The CERT Guide To Insider Threats: How Prevent, Detect, And Respond Information Technology Crimes (Theft, Sabotage, Fraud) 2012 Threats

2012-The%20CERT%20Guide%20to%20Insider%20Threats

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 430 [warning: Documents this large are best viewed by clicking the View PDF Link!]

ptg7481383
ptg7481383
The CERT® Guide to
Insider Threats
ptg7481383
The SEI Series in Software Engineering represents is a collaborative
undertaking of the Carnegie Mellon Software Engineering Institute (SEI) and
Addison-Wesley to develop and publish books on software engineering and
related topics. The common goal of the SEI and Addison-Wesley is to provide
the most current information on these topics in a form that is easily usable by
practitioners and students.
Books in the series describe frameworks, tools, methods, and technologies
designed to help organizations, teams, and individuals improve their technical
or management capabilities. Some books describe processes and practices for
developing higher-quality software, acquiring programs for complex systems, or
delivering services more effectively. Other books focus on software and system
architecture and product-line development. Still others, from the SEI’s CERT
Program, describe technologies and practices needed to manage software
and network security risk. These and all books in the series address critical
problems in software engineering for which practical solutions are available.
Visit informit.com/sei for a complete list of available products.
The SEI Series in
Software Engineering
ptg7481383
The CERT® Guide to
Insider Threats
How to Prevent, Detect, and Respond to
Information Technology Crimes
(Theft, Sabotage, Fraud)
Dawn Cappelli
Andrew Moore
Randall Trzeciak
Upper Saddle River, NJ • Boston• Indianapolis • San Francisco
New York • Toronto • Montreal • London • Munich • Paris • Madrid
Capetown • Sydney • Tokyo • Singapore • Mexico City
ptg7481383
The SEI Series in Software Engineering
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as
trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim,
the designations have been printed with initial capital letters or in all capitals.
CMM, CMMI, Capability Maturity Model, Capability Maturity Modeling, Carnegie Mellon, CERT, and CERT
Coordination Center are registered in the U.S. Patent and Trademark Office by Carnegie Mellon University.
ATAM; Architecture Tradeoff Analysis Method; CMM Integration; COTS Usage-Risk Evaluation; CURE; EPIC;
Evolutionary Process for Integrating COTS Based Systems; Framework for Software Product Line Practice;
IDEAL; Interim Profile; OAR; OCTAVE; Operationally Critical Threat, Asset, and Vulnerability Evaluation;
Options Analysis for Reengineering; Personal Software Process; PLTP; Product Line Technical Probe; PSP;
SCAMPI; SCAMPI Lead Appraiser; SCAMPI Lead Assessor; SCE; SEI; SEPG; Team Software Process; and TSP
are service marks of Carnegie Mellon University.
Special permission to reproduce portions of Carnegie Mellon University copyrighted materials has been
granted by the Software Engineering Institute. (See page 388 for details.)
Many of the designations used by manufacturers and sellers to distinguish their products are claimed as
trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim,
the designations have been printed with initial capital letters or in all capitals.
The authors and publisher have taken care in the preparation of this book, but make no expressed or
implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed
for incidental or consequential damages in connection with or arising out of the use of the information or
programs contained herein.
The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special
sales, which may include electronic versions and/or custom covers and content particular to your business,
training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate
and Government Sales, (800) 382-3419, corpsales@pearsontechgroup.com.
For sales outside the United States, please contact: International Sales, international@pearson.com.
Visit us on the Web: informit.com/aw
Cataloging-in-Publication Data is on file with the Library of Congress.
Copyright © 2012 Pearson Education, Inc.
All rights reserved. Printed in the United States of America. This publication is protected by copyright, and
permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval
system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or
likewise. To obtain permission to use material from this work, please submit a written request to Pearson
Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may
fax your request to (201) 236-3290.
ISBN-13: 978-0-321-81257-5
ISBN-10: 0-321-81257-3
Text printed in the United States on recycled paper at Courier in Westford, Massachusetts.
First printing, January 2012
ptg7481383
For Fred, Anthony, and Alyssa. You are my life—I love you!
—Dawn
For those who make my life oh so sweet: Susan, Eric, Susan’s
amazing family, and my own Mom, Dad, Roger, and Lisa.
—Andy
For Marianne, Abbie, Nate, and Luke. I am the luckiest person in
the world to have such a wonderful family.
—Randy
ptg7481383
This page intentionally left blank
ptg7481383
vii
Contents
Preface .......................................................................................................... xvii
Acknowledgments .................................................................................... xxxi
Chapter 1. Overview .........................................................................................1
True Stories of Insider Attacks ......................................................3
Insider IT Sabotage .......................................................................3
Insider Fraud ................................................................................4
Insider Theft of Intellectual Property ............................................5
The Expanding Complexity of Insider Threats ..........................6
Breakdown of Cases in the Insider Threat Database .................7
CERT’s MERIT Models of Insider Threats ..................................9
Why Our Profiles Are Useful ......................................................10
Why Not Just One Profile? .........................................................11
Why Didn’t We Create a Single Insider Theft Model? ...............12
Overview of the CERT Insider Threat Center ...........................13
Timeline of the CERT Programs Insider Threat Work ............16
2000 Initial Research ..................................................................16
2001 Insider Threat Study ..........................................................16
2001 Insider Threat Database .....................................................17
2005 Best Practices .....................................................................17
2005 System Dynamics Models ..................................................17
2006 Workshops ..........................................................................17
ptg7481383
viii Contents
2006 Interactive Virtual Simulation Tool ...................................18
2007 Insider Threat Assessment .................................................18
2009 Insider Threat Lab ..............................................................18
2010 Insider Threat Exercises .....................................................18
2010 Insider Threat Study—Banking and Finance Sector .........19
Caveats about Our Work .............................................................20
Summary .......................................................................................20
Chapter 2. Insider IT Sabotage .....................................................................23
General Patterns in Insider IT Sabotage Crimes ......................28
Personal Predispositions .............................................................28
Disgruntlement and Unmet Expectations ..................................31
Behavioral Precursors .................................................................35
Stressful Events ..........................................................................37
Tec hn ica l Pre cu rso rs an d Ac ces s Pa th s .......................................40
The Trust Trap .............................................................................45
Mitigation Strategies ....................................................................46
Early Mitigation through Setting of Expectations .....................47
Handling Disgruntlement through Positive Intervention .........49
Eliminating Unknown Access Paths ..........................................50
More Complex Monitoring Strategies ........................................52
A Risk-Based Approach to Prioritizing Alerts ............................53
Targe te d M oni to rin g ...................................................................55
Measures upon Demotion or Termination ..................................56
Secure the Logs ............................................................................56
Tes t Ba cku p an d Re cov er y P roc es s ..............................................57
One Final Note of Caution ..........................................................59
Summary .......................................................................................59
Chapter 3. Insider Theft of Intellectual Property ......................................61
Impacts ...........................................................................................66
General Patterns in Insider Theft of Intellectual
Property Crimes ............................................................................68
ptg7481383
ixContents
The Entitled Independent ............................................................69
Insider Contribution and Entitlement ........................................70
Insider Dissatisfaction ................................................................72
Insider Theft and Deception ........................................................74
The Ambitious Leader .................................................................78
Insider Planning of Theft ............................................................79
Increasing Access ........................................................................80
Organization’s Discovery of Theft ..............................................80
Theft of IP inside the United States Involving Foreign
Governments or Organizations ..................................................83
Who They Are .............................................................................85
What They Stole ..........................................................................86
Why They Stole ...........................................................................88
Mitigation Strategies for All Theft of Intellectual
Property Cases ..............................................................................88
Exfiltration Methods ...................................................................89
Network Data Exfiltration ..........................................................90
Host Data Exfiltration ................................................................93
Physical Exfiltration ...................................................................95
Exfiltration of Specific Types of IP ..............................................95
Concealment ...............................................................................95
Tru st ed Bu si nes s Pa rt ner s ..........................................................96
Mitigation Strategies: Final Thoughts .......................................97
Summary .......................................................................................98
Chapter 4. Insider Fraud ..............................................................................101
General Patterns in Insider Fraud Crimes ..............................106
Origins of Fraud .......................................................................108
Continuing the Fraud ...............................................................110
Outsider Facilitation ................................................................. 111
Recruiting Other Insiders into the Scheme ...............................113
Insider Stressors ........................................................................115
Insider Fraud Involving Organized Crime .............................115
ptg7481383
xContents
Snapshot of Malicious Insiders Involved with
Organized Crime.......................................................................116
Who They Are ...........................................................................117
Why They Strike .......................................................................118
What They Strike ......................................................................118
How They Strike .......................................................................118
Organizational Issues of Concern and Potential
Countermeasures ........................................................................120
Inadequate Auditing of Critical and Irregular Processes ..........120
Employee/Coworker Susceptibility to Recruitment ..................121
Verication of Modication of Critical Data .............................123
Financial Problems ...................................................................124
Excessive Access Privilege ........................................................125
Other Issues of Concern ............................................................125
Mitigation Strategies: Final Thoughts .....................................126
Summary .....................................................................................127
Chapter 5. Insider Threat Issues in the Software
Development Life Cycle ...........................................................129
Requirements and System Design Oversights .......................131
Authentication and Role-Based Access Control .......................132
Separation of Duties ..................................................................133
Automated Data Integrity Checks ............................................134
Exception Handling ..................................................................135
System Implementation, Deployment, and Maintenance
Issues ............................................................................................136
Code Reviews ............................................................................136
Attribution ................................................................................137
System Deployment ..................................................................137
Backups .....................................................................................139
Programming Techniques Used As an Insider
Attack Tool ...................................................................................139
Modification of Production Source Code or Scripts ..................140
Obtaining Unauthorized Authentication Credentials ..............141
Disruption of Service and/or Theft of Information ...................141
ptg7481383
xiContents
Mitigation Strategies ..................................................................142
Summary .....................................................................................143
Chapter 6. Best Practices for the Prevention and Detection
of Insider Threats ......................................................................145
Summary of Practices.................................................................146
Practice 1: Consider Threats from Insiders
and Business Partners in Enterprise-Wide
Risk Assessments ........................................................................151
What Can You Do? ...................................................................151
Case Studies: What Could Happen if I Don’t Do It? ................152
Practice 2: Clearly Document and Consistently
Enforce Policies and Controls ...................................................155
What Can You Do? ...................................................................155
Case Studies: What Could Happen if I Don’t Do It? ................156
Practice 3: Institute Periodic Security Awareness
Training for All Employees .......................................................159
What Can You Do? ...................................................................159
Case Studies: What Could Happen if I Don’t Do It? ................162
Practice 4: Monitor and Respond to Suspicious
or Disruptive Behavior, Beginning
with the Hiring Process .............................................................164
What Can You Do? ...................................................................164
Case Studies: What Could Happen if I Don’t Do It? ................166
Practice 5: Anticipate and Manage Negative
Workplace Issues ........................................................................168
What Can You Do? ...................................................................168
Case Studies: What Could Happen if I Don’t Do It? ................169
Practice 6: Track and Secure the Physical Environment ........171
What Can You Do? ...................................................................171
Case Studies: What Could Happen if I Don’t Do It? ................173
Practice 7: Implement Strict Password- and Account-
Management Policies and Practices .........................................174
What Can You Do? ...................................................................174
Case Studies: What Could Happen if I Don’t Do It? ................176
ptg7481383
xii Contents
Practice 8: Enforce Separation of Duties and
Least Privilege .............................................................................178
What Can You Do? ...................................................................178
Case Studies: What Could Happen if I Don’t Do It? ................180
Practice 9: Consider Insider Threats in the Software
Development Life Cycle ............................................................182
What Can You Do? ...................................................................182
Requirements Definition ...........................................................182
System Design ..........................................................................183
Implementation .........................................................................183
Installation ................................................................................184
System Maintenance .................................................................185
Case Studies: What Could Happen if I Don’t Do It? ................185
Practice 10: Use Extra Caution with System
Administrators and Technical or Privileged Users ................187
What Can You Do? ...................................................................187
Case Studies: What Could Happen if I Don’t Do It? ................189
Practice 11: Implement System Change Controls ...................191
What Can You Do? ...................................................................191
Case Studies: What Could Happen if I Don’t Do It? ................192
Practice 12: Log, Monitor, and Audit Employee
Online Actions ............................................................................195
What Can You Do? ...................................................................195
Case Studies: What Could Happen if I Don’t Do It? ................198
Practice 13: Use Layered Defense against Remote Attacks ...200
What Can You Do? ...................................................................200
Case Studies: What Could Happen if I Don’t Do It? ................201
Practice 14: Deactivate Computer Access Following
Termination .................................................................................203
What Can You Do? ...................................................................203
Case Studies: What Could Happen if I Don’t Do It? ................205
Practice 15: Implement Secure Backup and Recovery
Processes ......................................................................................207
What Can You Do? ...................................................................207
Case Studies: What Could Happen if I Don’t Do It? ................209
ptg7481383
xiiiContents
Practice 16: Develop an Insider Incident Response Plan.......211
What Can You Do? ...................................................................211
Case Studies: What Could Happen if I Don’t Do It? ................212
Summary .....................................................................................213
References/Sources of Best Practices .......................................214
Chapter 7. Tec hn ica l In sid er Th re at Co nt rol s ..........................................215
Infrastructure of the Lab ............................................................217
Demonstrational Videos ............................................................218
High-Priority Mitigation Strategies .........................................219
Control 1: Use of Snort to Detect Exfiltration of
Credentials Using IRC ...............................................................220
Suggested Solution ...................................................................221
Control 2: Use of SiLK to Detect Exfiltration of Data
Using VPN ...................................................................................221
Suggested Solution ...................................................................222
Control 3: Use of a SIEM Signature to Detect Potential
Precursors to Insider IT Sabotage .............................................223
Suggested Solution ...................................................................224
Database Analysis .....................................................................225
SIEM Signature ........................................................................227
Common Event Format .............................................................228
Common Event Expression .......................................................229
Applying the Signature.............................................................230
Conclusion ................................................................................231
Control 4: Use of Centralized Logging to Detect Data
Exfiltration during an Insider’s Last Days
of Employment ...........................................................................231
Suggested Solution ...................................................................232
Monitoring Considerations Surrounding Termination ............233
An Example Implementation Using Splunk .............................235
Advanced Targeting and Automation .......................................237
Conclusion ................................................................................239
ptg7481383
xiv Contents
Insider Threat Exercises .............................................................239
Summary .....................................................................................239
Chapter 8. Case Examples ............................................................................241
Sabotage Cases ............................................................................241
Sabotage Case 1 .........................................................................243
Sabotage Case 2 .........................................................................244
Sabotage Case 3 .........................................................................244
Sabotage Case 4 .........................................................................245
Sabotage Case 5 .........................................................................245
Sabotage Case 6 .........................................................................246
Sabotage Case 7 .........................................................................246
Sabotage Case 8 .........................................................................247
Sabotage Case 9 .........................................................................247
Sabotage Case 10 .......................................................................248
Sabotage Case 11 .......................................................................248
Sabotage Case 12 .......................................................................249
Sabotage Case 13 .......................................................................249
Sabotage Case 14 .......................................................................250
Sabotage Case 15 .......................................................................250
Sabotage Case 16 .......................................................................251
Sabotage Case 17 .......................................................................252
Sabotage Case 18 .......................................................................252
Sabotage Case 19 .......................................................................253
Sabotage Case 20 .......................................................................253
Sabotage Case 21 .......................................................................254
Sabotage Case 22 .......................................................................255
Sabotage Case 23 .......................................................................255
Sabotage Case 24 .......................................................................256
Sabotage/Fraud Cases ...............................................................256
Sabotage/Fraud Case 1 ..............................................................257
Sabotage/Fraud Case 2 ..............................................................257
Sabotage/Fraud Case 3 ..............................................................258
ptg7481383
xvContents
Theft of IP Cases .........................................................................258
Theft of IP Case 1 ......................................................................259
Theft of IP Case 2 ......................................................................260
Theft of IP Case 3 ......................................................................260
Theft of IP Case 4 ......................................................................261
Theft of IP Case 5 ......................................................................261
Theft of IP Case 6 ......................................................................262
Fraud Cases .................................................................................262
Fraud Case 1 .............................................................................264
Fraud Case 2 .............................................................................264
Fraud Case 3 .............................................................................265
Fraud Case 4 .............................................................................265
Fraud Case 5 .............................................................................266
Fraud Case 6 .............................................................................266
Fraud Case 7 .............................................................................266
Fraud Case 8 .............................................................................267
Fraud Case 9 .............................................................................267
Fraud Case 10 ...........................................................................268
Fraud Case 11 ............................................................................268
Fraud Case 12 ...........................................................................269
Miscellaneous Cases ...................................................................269
Miscellaneous Case 1 ................................................................270
Miscellaneous Case 2 ................................................................271
Miscellaneous Case 3 ................................................................271
Miscellaneous Case 4 ................................................................271
Miscellaneous Case 5 ................................................................272
Miscellaneous Case 6 ................................................................272
Summary .....................................................................................273
Chapter 9. Conclusion and Miscellaneous Issues ...................................275
Insider Threat from Trusted Business Partners ......................275
Overview of Insider Threats from Trusted
Business Partners .....................................................................278
Fraud Committed by Trusted Business Partners ......................279
ptg7481383
xvi Contents
IT Sabotage Committed by Trusted Business Partners .............280
Theft of Intellectual Property Committed by Trusted
Business Partners .....................................................................281
Open Your Mind: Who Are Your Trusted
Business Partners? ...................................................................282
Recommendations for Mitigation and Detection ......................283
Malicious Insiders with Ties to the Internet
Underground ..............................................................................286
Snapshot of Malicious Insiders with Ties to the Internet
Underground ............................................................................287
Range of Involvement of the Internet Underground .................288
The Crimes ................................................................................288
Use of Unknown Access Paths Following Termination ............289
Insufficient Access Controls and Monitoring ...........................291
Conclusions: Insider Threats Involving the Internet
Underground ............................................................................293
Final Summary ............................................................................293
Let’s End on a Positive Note! ....................................................296
Appendix A. Insider Threat Center Products and Services...................299
Appendix B. Deeper Dive into the Data ...................................................307
Appendix C. CyberSecurity Watch Survey ..............................................319
Appendix D. Insider Threat Database Structure .....................................325
Appendix E. Insider Threat Training Simulation:
MERIT InterActive ................................................................333
Appendix F. System Dynamics Background ...........................................345
Glossary of Terms ............................................................................................351
References .........................................................................................................359
About the Authors...........................................................................................365
Index ..................................................................................................................369
ptg7481383
xvii
Preface
A night-shift security guard at a hospital plants malware1 on the hospital’s
computers. The malware could have brought down the heating, ventila-
tion, and cooling systems and ultimately cost lives. Fortunately, he has
posted a video of his crime on YouTube and is caught before carrying out
his illicit intent.
