do to Alter User Behaviour and 
Mitigate the Risk of Insider Threats

Published by IS Decisions

The topic of ‘Insider Threat’ is something all business entities should be aware of. A recent study gives an in-depth look into this important subject and different ways to help reduce exposure. The study focuses on four critical areas of insider threat:

1. Six common insider threat personas
2. Password sharing
3. User awareness
4. How to mitigate risk

To read this study, click here.

 

 

 

Indictment: Ex-Raytheon Engineer in Tucson Traveled to China With Missile Data on Laptop

Published by Tuscon Daily Star 5 February 2020

After he was specifically instructed not to take his employer-owned laptop with him to Asia, an ex-Raytheon engineer did just that. The laptop, which held sensitive data on the company’s missile systems, was used in Hong Kong, Cambodia and China. Now, he faces an indictment for violating the International Traffic in Arms Regulation (ITAR).

To read this article, click here.

 

 

'Careful Who You Hire': Gas Station Employee Steals $17,000 Worth of Items, Employment Folder

Published by KSBW 8 News 4 February 2020

A brand-new gas station employee took over $17,000 in items and his employment folder. The store owner, who does not know the man’s name, discovered the theft after checking his store’s camera through an application on his cellphone and seeing the employee was gone.

To read this story, click here.

 

 

Containing the Threat From Within: The Growing Risk of Insider Attacks

Published by Forbes 31 January 2020

Large companies like Capital One and Tesla have recently become victims of insider attacks, highlighting the need for companies to take notice of models like zero trust.

To read this article, click here.

 

 

'Pressured' Postal Worker in Virginia Hid Undelivered Mail in Storage Unit: Reports

Published by Fox News 30 January 2020

Citing pressure and not having enough time, a worker with the United States Postal Service kept mail in a storage facility in Virginia Beach, Virginia, instead of delivering it. The undelivered mail included tax return documents, mail from the Department of Motor Vehicles, mail from the IRS and bank statements.

To read this article, click here.

 

 

Fake Exec Tricks New York City Medical Center into Sharing Patient Info

Published by infosececurity magazine 30 January 2020

A medical center in New York City is re-examining its cybersecurity defenses after it fell victim to a phishing scam. After claiming to be an executive of the facility, an unauthorized actor received personal information on 674 patients.

To read this article, click here.

 

 

Insider Threat Mitigation

Published by Department of Homeland Security

Does your company have an insider threat program? This set of tools from the Cybersecurity and Infrastructure Security Agency (CISA) shows you how to designate a senior manager, implement a formal training and awareness program, develop governance and policy documents, and more.

To view these tools, click here.

 

 

A Guide to Insider Threats

Posted by Meta Compliance 17 September 2019

Insider threats can come from anywhere within your organization. Learning the warning signs and preparing a defense can help you mitigate the risk to your company.

To learn more about insider threat, click here.

 

 

Is Your Company Safe From Insider Threat?

Posted by Claudia Culmone on 28 January 2019

First, what is an insider threat? According to the Transportation Security Administration’s (TSA) 2018 Report of the Aviation Security Advisory Committee on Insider Threats at Airports, “The term insider threat refers to individuals with privileged access to sensitive areas and/or information, who intentionally or unwittingly misuse or allow others to misuse this access to exploit vulnerabilities in an effort to compromise security, facilitate criminal activity, terrorism, or other illicit actions which inflict harm to people, an organization, the air transportation system or national security.”

With that definition in mind, let’s examine the components of insider threat and how you can protect your operation from them.

To read this article, click here.