Advertisement

Insider Threat: Applying No Dark Corners Defenses

Living reference work entry

Abstract

Unlike a frontal attack, an insider threat is a menace that operates from within established defenses and also possesses legitimate access to targets. Insider threat studies draw from many disciplines, with cyber-centric studies currently dominating the field. All disciplines hew to the convention of over-relying on experts and imposing heavy burdens on employees who pose no threat. One possible rationale is that experts see the insider threat as a problem when it is a predicament requiring a higher level of interpretive thinking to address.

Contrary to accepted wisdom, the No Dark Corners approach places monitoring responsibility at the co-worker level, rather than in the exclusive hands of experts, and broadly fosters an environment of transparency where co-workers function as copilots who take an active hand in their own protection. The ultimate aim is denying hostile insiders the opportunity to inflict harm by eliminating their ability to exploit institutional vulnerabilities that represent the dark corners from which an adversary needs to operate in order to penetrate and strike the targeted organization.

A strategy canvas depicts the contrasts between the conventional approach and No Dark Corners. The role of some other prominent aspects of insider threats and defenses is also discussed, including deception, knowledgeable escort, lawful disruption, and the curse of the indelicate obvious. Some societal implications and applications are also explored in broad strokes.

Keywords

Insider threat No Dark Corners Predicament Copilot Background investigations Random audits Lawful disruption Deception Curse of the indelicate obvious Strategy canvas 

References

  1. Adams S (2018) “Intelligence scale,” Theme of second Periscope broadcast of Jan 4, 2018. Retrieved 4 Jan 2018 from https://www.pscp.tv/w/bR07HDFEWUVYVnFMcnh2S2d8MXJteFBPQVJ2QmdKTkoDwNfw0-C7hWoOCobaYJXCiC6ZdBbJHTrviP6VbJYX
  2. Antokol N, Nudell M (1988) The handbook for effective emergency and crisis management. Lexington Books, Lexington, p 3Google Scholar
  3. Carney RM (1994) The enemy within. In: Sarbin T, Carney R, Eoyang C (eds) Citizen espionage: studies in trust and betrayal. Praeger, Westport, pp 18–38Google Scholar
  4. Catrantzos N (2009) No dark corners: defending against insider threats to critical infrastructure, MA thesis, Center for Homeland Defense and Security, Naval Postgraduate School, MontereyGoogle Scholar
  5. Catrantzos N (2010a) No dark corners: a different answer to insider threats. Homeland Secur Aff 6, Article 5. Retrieved 3 Jan 2018 from https://www.hsaj.org/articles/83
  6. Catrantzos N (2010b) Defending against the threat of insider financial crime. Frontline Security, pp 17–19. Retrieved 6 Jan 2018 from http://security.frontline.online/content/insider-financial-crime
  7. Catrantzos N (2012) Managing the insider threat: no dark corners. CRC Press, Boca RatonCrossRefGoogle Scholar
  8. Choudhury SR (2018) Tech giant is rolling out new robots to replace workers in hotels, airports and supermarkets, CNBC Business News, January 4, 2018. Retrieved 4 Jan 2018 from https://www.cnbc.com/2018/01/04/south-koreas-lg-electronics-to-introduce-new-robots-at-ces-2018.html
  9. Cole E (2017) Defending against the wrong enemy: 2017 SANS insider threat survey, SANS Institute InfoSec Reading Room, Sponsored by Dtex, Haystax Technology, and Rapid 7, August 2017. Retrieved 18 Aug 2017 from https://www.sans.org/reading-room/whitepapers/analyst/defending-wrong-enemy-2017-insider-threat-survey-37890
  10. Colwell LH, Miller HA, Lyons PM Jr, Miller RS (2006) The training of law enforcement officers in detecting deception: a survey of current practices and suggestions for improving accuracy. Police Q 9(3):275–290CrossRefGoogle Scholar
  11. Donovan F (2016) IT admins to users: do as I say, not as I do: survey of IT admins at RSA finds some IT admins never change admin credentials at all, RSA Conference Survey, April 7, 2016. Retrieved 5 May 2016 from http://www.fierceitsecurity.com/story/it-admins-users-do-i-say-not-i-do/2016-04-07
  12. Drucker P (2002) Managing in the next society. Truman Talley Books St. Martin’s Press, New York, p 36Google Scholar
  13. Evanina B (2017) Defusing leakers means knowing what makes them tick, The Cipher Brief, September 13, 2017 (issue on tackling insider threat ranging from leaking classified information to workplace violence, in interview of National Counterintelligence and Security Center Director Bill Evanina). Retrieved 18 Sept 2017 from https://www.thecipherbrief.com/column/strategic-view/defusing-leakers-means-knowing-makes-tick
  14. Farson R (1996) Management of the absurd: paradoxes in leadership. Simon & Schuster, New York, pp 6–7Google Scholar
  15. Fein RA, Vossekuil B, Pollack WS, Borum R, Modzelski W, Reddy M (2002) Threat assessment in schools. U.S. Secret Service/U.S. Department of Education, Washington, DC, pp 33–38Google Scholar
  16. Hanson VD (2017) Nation v. Tribe, Defining Ideas: A Hoover Institution Journal, December 6, 2017. Retrieved 8 Jan 2018 from https://www.hoover.org/research/nation-v-tribe
  17. Herbig KL (2008) Changes in espionage by Americans: 1947–2007, Technical report 08–05. Defense Personnel Security Research Center, MontereyCrossRefGoogle Scholar
  18. Herley C (2009) So long, and no thanks for the externalities: The rational rejection of security advice by users, In: Proceedings of the new security paradigms workshop, Oxford, 8–11 Sept 2009, pp 1–12Google Scholar
  19. Just DR (2014) Introduction to behavioral economics. Wiley, Hoboken, pp 465–466Google Scholar
  20. Kim C, Mauborgne RA (2005) Blue ocean strategies. Harvard Business Press, Boston, pp 12–15Google Scholar
  21. Ruffini JA (2006) When terror comes to main street. Archangel Group, Denver, p 201Google Scholar
  22. Shaw ED, Fischer LF (2005) Ten tales of betrayal: the threat to corporate infrastructures by information technology insiders. Defense Personnel Security Research Center, Monterey, p 34Google Scholar
  23. Shifflett CM (1999) Aikido exercises for teaching and training. Round Earth Publishing, Berkeley, p 20Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Center for Homeland Defense and SecurityNaval Postgraduate SchoolMontereyUSA

Section editors and affiliations

  • Alexander Siedschlag
    • 1
  1. 1.School of Public AffairsThe Pennsylvania State University – Penn State HarrisburgMiddletownUSA

Personalised recommendations