A programmer quits his job at a nuclear power plant in the United States
and returns to his home country of Iran with simulation software contain-
ing schematics and other engineering information for the power plant.
A group of employees at a Department of Motor Vehicles work together to
make some extra money by creating driver’s licenses for undocumented
immigrants and others who could not legally get a license. They are finally
arrested after creating a license for an undercover agent who claimed to be
on the “No Fly List.”
These insider incidents are the types of crimes we will discuss in this
book—crimes committed by current or former employees, contractors, or
business partners of the victim organization. As you will see, consequences
of malicious insider incidents can be substantial, including financial losses,
operational impacts, damage to reputation, and harm to individuals. The
actions of a single insider have caused damage to organizations ranging
from a few lost staff hours to negative publicity and financial damage so
extensive that businesses have been forced to lay off employees and even
close operations. Furthermore, insider incidents can have repercussions
beyond the victim organization, disrupting operations or services critical
to a specific sector or creating serious risks to public safety and national
security.
1. Malware: code intended to execute a malicious function; also commonly referred to as malicious
code. [Note: The first time any word from the Glossary is used in the book it will be printed in boldface.]
ptg7481383
xviii Preface
We use many actual case examples throughout the book. It is important
that you consider each case example by asking yourself the following ques-
tions: Could this happen in my organization? Could a night-shift security
guard plant malicious code on our computers? Do we have employees,
contractors, or business partners who might steal our sensitive information
and give it to a competitor or foreign government or organization? Do we
have systems that our employees could be paid by outsiders to manipulate?
For most of you, the answer to at least one of those questions will be an
unequivocal yes! The good news is that after more than ten years of research
into these types of crimes, we have developed insights and mitigation
strategies that you can put in place in your organization to increase your
chances of avoiding or surviving these types of situations.
Insider threats are an intriguing and complex problem. Some assert that
they are the most significant threat faced by organizations today. High-
profile insider threat cases, such as those conducted by people who stole
and passed proprietary and classified information to WikiLeaks, certainly
support that assertion, and demonstrate the danger posed by insiders in
both government and private industry.2
Unfortunately, insider threats cannot be mitigated solely through hard-
ware and software solutions. There is no “silver bullet” for stopping insider
threats. Furthermore, malicious insiders go to work every day and bypass
both physical and electronic security measures. They have legitimate,
authorized access to your most confidential, valuable information and sys-
tems, and they can use that legitimate access to perform criminal activity.
You have to trust them; it is not practical to watch everything each of your
employees does every day. The key to successfully mitigating these threats
is to turn those advantages for the malicious insiders into advantages for
you. This book will help you to do just that.
In 2001, shortly before September 11, the Secret Service sponsored the
Insider Threat Study, a joint project conducted by the Secret Service and
the Software Engineering Institute CERT Program at Carnegie Mellon
University. We never dreamed when we started that study that it would
have such far-reaching impacts, and that we would become so passionate
about the subject that we would end up devoting more than a decade (to
date!) of our careers to the problem.
2. For information regarding the WikiLeaks insider threat cases, see http://en.wikipedia.org/wiki/
Wikileaks.
ptg7481383
xixPreface
When we started our work on the insider threat problem, very little was
known about insider attacks: Who commits them, why do they do it, when
and where do they do it, and how do they set up and carry out their crimes?
After delving deep into the issue, we are happy to say that we now know
the answers to those questions. In addition, we have come a long way in
designing mitigation strategies for preventing, detecting, and responding
to those threats.
We have the largest collection of detailed insider threat case les that we
know of in the world. At the time of this publication, we had more than
700 cases, and that number grows weekly. We’ve had the opportunity to
interview many of the victims of these crimes, giving us a unique chance to
find out from supervisors and coworkers how the insider behaved at work,
what precipitating events occurred, what technical controls were in place
at the time, what policies and procedures were in place but not followed,
and so on. We’ve also had the unique opportunity to actually interview
convicted insiders and ask them probing questions about what made them
do it, what might have made them change their mind, and what technical
measures should have been in place to prevent this from happening.
We have a comprehensive databasethe CERT insider threat database
where we track the technical, behavioral, and organizational details of every
crime. We have combined our technical expertise in the CERT Insider Threat
Center with psychological expertise from federal law enforcement, the U.S.
Department of Defense (DOD), and our own independent consultants to
ensure that we consider the “big picture” of the problem, not just the techni-
cal details. We have created “crime models” or “crime profiles” that describe
the patterns in the crimes so that you can recognize an escalating insider
threat problem in your own organization. We have created an insider threat
lab where we are developing new technical solutions based on our mod-
els. We created an insider threat vulnerability assessment based on all of the
cases in the CERT database so that you can learn from past mistakes and not
suffer the same consequences as previous victim organizations. We publish
best practices for mitigating insider threats, hold workshops, and conduct
technical exercises for incident responders. Finally, we continue to collect
new cases of malicious insider compromises to track the changing face of
the threat.
We have been publishing our work for the past ten years; now weve
decided that for the tenth anniversary of the start of our work, it is appro-
priate to pull all of our most current information into a book. This book
provides a comprehensive reference for our entire body of knowledge on
insider threats.
ptg7481383
xx Preface
Scope of the Book: What Is and Is Not Included
Let’s begin by defining what we mean by malicious insider threats:
A malicious insider threat is a current or former employee, contractor, or
business partner who has or had authorized access to an organization’s
network, system, or data and intentionally exceeded or misused that
access in a manner that negatively affected the confidentiality, integrity, or
availability of the organization’s information or information systems.
There are a few important items to note. First of all, malicious insider
threats are not only employees.3 We chose to include contractors in our
definition because contractors often are granted authorized access to their
clients’ information, systems, and networks, and the nontechnical controls
for contractors are often much more lax than for employees. Interestingly,
we did not include business partners in our original definition of insider
threats in 2001. However, over time we found that more and more crimes
involved not employees or contractors, but trusted business partners who
had authorized access to the organization’s systems, networks, or informa-
tion. We encountered cases involving outsourcing, offshoring, and, more
recently, cloud computing. These cases raise complex insider threat risks
that should not be overlooked; therefore, we decided to add business part-
ners to our definition.
Second, note that malicious insider attacks do not only come from current
employees. In fact, one particular type of crime, insider IT sabotage, is more
often committed by former employees than current employees.
Now that we have explained whom we will discuss in the book, lets focus
on what types of crimes we will examine. Before we describe the types of
crimes, it is important that you understand why we categorized them the
way we have. Much of the success in our work is due to the identification
of patterns found in the insider threat cases. These patterns describe the
“story” behind the cases. Who commits these crimes? Why? Are there signs
that they might commit a crime beforehand, so-called observable behaviors,
in the workplace? When do they do it, where, and do they do it alone or
with others?
The important thing to remember is that the patterns are different for each
type of crime. There is not one single pattern for insider threats in general.
3. Henceforth, for simplicity, reference to insider threats specifically means malicious insider threats
unless otherwise specified.
ptg7481383
xxiPreface
Instead, we have identified three models, or profiles, for insider threats.
Those three types of crimes are as follows.
IT sabotage: An insiders use of information technology (IT) to direct
specific harm at an organization or an individual.
Theft of intellectual property (IP): An insiders use of IT to steal
intellectual property from the organization. This category includes
industrial espionage involving insiders.
Fraud: An insider’s use of IT for the unauthorized modification, addi-
tion, or deletion of an organization’s data (not programs or systems)
for personal gain, or theft of information that leads to an identity crime
(e.g., identity theft, credit card fraud).
Note that this book does not specifically describe national security
espionage crimes: the act of obtaining, delivering, transmitting, communi-
cating, or receiving information about the national defense with an intent,
or reason to believe, that the information may be used to the injury of the
United States or to the advantage of any foreign nation. Espionage is a vio-
lation of 18 United States Code sections 792–798 and Article 106, Uniform
Code of Military Justice.4 The CERT Insider Threat Center does work in
that area, but that research is only available to a limited audience. How-
ever, there are many similarities between national security espionage and
all three types of crimes: fraud, theft of intellectual property, and IT sabo-
tage. Therefore, we believe there are many lessons to be learned from these
insider incidents that can be applied to national security espionage as well.
In addition, this book deals primarily with malicious insider threats. We
certainly recognize the importance of unintentional insider threats
insiders who accidentally affect the confidentiality, availability, or integrity
of an organization’s information or information systems, possibly by being
tricked by an outsider’s use of social engineering. However, we only
recently began researching those types of threats; intentional attacks have
kept us extremely busy for the past ten years! In addition, we believe
that many of the mitigation strategies we advocate for malicious insid-
ers could also be effective against unintentional incidents, as well as those
perpetrated by outsiders. And finally, it is difficult to gather information
regarding unintentional insider threats; because no crime was committed,
organizations tend to handle these incidents quietly, internal to the organi-
zation, if possible.
4. Dictionary of Military and Associated Terms. U.S. Department of Defense, 2005.
ptg7481383
xxii Preface
Finally, we use many case examples from the CERT database throughout
the book. Some of the examples go into greater detail than others; we
include only the details that serve to illustrate the point we are making
in that part in the book. We also have included a large collection of case
examples in Chapter 8, as we believe these will be of great interest to many
of you. Again, we stress that you should use that chapter to examine your
organization and decide if you need to take any proactive measures to
ensure that you do not fall victim to the same types of incidents.
As a matter of policy, we never identify the organizations or insid-
ers involved in our case examples. Some, however, may be apparent
to readers, inasmuch as they are drawn from public records, including
court documents and newspaper accounts. For examples not in the pub-
lic domain, we have further masked the targeted organizations to shield
their identities.
Intended Audience
A common misconception is that insider threat risk management is
the responsibility of IT and information security staff members alone.
Unfortunately, that is one of the biggest reasons that insider attacks con-
tinue to occur, repeating the same patterns we have observed in cases since
1996, the earliest cases in the CERT database. IT and information security
personnel will benefit from reading this book, as we will suggest new
technical controls you can implement using technology you are already
using in the workplace. In addition, this book can be used by technical
staffs to motivate other stakeholders within their organization, since IT and
information security cannot successfully implement an effective insider
threat mitigation strategy on their own.
We wrote this book with a diverse audience in mind. The ideal audience
includes top management, as their support will be needed to implement
the organization-wide insider threat policies, procedures, and technologies
we recommend. It is important that all managers understand the patterns
they need to recognize in their employees, and to advocate up the manage-
ment chain for support for an insider threat program.
For the same reasons, government leaders will benefit from this book,
since they need to support the government-wide insider threat policies,
procedures, and technologies we recommend.
ptg7481383
xxiiiPreface
Human resources personnel need to understand this book, as they are
often the only ones who are aware of indicators of potential increased
risk of insider threats in individual employees. Other staff members who
should understand this information include security, software engineering,
and physical security personnel, as well as data owners. It is also essen-
tial to include your general counsel in any discussions about implementing
technical and nontechnical controls to combat the insider threat, to ensure
compliance with federal, state, and local laws.
In summary, an effective insider threat program requires understanding,
collaboration, and buy-in from across your organization.
Reader Benefits
After reading this book you will realize that the insider threat is real and
the consequences of malicious insider activities can be extremely damag-
ing. Real-life case studies will drive home the point that “this could happen
to me.” Many organizations focus their technical defenses against outsid-
ers attempting to gain unauthorized access. This book emphasizes the need
to balance defense against outsider threats with defense against insider
threats, understanding that insider attacks can be more damaging than out-
sider attacks.
After reading this book you also will be able to recognize the high-level
patterns in the three primary types of insider threats: IT sabotage, theft
of intellectual property, and fraud. In addition, you will understand the
details of how insiders commit those crimes. We present concrete defensive
countermeasures that will help you to defend against insider attacks. You
can compare your own defensive strategies to the controls we propose and
determine whether your existing controls are sufficient to prevent, detect,
and respond to insider attacks like those presented throughout the book.
Once you identify gaps in your defensive posture, you can implement
countermeasures we propose to fill those gaps.
Structure of the Book: Recommendations to Readers
We begin the book in Chapter 1, Overview, by describing the insider threat
problem, and raise awareness to the complexity of the problem— tangential
issues such as insider threats from trusted business partners, malicious
ptg7481383
xxiv Preface
insiders with ties to the Internet underground, and programming
techniques used as an insider attack tool. Next, we provide a breakdown
of the crimes in the CERT database, followed by an overview of the CERT
Insider Threat Center. Because our crime “profiles” or “models” have had
such an impact on the understanding of insider threats, we also provide a
short section describing why those models are so important. We end with
a brief timeline of the evolution of our body of work in the CERT Insider
Threat Center.
It is important that you read the first chapter so that you understand the
concepts and terminology used throughout the remainder of the book.
After that, you can use the book in various ways. If the first chapter has
been an eye-opener for you and you are interested in gaining a compre-
hensive understanding of insider threats, continue reading the book from
beginning to end. However, it is not necessary to read the book in that man-
ner; it is designed such that Chapters 2 through 9 and the appendices can
be used as stand-alone references.
Chapters 2, 3, and 4 are devoted to the three types of insider threats: insider
IT sabotage, theft of intellectual property, and fraud. In each chapter we
describe who commits the crime so that you know which positions within
your organization pose that particular type of threat. We describe the pat-
terns in how each type of crime evolves over time: What motivates the
insider, what behavioral indicators are prevalent, how do they set up and
carry out the crime, when do they do it, whether others are involved, and
so on. We also suggest mitigation strategies throughout each chapter.
We recommend that everyone reads Chapter 2, Insider IT Sabotage, as that
crime has occurred in organizations in every critical infrastructure sector.
Most organizations have some type of intellectual property that must be
protected: strategic or business plans, engineering or scientific information,
source code, and so on. Therefore, it is important that you read Chapter 3,
Insider Theft of Intellectual Property, so that you fully understand who
inside your organization poses a threat to that information.
Chapter 4, Insider Fraud, is applicable to you if you have information or
systems that your employees could use to make extra money on the side.
Credit card information and Personally Identifiable Information (PII) such
as Social Security numbers are valuable for committing various types of
fraud. However, it is also important that you also consider threats posed
by insiders modifying information for financial gain. Do you have systems
that outsiders would be willing to pay your employees to manipulate? Or
ptg7481383
xxvPreface
do you have systems that your employees could illicitly use for personal
financial gain, perhaps by colluding with other employees? If so, Chapter 4
is applicable to you. Note that Chapter 4 also describes the insider threats
in the CERT database involving organized crime, as all of those crimes
were fraud.
Chapter 5, Insider Threat Issues in the Software Development Life Cycle,
explores said issues. The Software Development Life Cycle (SDLC) is syn-
onymous with “software process” as well as “software engineering”; it is
a structured methodology used in the development of software products
and packages. This methodology is used from the conception phase to the
delivery and end of life of a final software product.5 We explore each phase
of the SDLC and the types of insider threats that need to be considered
at each phase. In addition, we describe how oversights at various phases
have resulted in system vulnerabilities that have enabled insider threats
to be carried out later by others, often by end users of the system. If your
organization develops software, you should carefully consider the lessons
learned in this chapter. It should make you look differently at the entire
SDLC: from how to consider potential insider threats in the requirements
and design phases, to potential threats posed by developers in the imple-
mentation and maintenance phases.
If you are looking for information on mitigation strategies, go to Chapters 6
and 7. You can use Chapter 6, Best Practices for the Prevention and Detection
of Insider Threats, to compare best practices for prevention and detection
of insider threats to your organization’s practices. Many of the best prac-
tices were described in previous chapters, but Chapter 6 summarizes all
of the suggestions in a stand-alone reference. This chapter is based on our
“Common Sense Guide to Prevention and Detection of Insider Threats,”
for years one of the top downloads on the entire CERT Web site.
If you are in a technical security role and would like more detailed infor-
mation on new controls you can implement, you should read Chapter 7,
Technical Insider Threat Controls. This chapter describes the technical solu-
tions we have developed in the CERT insider threat lab. These technical
solutions are based on technologies that you most likely are already using
for technical security. We provide new signatures, rules, and configurations
for using them for more effective detection of insider threats.
5. Whatis.com
ptg7481383
xxvi Preface
Chapter 8, Case Examples, contains a collection of case examples from the
CERT database. We provide a summary table at the beginning of the chapter
so that you can reference specific cases by type of crime, sector of the orga-
nization, and brief summary of the crime. Many people have requested this
type of information from us over the years, so we believe this will provide
enormous value to many of you. We highly recommend that you review
these cases and consider your vulnerability to the same type of malicious
actions within your organization. Chapter 8 is also of value to researchers
who might want to use case examples for their own research.
Chapter 9, Conclusion and Miscellaneous Issues, contains a final collec-
tion of miscellaneous information that didn’t fit anywhere else in the book.
For example, we provide an analysis of insiders with connections to the
Internet underground. We also provide details on insiders who attacked
not their own organization, but trusted business partners that had a formal
relationship with their employer.
After the chapters, we provide a series of appendices.
Appendix A, Insider Threat Center Products and Services, contains infor-
mation on products and services provided by the CERT Insider Threat
Center, including insider threat assessments, workshops, online exercises,
and technical controls. We also discuss sponsored research opportunities
for the Insider Threat Center. If you are extremely concerned about insider
threats and want immediate assistance from the CERT Program, be sure to
read this appendix.
Appendix B, Deeper Dive into the Data, contains interesting data mined
from the CERT database.
Appendix C, CyberSecurity Watch Survey, contains data collected from the
CyberSecurity Watch Survey, an annual survey we conduct in conjunction
with CSO Magazine and the Secret Service.6
Appendix D, Insider Threat Database Structure, contains the database
structure for the CERT database. If you are interested in exactly what kind
of data we track for each case, you should read this appendix. Also, we
frequently respond to queries to mine the CERT database for interesting
data—if you see a field or fields you would like us to explore with you,
please contact us. We can be reached via email at insider-threat-feedback@
cert.org.
Appendix E, Insider Threat Training Simulation: MERIT InterActive,
contains detailed information about an interactive virtual simulation we
6. Note that in some years Deloitte and Microsoft also participated in the survey.
ptg7481383
xxviiPreface
developed for insider threat training. It is basically a prototype of a video
game for insider threat training. What do you need for a successful video
game? Good guys playing against the bad guys, complex plots, interesting
characters—that’s insider threat! We didn’t want to distract you with that
information in the body of the book, but some of you might find it interest-
ing, so we included it in this appendix. In addition, if you are interested in
new and innovative training methods, this appendix should be of interest.
Appendix F, System Dynamics Background, provides background informa-
tion on system dynamics.7 We provide brief references to system dynamics
throughout the book, but it is not necessary that you understand system
dynamics when you read the book. Nonetheless, we wanted to provide
more in-depth information for those of you who wish to learn more.
Finally, the book concludes with references, a glossary, and a complete
index.
Note that the accompanying Web site, www.cert.org/insider_threat, con-
tains our system dynamics models for use by other researchers. It is also
updated regularly with new insider threat controls, best practices, and case
examples.
In summary, the book is intended to be a reference for many different types
of readers. It contains the entire CERT Insider Threat Center body of knowl-
edge on insider threats, and therefore can be used as a reference for raising
awareness, informing your risk management processes, designing and
implementing new technical and nontechnical controls, and much more.
About the CERT Program
The CERT Program is part of the Software Engineering Institute (SEI), a
federally funded research and development center at Carnegie Mellon
University in Pittsburgh. Following the Morris worm incident, which
brought 10% of Internet systems to a halt in November 1988, the Defense
Advanced Research Projects Agency (DARPA) charged the SEI with setting
up a center to coordinate communication among experts during security
emergencies and to help prevent future incidents. This center was named
the CERT Coordination Center (CERT/CC).
7. “System dynamics is a computer-aided approach to policy analysis and design. It applies to dynamic
problems arising in complex social, managerial, economic, or ecological systems—literally any dynamic
systems characterized by interdependence, mutual interaction, information feedback, and circular cau-
sality” (www.systemdynamics.org/what_is_system_dynamics.html).
ptg7481383
xxviii Preface
While we continue to respond to major security incidents and analyze
product vulnerabilities, our role has expanded over the years. Along
with the rapid increase in the size of the Internet and its use for critical
functions, there have been progressive changes in intrusion techniques,
increased amounts of damage, increased difficulty of detecting an attack,
and increased difficulty of catching the attackers. To better manage these
changes, the CERT/CC is now part of the larger CERT Program, which
develops and promotes the use of appropriate technology and systems
management practices to resist attacks on networked systems, to limit
damage, and to ensure continuity of critical services.
The CERT Insider Threat Center
The objective of the CERT Insider Threat Center is to assist organizations
in preventing, detecting, and responding to insider compromises. We have
been researching this problem since 2001 in partnership with the DOD,
the U.S. Department of Homeland Security (DHS), other federal agencies,
federal law enforcement, the intelligence community, private industry,
academia, and the vendor community. The foundation of our work is
the CERT database of more than 700 insider threat cases. We use system
dynamics modeling to characterize the nature of the insider threat prob-
lem, explore dynamic indicators of insider threat risk, and identify and
experiment with administrative and technical controls for insider threat
mitigation. The CERT insider threat lab provides a foundation to iden-
tify, tune, and package technical controls as an extension of our modeling
efforts. We have developed an assessment framework based on the fraud,
theft of intellectual property, and IT sabotage case data that we have used
to assist organizations in identifying their technical and nontechnical vul-
nerabilities to insider threats, as well as executable countermeasures. The
CERT Insider Threat Center is uniquely positioned as a trusted broker to
assist the community in the short term, and through our ongoing research.
Dawn Cappelli and Andy Moore have been working on CERT insider
threat research since 2001, and Randy Trzeciak joined the team in 2006.
Dawn is the technical manager of the CERT Insider Threat Center, Andy
is the lead researcher, and Randy is the technical lead for insider threat
research. Although our insider threat team has now grown into an official
Insider Threat Center, for many years the CERT Program’s insider threat
team consisted of Andy, Randy, and Dawn, which is why we decided to
team up and capture our history in this book.
ptg7481383
xxixPreface
Summary
The purpose of this book is to raise awareness of the insider threat issue
from the ground up: staff members in IT, information security, and human
resources; data owners; and physical security, software engineering,
legal, and other security personnel. We strongly believe after studying
this problem for more than a decade that in order to effectively mitigate
insider threats it takes common understanding, support, and commu-
nication from all of those people across the organization. In addition,
buy-in is needed from upper management, as they will need to support
the cross-organizational communication required to formulate an effective
mitigation strategy. And finally, it requires awareness and consideration by
government leaders, as some of the issues are even larger than individual
organizations. Employee privacy issues and mergers and acquisitions with
organizations outside the United States are two such examples.
This book covers our extensive work in studying insider IT sabotage, theft
of intellectual property, and fraud. Although it does not deal explicitly with
insiders who committed national security espionage, many of the lessons
in this book are directly applicable to that domain as well.
Most of the book can be read and easily understood by technical and non-
technical readers alike. The only exception is Chapter 7. If you are not a
“technical” person you are best off skipping this chapter. However, we
strongly suggest you lend the book to your technical security staff so that
they can consider implementing these controls.
Now that you understand the purpose of the book and its contents, we will
begin to dig a little deeper into each type of insider crime, our modeling of
insider threats, and the CERT Insider Threat Center in Chapter 1. We rec-
ommend that you read that chapter next so that you understand the basic
concepts. After completing Chapter 1 you will have the foundation you
need so that you can explore the rest of the book in any order you wish!
ptg7481383
This page intentionally left blank
ptg7481383
xxxi
Acknowledgments
We would like to start by thanking our amazing team at the CERT Insider
Threat Center. This book represents the hard work of many brilliant peo-
ple. First, thank you to our current team in the Insider Threat Center, listed
here in the order in which they joined the team: Adam Cummings, Mike
Hanley, Derrick Spooner, Chris King, Joji Montelibano, Cindy Nesta, Josh
Burns, George Silowash, and Dr. Bill Claycomb. And a special thank you to
Tara Sparacino and Cindy Walpole, who helped us to keep our heads above
water at work while we wrote this book in our “spare time.” The CERT
Insider Threat Center is part of the Enterprise Threat and Vulnerability
Management (ETVM) team in the CERT Program. The ETVM team is
a very tight-knit group, and we would be remiss if we did not acknowl-
edge these awesome, dedicated technical security experts, again listed in
the order in which they started on the team: Georgia Killcrece (retired, but
sorely missed!), Robin Ruefle, Mark Zajicek, David Mundie, Becky Cooper,
Charlie Ryan, Russ Griffin, Sandi Behrens, Alex Nicoll, Sam Perl, and Kristi
Keeler.
Thank you to the current and former CMU/SEI/CERT staff members
who have participated in our insider threat work over the years: Chris
Bateman, Sally Cunningham, Casey Dunlevy, Rob Floodeen, Carly Huth,
Dr. Joseph (“Jay”) Kadane, Greg Longo, David McIntire, David Mundie,
Dr. Dan Phelps, Stephanie Rogers, Dr. Greg Shannon, Dr. Tim Shimeall,
Rhiannon Weaver, Pam Williams, Bradford Willke, and Mark Zajicek. And
a special thank you to Dr. Tom Longstaff, who was the CERT technical
manager for the original Insider Threat Study, and worked on the CERT
Program’s original insider threat collaboration with the U.S. Department of
Defense (DOD) Personnel Security Research Center.
Thank you to the many fabulous graduate students who have worked on
our insider threat projects throughout the years, starting with our two cur-
rent students: Todd Lewellen, Lynda Pillage, Jen Stanley, Chase Midler,
Andrew Santell, Luke Hogan, Jaime Tupino, Tyler Dean, Will Schroeder,
ptg7481383
xxxii Acknowledgments
Matt Houy, Bob Weiland, Devon Rollins, Tom Caron, John Wyrick,
Christopher Nguyen, Hannah Joseph, and Akash Desai. Many of those stu-
dents were from the Scholarship for Service Program—we commend the
U.S. federal government for this program, which produces the most out-
standing talent in the cybersecurity field.
A special thank you to Dr. Eric Shaw, who has been a Visiting Scientist in
the CERT Program and a clinical psychologist at Consulting & Clinical
Psychology, Ltd. Eric has been the guiding force in the psychological
aspects of our research since the conclusion of our first Insider Threat Study
with the Secret Service National Threat Assessment Center.
Thank you to Noopur Davis, Claude Williams, and Dr. Marvine Hamner,
who worked for us as visiting scientists.
Thank you to the CERT Program’s director, Rich Pethia, and deputy direc-
tor, Bill Wilson, who have given us the autonomy and authority over the
past decade to take our research in so many exciting directions. Thank you
to our retired boss, Dr. Barbara Laswell, who helped us evolve from the
Insider Threat Team of three people into the CERT Insider Threat Center.
Thank you to SEI Director Dr. Paul Neilson and Deputy Director Clyde
Chittister, for their support and recognition. We’re extremely grateful to
Terry Roberts for the visibility she has brought to our work. And thank you
to Dr. Angel Jordan, former provost of Carnegie Mellon University, who
has been an advocate for our work over the years.
We would like to thank the Secret Service, our original partner in this quest
to understand and help organizations protect themselves from malicious
insider attacks. Thank you to National Threat Assessment Center (NTAC)
staff members who participated on the project, especially research coordi-
nator Dr. Marisa Reddy Randazzo, who founded and directed the Insider
Threat Study within NTAC; Dr. Michelle Keeney, who took over when
Marisa left; Eileen Kowalski, who was the lynchpin throughout the project;
and Matt Doherty, the Special Agent in Charge of NTAC. Also, thank you
to Jim Savage, the sponsor of our original work with the Secret Service.
Finally, a big thank you to our Secret Service liaisons for the Insider Threat
Study, who moved to Pittsburgh and joined the CERT Program for a few
years: Cornelius Tate, Dave Iacovetti, and Wayne Peterson. What great
times we had in those good old days! And thank you to our current Secret
Service liaisons, Tom Dover and Ryan Moore.
A special thank you to Dr. Douglas Maughan and the DHS Science and
Technology (S&T) Directorate, who took over funding of the original
CERT/Secret Service Insider Threat Study shortly after DHS was formed.
ptg7481383
xxxiiiAcknowledgments
Were especially excited that Doug came back to us last year and told us he
wanted to get the old team back together—and funded our current study of
insider threats in the financial sector. In addition, we’re receiving assistance
on that project from the Secret Service, U.S. Department of the Treasury,
and the financial sector. Thank you to Brian Peretti, who was in the very
first financial sector review of our work for the original study, and is now
back on the team in our current fraud project. And thank you to Ed Cabrera
and Trae McAbee from the Secret Service—we could not possibly succeed
in the current study without all of your hard work in gathering all of the
case files and scheduling the interviews. Thank you to Pablo Martinez for
being a strong supporter of our work, starting back in the original study,
and continuing today.
Thank you to the Army Research Office and Carnegie Mellon CyLab, espe-
cially Dr. Pradeep Khosla, Dr. Virgil Gligor, Dr. Adrian Perrig, Richard
Power, Gene Hambrick, and Dr. Don McGillen, who provided seed funding
for many of our insider threat projects that have grown into full bodies of
work. Your support sustained the insider threat database for years, enabled
us to experiment with our modeling work, provided the infrastructure
for the insider threat lab, and funded one of our most “fun” projects: our
insider threat “video game.”
We are especially grateful to our current sponsors at the U.S. DHS Federal
Network Security (FNS) branch, Matt Coos and Don Benack, as well as the
project leads, Rob Karas, Sean McAfee, and Will Harmon. Don and Matt
had the vision to step up to the plate three years ago and fund our work
“for the good of all.” They realized the importance of our work and were
willing to fund it before insider threats became a top-priority issue in the
current cybersecurity environment. Thanks to their foresight, we can offer
technical controls, assessments, and training to the community. We’re
excited about the opportunity to continue to make an impact together!
We are also thankful to our sponsors and collaborators in the DOD and
intelligence community: Dr. Deborah Loftis, Laura Sellers, Dr. Stephen
R. Band, Dr. Aaron J. Ferguson, Dr. Lynn Fischer, Dr. Howard Timm,
Dr. Katherine Herbig, Dr. Ron Dodge, and Dr. Kirk Kennedy. Their exper-
tise and experience have enabled a much richer treatment of the insider
threat problem than would have otherwise been possible.
Our work in the system dynamics modeling of insider threats began
and continues to be influenced by the Security Dynamics Network
(SDN), a largely unfunded and loosely coordinated group of national
laboratories and universities applying system dynamics to explore issues
ptg7481383
xxxiv Acknowledgments
of cybersecurity. In the past, the group has focused on malicious insider
threats and has been a source of expertise, information, and inspiration for
the insider threat models developed in this book. We are very thankful to
the members of the SDN, especially its founder, Dr. Jose Gonzalez of Agder
University College; Dr. David Andersen and Dr. Eliot Rich of the University
at Albany; Dr. Ignacio Martinez-Moyano of Argonne National Laboratory;
Dr. Stephen Conrad of Sandia National Laboratories; and Dr. Jose Maria
Sarriegui of the University of Navarra. A special thank you goes to Dr. Elise
Weaver of the Human Resources Research Organization, who worked with
us as a Visiting Scientist at the CERT Program and assisted us in our very
first system dynamics modeling efforts.
We would also like to thank all of the SEI business development staff mem-
bers who have helped us with our insider threat work over the years: Jan
Philpot, Mike Greenwood, Joe McLeod, Frank Redner, David Ulicne, Bob
Rosenstein, Greg Such, Dave Scherb, and Angela Llamas-Butler. Thank you
to Summer Fowler and Lisa Marino, who have helped us with project man-
agement activities that have become increasingly complex over the years,
and Michele Tomasic, who has helped us with so many things over the
years. Thank you to Bill Shore and everyone in the SEI Security Office, and
Dave Thompson and everyone in SEI IT, especially Jerry Czerwinski and
Craig Lewis; and thank you to Linda Pesante and her staff, especially Ed
Desautels and Paul Ruggerio, who have helped us with editing and techni-
cal writing over the years. Also, thank you to David Biber for the wonderful
graphics he has created for us over the years, including nice crisp images
for this book!
Finally, we would like to thank Dr. Don Marinelli, cofounder of Carnegie
Mellon’s Entertainment Technology Center (ETC), and the ETC faculty
and students who worked with us to create the first video game for insider
threat training. Semester 1: faculty advisors Dr. Scott Stevens and Jessica
Trybus; student team Ankur Ahlawat, Chris Daniel, Aditya Dave, and
Todd Waits; and visiting scholars Soo Jeoung Kim and Michelle Macau.
Semester 2: faculty advisors Dr. Scott Stevens and Dr. Ralph Vituccio; and
student team Stephen Calender, Julie Charles, Evan Miller, and Todd Waits.
We still hope to interest a sponsor in turning that prototype into an opera-
tional system someday!
If we forgot someone who has helped us throughout the years, we apolo-
gize profusely! We tried hard to include everyone, but if we overlooked
you, please let us know.
ptg7481383
xxxvAcknowledgments
From Dawn: Thank you to my wonderful husband and soul mate,
Fred—you’ve been inspiring me for 35 years and without you I can’t
imagine where I would be! To my daughter and best girlfriend, Alyssa—I
treasure all of our fun times together. To my son, Anthony—you are truly
the happiest person I know! Thanks to my sister, Cindy, who has always
been there for me. And finally, thank you to the greatest parents in the
world—whom I miss terribly. Your faith and encouragement made me
what I am today.
Thank you to Andy and Randy—how exciting to accomplish this together
after all of those years as team “Andy, Randy, and Dawn!”
From Andy: My heartfelt thanks go, most of all, to my beautiful wife,
Susan, for sharing our life adventure. Coming home to you each day is the
best thing in my life! And thanks to my incredible son, Eric, who put up
with my having my nose in a laptop during many early morning hours.
Your achievements continue to amaze me and your love and friendship
enrich our lives immeasurably. Finally, thanks to Dawn and Randy’s stead-
fast dedication and friendship. It is hard to believe how far we’ve come in
the ten years since it all started.
From Randy: Thank you, Marianne, for being my wife and best friend! You
are truly a blessing to me, to our family, and to all the other lives you touch.
To my daughter, Abbie, you are an amazing, intelligent, and strong young
lady. To Nate the Great, always keep those around you laughing. To Luke,
thank you for making every day fun. Thank you to my parents for all of the
hard work and sacrifices you made over the years!
Finally, thank you to Dawn and Andy for bringing me into the circle of
trust. It is truly a pleasure working with both of you!
ptg7481383
This page intentionally left blank
ptg7481383
1
Chapter  1
Overview
Insidersposeasubstantialthreatduetotheirknowledgeofandaccessto 
theiremployers’systemsand/orinformation.Theybypassphysicaland 
electronicsecuritymeasuresthroughlegitimatemeanseveryday.Thereis 
nodemographicprofileofamaliciousinsider—theyaremenandwomen, 
marriedandsingle,youngandold,andcoverarangeofethnicities. 
However,wehaveidentifiedsomedistinctcharacteristicsofinsidersand 
theircrimes,whichcanbeusedindesigningmitigationstrategies.
InsiderITsabotageistypicallycommittedbytechnicaluserswith 
privilegedaccess,suchassystemadministrators,database  administrators, 
andprogrammers.Themotivationinthesecrimesisusuallyrevengefor 
anegativeworkplaceevent,andthecrimesareoftensetupwhilestill 
employed,butexecutedfollowingtermination.
Insidertheftofintellectualproperty(IP)isusuallycommittedby  scientists, 
engineers,programmers,andsalespeople.Theseinsidersusuallysteal 
theinformationtheyworkedon,andtakeitwiththemastheyleavethe 
organizationtostarttheirownbusiness,takewiththemtoanewjob,or 
givetoaforeigngovernmentororganization.
Insiderfraudisusuallycommittedbylower-levelemployeessuchashelp 
desk,customerservice,anddataentryclerks.Thecrimesaremotivated 
byfinancialneedorgreed,andtheytypicallycontinueforalongperiod 
oftime.Manyoftheseinsidersarerecruitedbyoutsiderstostealinforma-
tion.Collusionwithotherinsidersisverycommonincrimesinvolving 
modificationofinformationforpaymentfromtheoutside.
ptg7481383
Chapter1. Overview
2
Inthischapter,webeginwithtruestoriesofinsiderattacks,whichwill 
helpyoutounderstandthedifferenttypesofinsidercrimesaswellasthe 
potentialconsequences.Webelievethatthemoreactualcasesyouread,the 
moreyouwillcometounderstandthepatternsinthecases.
Next,wepointouttheexpandingcomplexityofinsiderthreats.Although
wehavebrokentheproblemintothreedistinctcrimeprofiles,andmost
incidentsresemblethoseprofiles,therearesomecomplexissuesthatwe
mustpointoutsoyouunderstandthescopeoftheproblem.Inthischap-
terwesimplywanttoraisetheissuessothatyoukeeptheminmindas
youreadtherestofthebook.InChapter9,Conclusionand  Miscellaneous
Issues,weprovidemoredetailoneachoftheseissues.
Thenextsectioncontainsabreakdownofthecasesinourinsiderthreat
database.Ourdatabaseofmorethan700insiderthreatcasesprovides
anunmatchedwealthofinformationthatcanbeusefultoallofyou
in  understandinginsiderthreatsandindesigningmitigationstrate-
gies.Ifyouareinterestedinadditionaldetailsfromourdatabase,refer
to  AppendixB,DeeperDiveintotheData.Inaddition,AppendixC,
CyberSecurityWatchSurvey,containsdetailedfindingsfromtheCyber-
SecurityWatchSurvey,whichweconductannuallywiththeSecret
ServiceandCSOMagazine.1
Next,weexplaintheimportanceofourcrimeprofilesandassociatedcrime 
models.Overtheyears,wehaveheardthatthefirstimpressionofsome 
practitionersisthattheyarenotinterestedin“academicmodels.”Thegood 
newsisthat,althoughinsomecaseswestartedwithcomplexacademic 
models,wehavetranslatedthemintostraightforward,practicalteach-
ingtoolsthathaveraisedawarenessandresultedinsuccessfulmitigation 
strategiesforpractitionersforyears.Thosehigh-levelmodelsaretheones 
weuseinthisbook.
Weendthischapterwithabriefdescriptionoftheobjectiveandworkof 
theCERTInsiderThreatCenter.Ifyoudon’tcarewherematerialinthis 
bookcamefrom,youcertainlycanskiptheendofthischapterandgoon 
toChapter2,InsiderITSabotage.However,someofyoumightfeelbetter 
withabriefglimpseofthehistoryofourresearchsothatyoudeemthe 
advicewegiveinthebooktobetrustworthy.Weprovideabrieftimelineof 
thedevelopmentoftheInsiderThreatCenterinthischapter.
1.  NotethatinsomeyearsDeloitteandMicrosoftalsoparticipatedinthesurvey.
ptg7481383
3TrueStoriesofInsiderAttacks
Tru e St or ies of I ns ider Atta ck s
Wehavefoundovertheyearsthattruestoriesofinsiderattackscanbe 
extremelyvaluableinraisingawarenessandinpointingoutnewareasof 
concernthatmustbeconsideredindesigningamitigationstrategy.Many 
membersoftheCERTInsiderThreatCenterhavecontributedtocreating 
thesecasesummariesaspartofdocumentingcasesinthedatabasebased 
onawidevarietyofpublicrecordsandmediareports.Wearethankful 
toeveryonewhohelpedelaborateoninsiderthreatcasesasabasisfrom 
whichtolearn.
Inthissectionweusethesestoriestoreinforceforyouthebreakdownof 
insiderthreatsintothreetypesofcrimes:fraud,theftofIP,andsabotage. 
Therefore,wewillstartthischapterwithonereal-lifeexampleofeachtype 
ofinsidercrime.
Manypeoplealsofindthesecaseexamplestobeveryvaluabletoolsin 
grabbingtheattentionofuppermanagementandgainingsupportforan 
insiderthreatmitigationstrategy.Ifyouwouldliketoperusemorecase 
examples,seeChapter8,CaseExamples.
Insider IT Sabotage
RecallthatinsiderITsabotagecrimesarethoseinwhichaninsiderusesIT 
todirectspecificharmatanorganizationoranindividual.Forexample, 
insidersintheseattackshavedeletedcriticalinformation,broughtdown 
systems,anddefacedWebsitestoembarrasstheorganization.Asyouwill 
seeinthefollowingexample,however,theseattacksarefrequentlynotthat 
straightforward.
Anetworkadministratorwhodesignedandcreatedthenetworkfor 
amajorU.S.citywasnotjusttheonlypersonwhofullyunderstoodthe 
network,butalsotheonlypersonwhohadtheadministrativepasswords 
forthenetworkdevices.Afterbeingreprimandedforpoorperformance 
andforthreateningacoworker,hewasreassignedtoadifferentjob.He 
refusedtoprovidethepasswordstohisreplacement,however,andwas 
subsequentlyterminated,thenarrested.Thecitywasunabletoaccess 
thenetworkdevicesfor12days,althoughduringthattime,fortunately 
theinfrastructurecontinuedtofunctionnormallyandsuchaccesswas 
notnecessary.Itwasalsodiscoveredduringthatperiodoftimethathe 
hadinstalledrogueaccesspointsinwiringclosets,andhadprogrammed 
thenetworkdevicestofailifanyoneattemptedtoresetthemwithoutthe 
administrativepasswords.Althoughhewasimprisoned,herefusedto 
ptg7481383
Chapter1. Overview
4
providethepasswordstoanyoneexceptthecity’smayor,claimingthat 
hisbehaviorfollowedstandardnetworksecuritypractices.Aftera12-day 
standoffinwhichthecasereceivedsignificantmediaattention,themayor 
visitedhiminprisonandobtainedthepasswords.
Thiscasemaybefamiliartosomeofyouasitreceivedsignificantmedia 
attention,andwasextremelyintriguingtotechnicalsecurityexperts. 
Expertsfromthevendorsofthenetworkdevicesworkedwithcityofficials 
toattempttoformulateasolutiontothisproblem.Intheend,however,the 
bestsolutiontheycouldcomeupwithwasapersonalvisittotheperpetra-
torinjailbythecity’smayor.
Wehaveothercasessimilartothisinourdatabasethatoccurredinsmaller 
organizations.Previously,thosetypesofcasesweredismissedbytechnical 
securityexpertsasnotpossibleinlargerorganizationsbecausetheytend 
tohavematuresecuritypractices.Thiscasemademanyexpertsreconsider
theirsecuritypracticestoensurethatthistypeofscenariocouldn’thappen 
tothem!Specifically,thiscasedriveshomethepointthatanyinfrastruc-
tureshouldnothaveasinglepointoffailure,whetherthatisadeviceora 
humanbeing.
Insider Fraud
InsiderfraudcasesarethoseinwhichaninsiderusesITfortheunauthor-
izedmodification,addition,ordeletionofanorganization’sdata(not 
programsorsystems)forpersonalgain,ortheftofinformation,which 
leadstoanidentitycrime(e.g.,identitytheft,creditcardfraud).Examples 
ofinsiderfraudcrimesinclude
TheftandsaleofconfidentialinformationsuchasSocialSecuritynum-
bersorcreditcardnumbers
Modificationofcriticaldatainreturnforpayment;forexample,driv-
er’slicenserecords,criminalrecords,orwelfarestatus
Stealingofmoney;forexample,infinancialinstitutionsorgovernment 
organizations
Asyouwillseeinthefollowingexample,however,notallcasesarequite 
thatclear-cut.
Amanufacturerofcomputernetworkingproductsfoundthatithad 
toissuerecallnoticestoitscustomersforvariousproducts.Inorderto 
betterserveitsgovernmentcustomers,itofferedtoshipreplacement
productstothemimmediatelyuponrequest,andthedefectivepartscould 
ptg7481383
5TrueStoriesofInsiderAttacks
bereturnedlater.Thecompanyhadoutsourceditshelpdesk  operations 
toanother  company.Oneofthehelpdeskoperatorsneededmoneyto 
careforhiselderlyparents,andthereforecarriedoutaschemetoearn 
someextramoney.Hecreatedfictitiousemailaddresses,andusedthose 
emailaddressestosendrequestsforreplacementparts,supposedlyfor 
governmentcustomers.Hethenhadthereplacementpartsshippedto 
hishomeaddress,andtothehomeaddressesofseveralrelatives.Over 
a20-monthperiod,themanufacturersentmorethan90shipmentscon-
taining500productswitharetailvalueofmorethan$8milliontothe 
addressessuppliedbythemaliciousinsider.Hethensold90oftheprod-
uctsonanInternetauctionsiteformorethan$500,000.Hewasarrested, 
convicted,andorderedtopaymorethan$8millioninrestitution,plus 
serve51monthsinprison.
Thiscasedemonstratestheinsiderthreatriskposedbytrustedbusiness
partners.Itisimportantthatyouconsidertheinsiderthreatrisknotonly
fromwithinyourorganization,butalsofromotherorganizationsthatyou
allowaccesstoyoursystems,network,orinformation,orwhoseemployees
playkeyrolesinyourcriticalbusinessprocesses.Infraudcases,business
processgapsoftenprovidethemeansforenduserstocommitcrimes,as
inthecasejustdescribed.Itisimportantthatyoucarefullyanalyzeyour
businessprocessesforvulnerabilitiesthatenduserscanusetocommit
fraud.ThesecrimesaredescribedingreaterdetailinChapter4,Insider
Fraud,andinsiderthreatsfromtrustedbusinesspartnersareexploredin
Chapter9.
Insider Theft of Intellectual Property
WedefineinsidertheftofIPasaninsider’suseofITtostealintellectual 
propertyfromtheorganization.Thiscategoryincludesindustrialespio-
nageinvolvinginsiders;informationstolenoftenincludesproprietary 
engineeringdesigns,scientificformulas,sourcecode,andconfidential 
customerinformation.Thefollowingisarepresentativecaseinvolvingcus-
tomerinformation.
Afterworkingforhiscompanyformorethanfouryears,asalesrepresen-
tativewasapproachedbyacompetitorregardingemploymentwiththem. 
Forthenexttwomonths,thesalesrepemailedproprietaryinformation 
fromhiscurrentemployertohishome,includingcustomerlists,quotes, 
customerpasswords,marketingandsalesplans,materialcostsandprofit 
margins,andacomputerprogramusedtoconfigurequotesforcustom-
ers.Hethenvisitedhispotentialemployerandusedastolenpasswordto 
accessasecureareaonhiscurrentemployer’sWebsite.Thisaccessenabled 
thecompetitortoaccessconfidentialinformationregardingcustomer 
ptg7481383
Chapter1. Overview
6
orders,quotesrequested,andmore.Thenextday,hereceivedaformal 
employmentoffer.Hesentanemailacceptingtheoffer,andincludeda 
copyoftheprogramhehademailedtohishomeearlier.Next,hedeleted 
thecontentsofhisharddriveatwork,thinkingthatwoulddestroythe 
evidenceofhiscrime,andturnedinhisresignation.Afterstartinghisnew 
jobafewdayslater,hecontinuedtoaccessthesecurecustomerareaofhis 
previousemployer’sWebsiteusingthepasswordshehadstolen.
Thiscasefitsourprofileofinsidertheftofintellectualpropertyperfectly,
asyouwillseeinChapter3,InsiderTheftofIntellectualProperty.In
addition,ithighlightsaspecificareaofconcern:passwordsandaccount
management.Itiswellknownthatanemployee’saccountshouldbe
disabled,andpasswordsforsharedaccountsshouldbechangedimme-
diatelyupontermination.Thiscasepointsoutothertypesofshared
accountsthatcouldbeeasilyoverlooked,however:Websiteaccounts,
customeraccounts,andsoon.Doesyourterminationprocessinclude
considerationofthesetypesofaccounts?Doyouevenhaveacomprehen-
sivelistofthetypesofaccountsthatexistandneedtobeconsideredat
termination?Basedonourexperience,itmightbeagoodideaforyouto
double-check!
The Expanding Complexity of Insider Threats
Asourworkmatured,webegantorealizethattheinsiderthreatismuch 
morecomplexthanitappearsonthesurface.Theexpandingcomplexityof 
insiderthreatsincludestheissuesoutlinedinTable1-1.
Table 1-1 TheExpandingComplexityofInsiderThreats
Collusion with
Outsiders
Insiders can be recruited by or work for outsiders,
including organized crime and foreign organizations or
governments.
Business
Partners
It is important to control and monitor access to your
information and systems by “trusted” business partners.
Mergers and
Acquisitions
Consider heightened risk of insider threats when
organizations are merged or acquired.
Cultural
Differences
Behavioral indicators exhibited by malicious insiders
who were born in different countries may differ.
ptg7481383
7BreakdownofCasesintheInsiderThreatDatabase
Foreign
Allegiances
Organizations operating branches outside their own
country must consider the insider threats posed by
employees with allegiance to another country.
Internet
Underground
Some insiders seek technical assistance from the
Internet underground. The Internet underground is
a collection of individuals with shared goals where
there is some degree of hierarchical structure and
the primary communication mechanism or agent of
electronic crime involves the Internet. Further, it may
demonstrate some degree of pseudoanonymity and/
or secrecy, which may be useful for organizing and
carrying out electronic crimes.
Wewilladdresstheseissuesthroughouttheremainderofthebook.For 
example,collusionwithoutsidersisafactorinfraudcaseswherestolen 
informationissoldtooutsidersandoutsidersoftenrecruitinsidersto 
committhecrime,andintheftofIPcasesinwhichinformationisstolen 
tobenefitaforeigngovernmentorcompetitor.Thosetypesofissuesare 
exploredinChapter3andChapter4.
Trustedbusinesspartnershavebeenthesourceofinsiderfraud,theftof 
intellectualproperty,andITsabotagecommittedbytechnicalcontrac-
tors.CollusionwiththeInternetundergroundcansignificantlymultiply 
thepotentialimpactofanITsabotagecrime;therefore,countermeasures 
shouldbeconsideredtopreventordetectsuspiciouscommunicationinthe 
workplace.TheseissuesarecoveredinChapter9.
Mergersandacquisitionsincreasetheriskofinsiderthreats;therefore,we 
recommendyoucarefullyconsiderallofthebestpracticesinChapter6, 
BestPracticesforthePreventionandDetectionofInsiderThreats,before 
embarkingonthatactivity.
Culturaldifferencesandforeignallegiancecouldinfluencethebehavioral 
modelspresentedinChapter2andChapter3.
Breakdown of Cases in the Insider Threat Database
Atthetimeofthiswriting,wehavemorethan700casesinourinsider 
threatdatabase.Mostoftheworkdetailedinthisbookisbasedonthe 
intentionalinsidercrimesthatoccurredwithintheUnitedStates.The 
ptg7481383
Chapter1. Overview
8
chartinFigure1-1depictsthebreakdownofthosecasesbytypeofcrime, 
includingnationalsecurityespionagecrimes.Casesofindustrialespionage 
areincludedbutaspartofthetheftofIPcategory.
NotetheMiscellaneous(labeled“Misc.”)barinthegraph.Thesemiscel-
laneouscaseseitherdon’tfitintotheothercategoriesorarefairlynewand 
wehavenotbeenabletogathermuchinformationonthem.Weliketotrack 
casesinourdatabaseassoonaswebecomeawareofthem,butcategorize 
themunderMiscellaneousuntilwehavesufficientinformationtoinclude 
theminouranalysis.
Somecrimesfallintomultiplecategories,asillustratedinthiscase
example.
Amanagerintheengineeringdepartmentofamanufacturingcom-
panydidnotgetalongwithhiscoworkers;oneofthemevenquithisjob 
becauseofconflictswithhim.Heactuallybraggedaboutthethingshe 
haddonetoinfuriatethecompany’smanagement.Afteradisputewith 
anothercolleague,theinsiderabruptlyquithisjob,butthenfoundout 
hewouldnotreceiveaseverancepackage.Hethereforechoseanother 
routetogainaformofseverancepay:Whileatworkhemadeacopyof 
thesystembackups,deletedallremainingtracesofhiscompany’spremier 
Figure 1-1 BreakdownofintentionalinsidercrimesintheUnitedStates 
(includingnationalsecurityespionage)
250
200
100
150
50
0
235
134
120
90
52
IT Sabotage Fraud Theft of IP Misc. Espionage
ptg7481383
9CERT’sMERITModelsofInsiderThreats
product,includingthebackups,andtooktheonlyremainingcopywith 
him.Hethenofferedtorestorethedatafor$50,000,whichhebelievedto 
betheamountofseverancetowhichhewasentitled.Hethreatenedto 
retaliatewithmassivelegalandpersonalattacksifthecompanycontacted 
lawenforcementoritslawyers;however,hewasarrestedandconvicted. 
Unfortunately,thecompanywentoutofbusinessbecausetheinformation, 
valuedatupto$10million,wasneverrecovered.
Theinsiderinthatexamplestoletheinformation(theftofintellectualprop-
erty)inordertoharmthecompany(ITsabotage)andextortedmoneyfor 
itsreturn(fraud).Therefore,itisimportantwhenconsideringthedetails 
ofeachtypeofcrimeasdescribedinthisbookthatsomeinsiderscarryout 
multipletypesofcrimes.
CERT’s MERIT Models of Insider Threats
MERITstandsforManagementandEducationoftheRiskofInsiderThreat. 
AspartoftheMERITprojectwedevelopedaseriesofmodelsandasso-
ciatedtoolsthatevolvedintotheassessments,workshops,andtechnical 
solutionsyouwillreadaboutintheremainderofthisbook.
Asyoureadthisbook,youwillnoticethatwerelyheavilyonourinsider 
threatmodelsfordesigningthemosteffectivemitigationstrategies.Our 
insiderthreatdatabaseyieldsawealthofinformationregardingthedetails 
ofhundredsofinsidercrimes.Itisquiteusefultobeabletodeterminethe 
numberofpermanentemployeesversuscontractors,thenumberofinsid-
erswhoconstructedlogic bombs,2howmanyorganizationsexperienced 
areductioninforcebeforeaninsiderattack,andsoon,directlyfromour 
database.However,becauseofthecomplexityoftheinsiderthreatissue, 
wefeelthatunderstandingthe“bigpicture”oftheproblemisthekeyto 
successinovercomingit.Theinsiderthreatmodelshelpdescribeandcom-
municatethisbigpicture.
2.  Logic bomb:maliciouscodeimplantedonatargetsystemandconfiguredtoexecuteafteradesig-
natedperiodoftimeorontheoccurrenceofaspecifiedsystemaction.
MERIT stands for Management and Education of the Risk of Insider
Threat.
ptg7481383
Chapter1. Overview
10
Thepurposeofourmodelsistoidentifypatternsintheevolutionofthe 
casesovertime.Inshort,wefocusedonthestorybehindthecases,and 
developedmodelsthattellthatstoryinawaythatyoucanunderstand 
andacton.
In short, we focused on the story behind the cases, and developed
models that tell that story in a way that you can understand and act on.
Why Our Profiles Are Useful
HereisanexampleofwhywebelievetheprofilesandassociatedMERIT 
modelsarecriticaltodesigningasuccessfulinsiderthreatmitigation 
strategy.
Aprogrammeratatelecommunicationscompanywasupsetbecausehe 
didnotgettheanticipatedpromotiontoleaderofhissoftwaredevelop-
mentteam.Inordertoexactrevenge,headdedtwoadditionallinesofcode 
tohisemployer’spremiertelecommunicationsproduct.Whentriggered, 
thenewcodewouldrandomlyinserttheletteriintothetransmission 
stream.Hechecked-inthemodifiedcode,butdidnotsetittoexecute.Five 
monthslater,hefoundanewjobandquit.Beforeheleft,however,heset 
themalicious code3tobeginexecutionsixmonthsinthefuture.Atthat 
time,themaliciouscodebegancorruptingtheorganization’scommunica-
tionstreamanddisruptingcustomerservices.
Thecrimeinthatcasehadsignificantconsequencesforthevictimorganiza-
tion.Itsprimaryserviceforitscustomerswasdisrupted,withnoobvious 
explanationfortheproblem.Ifyouareasoftwareengineer,youknowhow 
youapproachaproblemlikethis:Whatchangesdidwereleaseyesterday? 
Howaboutthedaybefore,orlastweek,orlastmonth?Theinvestigation 
requiredexaminationoflogsspanningalmostayear,atwhichpointthe 
companyfinallyfoundevidenceofthecrime.
Nowlet’sexaminehowourprofilescouldhavebeenusefulindetecting 
thismaliciouscodebeforeitexecuted.Thesimpleadditionoftwolinesof 
sourcecodewouldprobablynothaveappearedtobemalicious,asthispro-
grammerwasresponsibleformaintainingthatcode.Codereviewsofevery 
changetothissystemcouldcertainlyhaveidentifiedthemaliciouscode, 
butwefindthatmostorganizationsdonotperformcodereviewsoncea 
systemisinstable,productionmode.Couldthishappentoyou?Could 
oneofyoursoftwareengineersputtwolinesofcodeintoyourmost  critical 
3.  Malicious code:intendedtoexecuteamaliciousfunction.Alsocommonlyreferredtoasmalware.
ptg7481383
11CERT’sMERITModelsofInsiderThreats
productionsystemandcauseittofailordisruptoperations?Doyoudo 
codereviewsofeverychangetothatsystem?
Thegoodnewsisthatbyunderstandingourinsiderthreatprofiles,you 
willhaveachanceofpreventingthisfromhappeningtoyou.Thisisan 
exampleofanITsabotageattack,sopleasereadChapter2formitigation 
strategiesforthistypeofincident.Youwilllearnthatdisgruntledtechni-
calemployeeswhoexhibitconcerningbehaviorsintheworkplaceoveran 
extendedperiodoftimeshouldnotbetakenlightly.Inaddition,manyof 
themsetuptheirattackwhilestillemployedbutexecutetheattackfollow-
ingtermination.OurmitigationstrategiesforinsiderITsabotagearebased 
onthosepatterns.
Why Not Just One Profile?
AsweworkedontheInsiderThreatStudywecametorealizethatall 
insiderthreatsarenotalike.However,wealsorealizedthatthereappeared 
tobedistinctsimilaritiesinhoweachtypeofinsidercrimeevolvedover 
time.Therefore,wechoseonetypeofinsidercrimetoprofilefirst:insider 
ITsabotage.ThecasesofinsiderITsabotageintriguedusbecausethey 
wereamongthemoretechnicallysophisticatedattacksexaminedinthe 
studyandresultedinsubstantialharmtopeopleandorganizations.
Inperformingthe“bigpicture”analysisofinsiderITsabotage,wefirst 
reviewedallinsiderITsabotagecasestoidentifythosewithsufficient 
informationforthistypeofanalysis.Weneededcasefilesthatcontained 
detailsregardingwhytheinsiderattacked,whateventssurroundedthe 
attack,whattechnicalactionstheinsidertooktosetupandcarryoutthe 
attack,whatconcerningbehaviorsdidtheinsiderexhibitatworkpriorto 
theattack,andsoon.Wediscoveredaverystrongpatternthatappliedto 
almosteveryITsabotagecaseinourdatabase.
NOTE
Insider IT sabotage crimes have happened in every sector and no
organization should disregard this type of threat.
NOTE
It is important that you understand that the crime profiles and associated
models are very different for each type of insider threat. Who does it,
when, why, how—these are very different for each of the three types of
crimes: insider IT sabotage, theft of intellectual property, and fraud.
ptg7481383
Chapter1. Overview
12
Next,wevalidatedthosepatternsagainstthedatainourdatabaseand 
identifiedgeneralobservationsaboutthemajorityofthecases,andthenwe 
were readytocreateourmodels.Wechosesystemdynamicsmodeling;we 
foundthatthesystemdynamicsapproachhelpedtostructureandfocusthe 
team’sdiscussion.Weusedagroupmodelingapproachwithexpertsfrom 
bothpsychologyandinformationsecurity.AppendixF,  SystemDynamics 
Background,containsamorein-depthdiscussionofsystemdynamicsfor 
readerswhoareinterestedinmoredetails.
OurMERITmodelofinsiderITsabotagewaspublishedin2008:The “Big
Picture” of Insider IT Sabotage Across U.S. Critical Infrastructures[Moore2008]. 
TheinformationfromthatreportiscoveredinChapter2.Ournextinsider 
threatmodelwasfornationalsecurityespionageandisnotincludedinthis 
book.In2011wepublishedourMERITmodelofinsidertheftofintellectual 
property,A Preliminary Model of Insider Theft of Intellectual Property[Moore 
2011a].TheinformationfromthatreportiscoveredinChapter3.
Wewillsoonbecreatingafraudmodelaspartofacurrentprojectwiththe 
SecretService,theU.S.DepartmentofHomelandSecurity(DHS)Science 
andTechnology(S&T)Directorate,andU.S.DepartmentoftheTreasury.
Wehaveincludedapreliminaryanalysisofourfraudcasespriortothat 
studyinChapter4,whichisbeingpublishedintheCERT Research Annual
Report[Moore2011b].
Why Didn’t We Create a Single Insider Theft Model?
AfterthesuccessofourinsiderITsabotagemodel,wedecidedtocreatean 
insidertheftmodel.Wewentthroughthesamestepsasbefore:Weidenti-
fiedcaseswithrichinformationavailable,identifiedkeyelementsinthe 
cases,andthenattemptedtoidentifytheprevalentpatternsinagroup 
modelingsession.However,inexaminingallofourtheftcases,wefound 
thattherewasnotastrongpatternliketheoneweidentifiedfortheITsab-
otagecases.Instead,wediscoveredtwodifferentpatternsthatseemedto 
bebasedonthetypeofinformationstolen.
Werealizedthatinsiderswhostealinformationthatisusedtocommit 
identitytheftorcreditcardfraudtendtobelower-levelemployeesinthe 
organizationwhofindawaytomakeextramoneyonthesidebystealing 
information.Theyusuallysellthedatatosomeoneoutsidetheorganiza-
tionwhoactuallyusesthedatatocommitidentitytheftorcreditcardfraud. 
Thesetendtobelong,ongoingschemesthatcontinueuntiltheinsideris 
caught.
ptg7481383
13OverviewoftheCERTInsiderThreatCenter
Theinsiderswhostealintellectualpropertyaretotallydifferent!Theytend 
tobeengineers,scientists,programmers,andsalespeoplewhostealinfor-
mationastheyareleavingtheorganization.Furthermore,theystealthe 
informationtotaketotheirnewemployer,usuallyacompetitor,ortostart 
theirowncompetingbusiness.
Thus,weendedupcreatingthemodelforinsidertheftofintellectualprop-
erty,andtheinsiderfraudmodel.Oh,butwait:There’sjustabitmore!
Asweexploredthedatafurther,wediscoveredmoreinterestingpatterns. 
First,wefoundthattheinsidertheftofintellectualpropertycrimesactually 
didfallintotwooverlappinggroups:insiderswhoactedalone,andthose 
whoactuallyleda“ring”ofinsiderstostealtheinformation.SeeChapter3 
formoredetails.
Second,wefoundthatcasesinwhichinsidersmodifiedinformationfor 
financialgainfitthesamemodelastheoneswhostoleinformationtocom-
mitfraud;theywerelower-levelemployees.Theysimplyfoundawayto 
makeextramoneybymodifyinginformationratherthanstealingit.For 
instance,theycreatedfakedriver’slicenses,modifiedcriminalhistories, 
orchangedsalaries.Thereareobviouslydifferencesinthetechnicalmeth-
odsusedtostealversusmodifyinformation,buttheotherpatternsinthe 
crimesarethesame.Therefore,ourinsiderfraudmodelincludesbothtypes 
ofcrimes.SeeChapter4fordetails.
Overview of the CERT Insider Threat Center
TheobjectiveoftheCERTInsiderThreatCenteristoassistorganiza-
tionsinpreventing,detecting,andrespondingtoinsidercompromises.
Figure1-2depictsthemaliciousinsideratthestartoftheincidenttime-
line,andthedamageattheendofthetimeline.Ourultimategoalisto
helpyoupreventtheinsiderfromattacking.However,ifheshoulddecide
toattack,ourobjectiveistoprovideyouwiththeunderstandingand
solutionsyouneedtodetecttheillicitactivityasearlyinthetimelineas
possible.Unfortunately,somemaliciousinsiderswillsucceedintheir
attack;inthosecaseswewanttoarmyouwithpolicies,practices,and
technicalmeasuressothatyoucanrespondtotheattackasquicklyaspos-
sible.Responsemeasuresincluderecoveringfromtheattack,identifying
theperpetrator,andimplementingnewmeasuresforimprovedincident
managementinthefuture.
ptg7481383
Chapter1. Overview
14
Figure1-2alsoillustrateshowwehopetoachievethoseobjectives:through 
detectionofbothtechnicalandnontechnicalindicators.Ifyoulearnonly 
onethingfromthisbook,letitbethis:Insider threats cannot be prevented and
detected with technology alone.Insidersuseauthorizedaccesstothesystems 
andinformationtheyaccesseverydaytocarryouttheirattacks;therefore, 
automateddetectionbasedsolelyononlineactionsisextremelydifficultif 
notimpossible.
Figure 1-2 ObjectiveoftheCERTInsiderThreatCenter
HR, Legal, Physical
Nontechnical Indicators
RespondDetectPrevent
Timeline
Technical Indicators
Opportunities to prevent, detect, and respond to an insider attack
INSIDER DAMAGE
If you learn only one thing from this book, let it be this: Insiderthreats 
cannotbepreventedanddetectedwithtechnologyalone.
Wefeelitisimportantthatyouunderstandthebasisoftheinformation
presentedintheremainderofthisbook.Manybooksandarticleshave
beenwrittenaboutinsiderthreat,manyofthemposingelaboratesce-
nariosinwhichtechnicallyprivilegedusersusesophisticatedmeansto
exfiltrateinformationorsabotagetheiremployer’snetworks.Itisimpor-
tantthatyouunderstandthatallofourworkintheCERTProgramis
basedonempiricaldata.Whathaveinsidersactuallydone?Howhave
theydoneit?
OurdatabaseprovidesthefoundationofallofourworkintheCERT 
InsiderThreatCenterasdepictedinFigure1-3.Ourmodels,whichare 
ptg7481383
15OverviewoftheCERTInsiderThreatCenter
usedtodescribehowthecrimesevolveovertime,providethenextlayerin 
thatfoundationuponwhichallofourworkisbased.
TheCERTInsiderThreatCenterconsistsofthreeteams,andallthreeteams 
basetheirworkontheinsiderthreatdatabaseandmodels.Specifically,the 
InsiderThreatResearchTeambasesitsresearchonempiricaldatafromthe 
casesinthedatabaseandourmodels.Theinsiderthreatlabdevelopsnew 
technicalsolutionsandstandardstofillgapsinthecurrenttoolsmarket; 
theyfocusongapareasasdictatedbythemeansofexecutionofcrimesin 
thedatabaseandthepatternscapturedinourmodels.TheInsiderThreat 
OutreachandTransitionTeamdevelopsinsiderthreatassessments,work-
shops,andexercisesbasedoncasesinthedatabaseandthemodels.
Inaddition,allthreeteamsshareinformationandcollaboratewithone 
another,asshowninFigure1-4.Forexample,theResearchTeamperforms 
Figure 1-3 CERTInsiderThreat 
Centerbodyofwork
Research Lab
Models
Database
Outreach
and
Transition
Figure 1-4 Informationsharinginthe 
CERTInsiderThreatCenter
Research Lab
Models
Database
Outreach
and
Transition
ptg7481383
Chapter1. Overview
16
policyandlegalresearchandappliesscience-basedapproachestoanalyze 
theefficacyofsolutionsdevelopedinthelab.Thelabtacklesdifficultprob-
lemsuncoveredbytheOutreachandTransitionTeamdoingassessments 
inthefield.TheOutreachandTransitionTeamgathersinformationabout 
whatisactuallyworkingandnotworkingforpractitionersandconveys 
thoseissuestotheotherteams,andsoon.
OvertheyearswehavebuiltastructureintheInsiderThreatCenter
thatenablesustostayintouchwithwhat’shappeninginthefield,
takeadvantageofouruniquepositioninoneoftheleadingresearch
universitiesintheworld,andpartnerwithgovernmentandindustryto
developsolutionsthatarehavinganimmediateimpactoninsiderthreat
mitigation.
Timeline of the CERT Program’s Insider Threat Work
TheCERTProgram’sinsiderthreatresearchbeganin2000andhascontin-
uedtogrow.Inthissectionwepresentabrieftimelineofthehistoryofthe 
CERTProgram’sworkinthisarea.Figure1-5summarizestheevolutionof 
thebodyofworkoftheCERTInsiderThreatCenter.
2000 Initial Research
TheCERTProgram’soriginalinsiderthreatresearchwassponsoredbythe 
U.S. Departmentof Defense (DOD)in 2000, andfocused oninsider threats 
inthemilitaryservicesanddefenseagencies.
2001 Insider Threat Study
Ourinsiderthreatresearchrampedupthefollowingyear,in2001,whenthe 
SecretServiceNationalThreatAssessmentCenter(NTAC)andtheCERT 
Programjoinedeffortstoconductauniquestudyofinsiderincidents,the 
InsiderThreatStudy(ITS).TheDepartmentofHomelandSecurity,Office 
ofScienceandTechnology(DHSS&T)providedfinancialsupportforthe 
completionofthestudyin2003and2004.Fourreportswereproducedasa 
resultofthateffortfocusingonthebankingandfinancesector[Randazzo 
2004],theinformationtechnologysector[Kowalski2008a],thegovernment 
sector[Kowalski2008b],andtheanalysisofinsiderITsabotageacrossall 
criticalinfrastructuresectors[Keeney2005].
ptg7481383
17TimelineoftheCERTProgram’sInsiderThreatWork
2001 Insider Threat Database
AfterthecompletionoftheInsiderThreatStudywiththeSecretService,
werealizedtheenormousvalueofourdatabase.Followingthestudy,
CarnegieMellon’sCyLab4agreedtosponsortheongoingmaintenance
andevolutionofthedatabase,andin2009theDHSFederalNetwork
Security(FNS)branchbecamethesponsoroftheCERTinsiderthreat
database.
2005 Best Practices
In2005,CyLabprovidedfundingtousforthe“CommonSenseGuideto 
PreventionandDetectionofInsiderThreats.”Ourbestpracticeworkis 
nowbeingsponsoredbyDHSFNS.Thebestpracticesfromthe“Common 
SenseGuide”aredetailedinChapter6.
2005 System Dynamics Models
AfterpublishingtheInsiderThreatStudyreportswiththeSecretService, 
wefeltthatpeoplewerelookingforafewnuggetstheycouldtakeback 
totheirITstafffortechnicalresolution,andwerenotseeingthe“bigpic-
ture”ofhowthesecrimesevolveovertime.WeconvincedCyLabtofund 
ustodevelopmodelsofinsiderthreat.Theproject,titledMERIT(for 
ManagementandEducationoftheRiskofInsiderThreat),resultedin 
groundbreakingmodelsthathaveinfluencedresearchersandpractitioners 
aroundtheworldeversince.Thosemodelshavebecomeanotherfounda-
tionuponwhichallofourworkisbased.
Wediscussoursystemdynamicsmodelingworkinmoredetailin 
AppendixF.
2006 Workshops
In2006,CyLabcontinueditssupportofourinsiderthreatworkby  funding 
ustodevelopaninsiderthreatworkshop.Whatstartedoutasahalf-
dayworkshophasexpandedovertheyearssothatwenowofferseveral 
versions:atwo-daypublicoffering,on-siteworkshopsforindividual 
organizations,half-dayandone-dayversions,andcustomworkshops, 
includinganexecutiveworkshopforC-levelexecutivesandacademically 
orientedworkshopsfocusedonaspecificresearchobjective.
4.  www.cylab.cmu.edu/
ptg7481383
Chapter1. Overview
18
AppendixA,InsiderThreatCenterProductsandServices,containsmore 
detailsabouttheCERTinsiderthreatworkshops.
2006 Interactive Virtual Simulation Tool
In2006,wedevelopedMERITInterActive(MERITIA),aprototypeof
aninteractivevirtualsimulationtool—essentiallyavideogameto
teachinsiderthreatmitigationwithCarnegieMellon’sEntertainment
TechnologyCenter(ETC).AppendixE,InsiderThreatTraining  Simulation:
MERITInterActive,containsmoredetailsabouttheMERITInterActive
insiderthreattrainingsimulationprototype.
2007 Insider Threat Assessment
Wecreatedthefirstversionofourinsiderthreatassessmentinstrument, 
sponsoredbyCyLab,basedonmorethan4,000issuesofconcern(orga-
nizedintomorethan130categories)thatweidentifiedfromcasesinour 
database.WecreatedaseriesofsixassessmentworkbooksforInforma-
tionSecurity/InformationTechnology,HumanResources,Software 
Engineering,Legal,DataOwners,andPhysicalSecurity.In2009,DHSFNS 
recognizedthevalueofourassessmentprocess,andsponsoredaneffort 
toenhancetheinsiderthreatassessmentintoamorescalableprocesswith 
measurableresults.
AppendixAcontainsmoredetailsabouttheCERTinsiderthreat 
assessments.
2009 Insider Threat Lab
In2009,CyLabfundedcreationofourinsiderthreatlab,whereour 
technologistscouldtestexistingtechnicalsolutionsfortheinsiderthreat 
problemandidentifyneworrefinedsolutionsingapareas.CyLabfunded 
thelabhardwareandsoftwareinfrastructurein2009,andin2010,DHS 
FNSfundedustobegindevelopingsolutionsusingthelab.
SeeChapter7,TechnicalInsiderThreatControls,formoredetailsabout 
technicalcontrolswecreatedintheinsiderthreatlabthatyoucan 
implementinyourownorganization.
2010 Insider Threat Exercises
TheCERTProgramhasdevelopedXNET,aplatformthatallows 
organizationstocreatecustomized,realistic,interactivesimulationson 
ptg7481383
19TimelineoftheCERTProgram’sInsiderThreatWork
anisolatednetwork.5In2010,DHSFNSfundedustocreateinsiderthreat 
exercisesusingXNET.Theseexercisesarenowofferedtogovernmentand 
industrypractitionersatworkshopsandconferences.
SeeChapter7formoreinformationaboutourinsiderthreatexercises.
2010 Insider Threat Study—Banking and Finance Sector
In2010,DHSS&TbroughttogethertheCERTInsiderThreatCenter,the 
SecretService,andtheDepartmentoftheTreasurytorepeattheoriginal 
InsiderThreatStudy.Thistime,however,thefocuswassolelyoncasesthat 
occurredinthebankingandfinancesector.Attheendofthestudy,areport
willbepublishedmuchliketheoriginalstudy.Inaddition,wewillpub-
lishasystemdynamicsfraudmodelthatwillevolvethepreliminaryfraud 
modelpresentedinthisbook.
Chapter4containsapreliminaryfraudmodelthatwasdevelopedprevi-
ouslyaspartoftheCyLabMERITproject.
Figure1-5showsasummaryofthehistoryoftheCERTInsiderThreat 
Centerbodyofwork.
5.  FormoreinformationonCERT’sXNETcapability,seehttp://xnet.cert.org/.
Figure 1-5 CERTInsiderThreatCentertimeline
2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011
Initial
Research
Insider Threat Study
Insider Threat Database
Insider Threat Assessment
Insider Threat Lab
Insider Threat
Exercises
Insider Threat
Study – Banking
and Finance Sector
Best Practices
System Dynamics Models
Workshops
Interactive
Virtual
Simulation
Tool
ptg7481383
Chapter1. Overview
20
Caveats about Our Work
Organizationsareoftenreluctanttoreportincidentsofillicitinsider 
cyberactivity,eventolawenforcement.Therefore,theactualnumberof 
insidercasesismostlikelysignificantlygreaterthanthosethatwehave 
beenabletoidentify.Ourworkislargelybasedonreportedcases,although 
our  assessmentshaveexposedustoadditionalcasesnotreportedto 
lawenforcement.Thislimitstheabilitytogeneralizeourfindingstoall
organizationsandunderscoresthedifficultyotherresearchershavefaced 
intryingtobetterunderstandinsiderthreat.Nevertheless,thislimitation 
doesnotdiminishthevalueoftheknowledgethatwegainedfromanalyz-
ingtheseincidents.Weprovideinsightintoactualcriminalandotherillicit 
actscommittedbyinsiders.Thisinsighthasbeenfoundtobequiteuseful 
toindividualswhoarechargedwithprotectingcriticalassetsastheybegin 
toexaminewaystoimprovetheirdefensesagainstinsiderthreats.
Theotherlimitationofourworkisthatwehaveonlycollecteddatafor 
maliciousinsiders.Wehavenotbeenabletocollectsimilardatafor“good 
guys.”Weknowhowtheconvictedinsidersactedinourcases,andhave 
identifieddefinitepatternsintheirbehavior,bothonlineandsocially.But 
wehavenoideaif“normal”peopleexhibitthosesamebehaviors.Thisis 
anareaofresearchthatiswidelyrecognizedtobelackingintheinsider 
threatdomain,butunfortunatelynoonehascomeupwithagoodway 
to  collectthecomprehensivetypesofdatawehavewithoutviolating 
employee  privacy.
Do thesecaveats impact the usefulnessof our research? From an academic 
perspective,yes.However,feedbackfrompractitionerssince2001has 
encouragedustocontinueforgingaheadinourstudyofmaliciousactors, 
sinceourfindingsresonatewiththecommunity.Inaddition,ourcoun-
termeasureshavereceivedoverwhelminglypositivefeedbackfromthose 
taskedwithkeepingtheirorganizations’systems,data,andnetworkssafe 
frominsiderthreats.
Summary
Bynowyoushouldunderstandthattherearethreedistincttypesofinsider 
threats:insiderITsabotage(coveredindetailinChapter2),theftofintel-
lectualproperty(coveredindetailinChapter3),andfraud(coveredin 
detailinChapter4).Youhavebeenexposedtosomeactualcaseexamples 
ptg7481383
21Summary
foreach,soyoushouldnowunderstandwhichofthosethreatsareofmost 
concerntoyou.Youshouldnowknowwhichchapter—2,3,or4—youwant 
toreadnextinthebook.Wedorecommendthatyouunderstandthenature 
oftheinsiderthreatproblembeforeyoujumptothesolutionsofferedin 
Chapter6andChapter7.
Chapter5,InsiderThreatIssuesintheSoftwareDevelopmentLifeCycle, 
isdevotedtothatspecifictypeofinsiderthreat.Thesecrimescanbequite 
destructiveanddifficulttodetect,sowestronglyrecommendyoureadthat 
chapterifyoudoanysoftwaredevelopmentinyourorganization.
Youshouldnowrecognizetheexpandingcomplexityofinsiderthreats, 
includingthreatsfromtrustedbusinesspartners,dangersposedbycollu-
sionwiththeInternetundergroundandorganizedcrime,andimpactsof 
foreignallegiancesandculturalissues.Iftheseissuesareofconcern,you 
willfindthemaddressedinmoredetailthroughoutthebook.
Wediscussedoursystemdynamicsmodeling,andexplainedthatthe 
descriptionsofourmodelsinthisbookarewrittenformanagersandprac-
titioners.Wedescribedthehigh-levelpatternsweobservedforeachtype 
ofcrime.Wehavepresentedthesemodelsforyearstodiverseaudiences, 
includingtechnicalandnontechnical,managementandnonmanagement, 
aswellasCISOs,CSOs,andpersonnelinlegal,HR,physicalsecurity,soft-
wareengineering,andsoon.Thefeedbackisalwaysoverwhelmingly 
positive.
Finally,weprovidedabriefoverviewoftheCERTInsiderThreatCenter. 
Wewantedtogiveyouenoughbackgroundonthebreadthofourcapabili-
tiessothatyouwouldbecomfortablethatweknowwhatwe’redoing,and 
youcantrustthematerialinthisbook!
ptg7481383
This page intentionally left blank
ptg7481383
23
Chapter  2
InsiderITSabotage
Insider IT sabotage: insider incidents in which the insider uses information
technology (IT) to direct specific harm at an organization or an individual.
CasesofinsiderITsabotageincludethemosttechnicallysophisticated 
attacksintheCERTinsiderthreatdatabase,andhavecausedsubstantial 
harmtopeopleandorganizations.InsiderITsabotagehasoccurredin 
almosteverycriticalinfrastructuresector,andposesathreattovirtually 
everyorganizationingovernmentandindustry—toanyorganizationreli-
antoninformationtechnology.InoneinsiderITsabotagecase,aformer 
systemadministratorwipedout18monthsofcancerresearch,whichwas 
neverrecovered.Inanother,acompanylost$10million,laidoff80employ-
ees,andnearlywentoutofbusiness.Inyetanother,billionsofcriticalfiles 
weredeletedfromafinancialinstitution’sserversaroundtheworldwhen 
alogicbombwentoffoneveryserverat9:00a.m.justwhenthebanks 
openedforbusiness.InthischapterwedescribetheprofileofinsiderIT 
sabotageandpresentstrategiesformitigatinginsiderITsabotagecrimes.1
Thesecrimesarecommittedbytechnicallysophisticatedsystem 
administratorsorprogrammers,usingthesametypesofonlineactions 
typicallyusedbythosesameemployeesorcontractorsinthecourseof 
theirnormalactivity.Therefore,somesaythatstoppingthesetypesof 
1.  Materialinthischapterincludesportionsfrompreviouslypublishedworks.Theprimarysourcewas 
writtenbytheauthorsofthisbookasachapterinInsider Attack and Cyber Security: Beyond the Hacker
editedbyS.J.Stolfoetal.,SpringerScience+BusinessMedia,LLC[Moore2008].Earlierversionsofthe 
insiderITsabotagemodelwerepublishedin[Moore2007,Cappelli2006,Band2006].
ptg7481383
Chapter2. InsiderITSabotage
24
attacksisnexttoimpossible.Fortunately,wehaveidentifieddistinctpat-
ternsinnearlyeveryinsiderITsabotagecase.Inthischapterwedescribe 
thosepatternsandpresentmitigationstrategiesthatusethosepatternsto 
youradvantage.Thesetechniquesincludebothtechnicalandnontechni-
calmeasures.Inaddition,someareproactiveacrosstheenterprise,while 
othersaretargetedatspecificemployeestriggeredbyindicatorsthatcould 
suggestanincreasedriskofattack.
Forexample,wesuggestcountermeasuressuchasperiodicaccountaudits, 
sinceanumberoftheseinsiderscreatedbackdoor accounts2priortobeing 
firedsothattheycouldgetbackinandexacttheirrevengefollowingter-
mination.Withmoreandmoreidentity management systems3available, 
wewouldexpecttoseeareductionintheuseofthistechnique.However, 
duringtheweekthischapterwaswritten,aformersystemadministratorat 
alarge,multinationalcorporationusedaVPN token4hehadcreatedfora 
nonexistentemployeepriortobeingfiredtobreakbackintohisemployer’s 
networkandsabotageitssystems.
Ontheotherhand,werealizethataccountauditsaretimeconsumingand 
difficulttoperform,especiallyattimesofreducedstaffinglevels.  Therefore, 
wealsosuggestthatwhenasystemadministratorissanctionedand“on 
theHRradar”youperformadetailedauditofallaccountsthathavebeen 
createdsincehefirstbecamedisgruntledandbeganexhibitingconcerning 
behaviorsintheworkplace.
Thebottomlineisthatwebelievethereisagoodchancetothwartthese 
attacks,butitrequirescarefulplanningandimplementationofmitigation 
strategiesacrossyourorganization.Wedohavesome“good-news”cases.
2.  Backdoor account:anunauthorizedaccountcreatedforgainingaccesstoasystemornetwork 
knownonlytothepersonwhocreatedit.
3.  Identity Management System:asystemortechnologythatsupportsthemanagementofidentities. 
ItisgenerallyacceptedthatanIMSwillestablishidentities,describeidentitiesthroughoneormore 
attributes,followidentityactivity,andbecapableofremovinganidentityfromthesystemitmanages 
(adaptedfromFutureofIdentityintheInformationSociety).
4.  Virtual private network (VPN):avirtualnetwork,builtontopofexistingphysicalnetworks,that 
providesasecurecommunicationstunnelfordataandotherinformationtransmittedbetweennet-
works(NISTSP800-46).AVPN tokenisadevice,possiblyphysical,thatanauthorizeduseroftheVPN 
isgiventoeaseauthentication.
Fortunately, we have identied distinct patterns in nearly every insider IT
sabotage case. In this chapter we describe those patterns and present
mitigation strategies that use those patterns to your advantage.
ptg7481383
25InsiderITSabotage
A logic bomb would have wiped out every le on every server on
the network.Fortunately,theorganizationreactedswiftlytoasuspi-
ciouscommentmadebyasystemadministratorwhowastobefired 
thefollowingMonday,tookallsystemsofflineovertheweekend,and 
discoveredthelogicbombbeforeitexecuted.
A logic bomb would have destroyed information on more than
70 servers, including a critical patient-specific, drug-interaction
conflict database.Fortunately,acomputersystemadministrator,
while  investigatinga  systemerror,discoveredthelogicbomb,noti-
fiedIT,andthemaliciouscodewasneutralizedbeforeimpactingthe
organization.
TheimpactsofaninsiderITsabotageattackcanbedevastating:  Companies 
havegoneoutofbusiness,lostmillionsofdollars,lostentireproductlines, 
orhadtoundergomassivelayoffs.Impactsoftheseattacksingovern-
mentagenciesandcriticalinfrastructureorganizationshaverangedfrom 
embarrassingreputationalimpactstoseriousthreatstonationalsecurity. 
Financialimpactsinthe123casesintheCERTdatabaseatthetimethiswas 
writtenaveraged$1.7million,rangingfrom$1,000to$87million.(Note 
thathalfoftheorganizationssuffered$50,000orlessinfinanciallosses.) 
However,theimpactsarenotlimitedtofinanciallosses;operationaland 
businessimpactsweredevastatinginmanyofthesecases.
Westronglysuggestthatyoupaycloseattentiontothischapter.Wefind 
thatmanypeopledonotfullyunderstandtheriskofinsiderITsabotageto 
theirorganization.Forinstance,financialinstitutionsareunderstandably 
concernedwithinternalfraud.Butwhatifafinancialinstitution’scustom-
erscouldnotusetheirdebitorcreditcards,useATMs,oraccessanyoftheir 
moneyforanentireweekendafterafiredsystemadministratorsabotaged 
criticalserversonaFridaynight?That’swhathappenedtooneunfortu-
natefinancialinstitution.
Likewise,manufacturing,pharmaceutical,andchemicalorganizations 
seemtobemostconcernedwithprotectionoftheirtradesecrets—formulas, 
manufacturingprocesses,andengineeringinformation.Butwhatif,asin 
onecompany,aroguesystemadministratorsabotagedthemanufacturing 
process,resultinginthedisruptionofcriticalmachineryandtheultimate 
collapseofthecompany?
Finally,nationalsecurityespionagearguablyreceivesthemostattention 
intheU.S.government,butconsidermultiplecasesinwhichgovernment 
employeeshelpedundocumentedimmigrantsobtaincitizenshipand 
governmentcredentialsforprofit.
IT破坏的
影响是毁
灭性的:
经济损
失、生产
线停滞以
及大规模
员工失
业;对于
政府而
言,小到
声誉受
损,大到
国家安全
均有涉
及。
IT破坏的
目标是数
据或服务
的可用
性,这才
是最为关
键的前
提。
ptg7481383
Chapter2. InsiderITSabotage
26
Unfortunately,allofthesethingsreallydidhappen,andmuchtothe 
surpriseofthevictimorganizations.Itdoesnottakemuchimaginationto 
envisionthepotentialforathreatofevengreaterharm,suchasmalicious 
softwarethatresultsinthereleaseoftoxicchemicalsbyamanufacturer,or 
masscasualtiesofourarmedforces.
Nowthatwehavecaughtyourattention,let’slookatthecharacteristics 
and“bigpicture”ofinsiderITsabotageattacks.
Impacts of Insider IT Sabotage Attacks
TheimpactsofinsiderITsabotageattackshaveincludedthefollowing.
Electricitybetweenpowergridswasshutdowninoneareaofthe 
UnitedStates.
Asafetyhotlinewasdisabled.
Morethan50,000customerrecordswerecorrupted.
Thirtythousandcopiesofanewspaperhadtobereprinted.
Acompany’sdomain name5wasaddedtoanti-spam blacklists.6
Criticaldatawaslostandthecompanywentoutofbusiness(multiple 
cases).
Theorganization’snetworkwasinaccessible—rangingfromhoursto 
daystothreemonths(multiplecases).
Apersonwasmarkedasbeingdeceasedinalargegovernment 
database,causingmajorproblemsfortheperson.
Carsinexplicablyshutdownortheirhornsbeepednonstop.
Acompany’svoice-mailsystemwasredirectedtoapornographic 
phoneservice.
Customers’creditcardnumberswerepostedtotheInternetalong 
withotherproprietaryinformation.
Alladministrativepasswordsatacompanywerechanged,system 
filesweredeleted,abillingsystemwasdestroyed,andtwointernal 
databasesweredeleted.
Acompany’sinternationale-commercesitewasunavailable(multiple 
cases).
Hundredsofstaffhourswererequiredtorecoverfrombackupsor 
reenterdatamanually(multiplecases).
Acompany’sclients’Webpagesweremodifiedtocontainembarrassing
information.
Thesearedocumentedcases.
5.  Domain names:hostnamestiedtoIPresourcessuchasWebsites(adaptedfromICANN/ 
Wikipedia).
6.  Anti-spam blacklists:asystemdesignedtoblockspammessagesthroughasystemofIPaddress 
filtering.Oftenfunctionsintandemwithacontent-recognitionsystem.
ptg7481383
27InsiderITSabotage
Bytheirverynature,theseattacksrequiretechnicalsophisticationand 
privilegedaccess,soitisnotsurprisingthattheyareusuallycarriedoutby 
systemadministrators,databaseadministrators,andprogrammers.What 
issurprising,however,isthatthemajorityoftheattacksoccurafterthe 
insiderhasbeenterminatedorquittheorganization.
One-fourthofthecaseswerecontractors,andalmostallworkedfulltime. 
Agesrangedfrom17to65,andonlysevenITsaboteursintheCERTdata-
basearefemale.However,accordingtotheU.S.BureauofLaborStatistics, 
mostpeopleinsuchtechnicalpositionsaremen.In2010,
16.5%ofallnetworkandcomputersystemadministratorswerewomen.
36.4%ofalldatabaseadministratorswerewomen.
22%ofallcomputerprogrammerswerewomen.
20.9%ofallcomputersoftwareengineerswerewomen.7
Therefore,wearenotsuggestingthatmenaremorelikelythanwomento 
committhesetypesofcrimes.Onthecontrary,wesuggestthatratherthan 
focusingondemographiccharacteristics,youshouldfocuson
Understandingthepositionsatriskforthesecrimes
Recognizingthebehavioralpatternsandorganizationalfactorsthat 
influenceaninsidertocommitITsabotageattacks
Implementingmitigationstrategiesbasedonthosepatterns
WewillassistinthateffortbydescribingtheCERTProgram’sMERIT8
modelofinsiderITsabotage.TheMERITmodeldescribestheprofileofan 
insiderITsabotageattackbyidentifyingcommonpatternsintheevolu-
tionoftheincidentsovertime.Thesepatternsarestrikinglysimilaracross 
thecasesinourdatabase.Afterdescribingthosepatterns,wewillpresent 
mitigationstrategiesthatyoushouldconsiderbasedonthosepatterns.The 
difficultyinpreventinganITsabotageattackisthatthesearetechnically 
sophisticateduserswhohavetheaccess,ability,andmotivationnotonly 
tocarryouttheattack,butalsotoconcealtheiractivities.Thegoodnewsis 
that,basedonthepatternswehaveidentified,acombinationoftechnical 
andnontechnicalcountermeasurescanenhanceyourchancesofthwarting 
7.  ftp://ftp.bls.gov/pub/special.requests/lf/aat11.txt
8.  RecallasdescribedinChapter1,Overview,thatMERITstandsforManagement and Education of the
Risk of Insider Threat.
此类攻击
要求技术
素养以及
特权访
问,所以
通常是系
统管理
员、数据
库管理员
以及程序
员实施攻
击,而让
人惊讶的
是大多数
攻击都是
在攻击者
离职后实
施。
ptg7481383
Chapter2. InsiderITSabotage
28
theseattacks.Evenbetter:Itisverylikelythatyoualreadyownallofthe 
technologyyouneedinordertoimplementoursuggestions!
General Patterns in Insider IT Sabotage Crimes
TheintentoftheMERITmodelofinsiderITsabotageistodescribethe 
generalprofileofinsiderITsabotagecrimes.TheMERITmodelsdescribe 
the patterns in the crimes as they evolve over time—profiling the life cycle 
ofthecrime,ratherthanprofilingonlytheperpetrator.Ourstudyofinsider 
ITsabotagecasesbroughttolighthowtheproblemofmaliciousinsider 
retributionarisesandescalateswithinanorganization.Thekeyelementsof 
themodelwereobservedinamajorityofcasesintheCERTdatabase.
TheMERITmodelofinsiderITsabotagewasfirstpublishedin2008.Ithas
beenwidelyacceptedbyindustryandgovernmentasbeingrepresentative
ofthesetypesofattacks.Themodelwascreatedusingsystemdynamics
modeling,whichisdescribedintheoriginalreport.Overtheyears,how-
ever,wehavefoundthatahigher-levelviewofthatmodelismoreusefulin
describingthepatternstopractitionerssothatclear,actionableguidancecan
beprovidedformitigatingtheseattacks.Thathigher-levelformofthemodel
andaccompanyingcountermeasureguidanceispresentedistheremainder
ofthischapter.Wehavebrokenthemodelintosmallpiecesinthischapterin
ordertomakeitmoreunderstandable.ThefullmodelisshowninFigure2-1.
Figure2-2showsthesystemdynamicsmodelwithmitigatingfactorsnoted.
Personal Predispositions
Personalpredispositionshelpexplainwhysomeinsiderscarryout 
maliciousacts,whilecoworkerswhoareexposedtothesameevents 
andconditionsdonotactmaliciously.Personalpredispositionscanbe 
recognizedbycertaintypesofobservablecharacteristics[Band2006]. 
NOTE
Most insiders had personal predispositions that contributed to their risk of
committing IT sabotage.
Personal predisposition: a characteristic historically linked to a
propensity to exhibit malicious insider behavior.
个人倾向
个人倾向帮助我们解释为什么其他人遇到同样的情况没有恶意攻击的企图?
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 29
Figure 2-1 MERITmodelofinsiderITsabotage
Actual Risk of
Insider Attack Technical
Precursor Acquiring
Unknown
Paths
Behavioral
Precursor Ability to
Conceal
Activity
Unknown
Access Paths
Disgruntlement Discovery of
Precursors Technical
Monitoring
Sanctions
Insider’s Unmet
Expectation
Behavioral
Monitoring Perceived Risk
of Insider Attack
Organization’s
Trust of Insider
Insider’s
Expectation
Expectation
Fulfillment
Precipitating
Event
Personal
Predisposition
Figure 2-2 InsiderITsabotagemitigatingmeasures
Actual Risk of
Insider Attack Technical
Precursor Acquiring
Unknown
Paths
Forgetting
Paths
Discovering
Paths
Disabling
Paths
Behavioral
Precursor Ability to
Conceal
Activity
Unknown
Access Paths
Known
Access Paths
Disgruntlement Discovery of
Precursors Technical
Monitoring
Sanctions
Positive
Intervention
Insider’s Unmet
Expectation
Behavioral
Monitoring Perceived Risk
of Insider Attack
Organization’s
Trust of Insider
Expectation
Setting
Tracking
Insider’s
Expectation
Expectation
Fulfillment
Precipitating
Event
Personal
Predisposition
Insider Demotion
or Termination
制裁、处罚
起沉淀作用的事件
ptg7481383
Chapter2. InsiderITSabotage
30
Examplepersonalpredispositionsfoundintheinsidercasesthatmaybe 
observablewithintheworkplaceincludethefollowing:
Conflictswithfellowworkers
Bullyingandintimidationoffellowworkers
Refusaltoconfrontsupervisorswithlegitimatework-related 
complaintsduetoshynesswhilecomplainingtocompetitors
Seriouspersonalityconflicts
Unprofessionalbehavior
Inabilitytoconformtorules;forexample,ahistoryof
Arrests
Hacking
Securityviolations
Harassmentorconflictsresultinginofficialsanctionsorcomplaints
Misuseoftravel,time,and/orexpenses
Difficultiescontrollingangerwithburstsofinappropriatetemper
Predispositionsdifferfromonepersontothenext,andinfluencetherate 
thatexpectationsriseandfall.Personalpredispositionsmayexplainwhy 
oneemployeeendsupattackinganorganizationwhilecoworkersdonot. 
Understandingthisdistinctionisthefirstimportantstepinrecognizing
heightenedinsiderthreatriskinanorganization.
AlloftheinsidersintheCERTdatabasewhocommittedITsabotage 
exhibitedpersonalpredispositions.
WhatCanYou Do?
Yourapproachtoreducingtheinsiderthreatshouldstartinthehiringpro-
cessbyperformingbackgroundchecksandevaluatingindividualsbased 
ontheinformationreceived.Backgroundchecksshouldinvestigatepre-
viouscriminalconvictionsandincludediscussionswithprioremployers 
regardingtheindividual’scompetenceandapproachtodealingwithwork-
placeissues.Thistypeofinvestigationcanyieldvaluableinformationthat 
couldsuggestthattheprospectiveemployeehaspersonal  predispositions, 
whichcouldincreaseriskforinsiderthreatinthefuture.
ThirtypercentoftheinsiderswhocommittedITsabotageinthe
CERT  Program’soriginalstudywiththeSecretServicehadaprevi-
ousarresthistory,includingarrestsforviolentoffenses(18%),alcohol-or
恃强凌弱恐吓同事
因害羞无法面对监管者投诉工作
相关问题,而是向竞争者抱怨;
严重的人格冲突
非职业的行为
与规则不一致,如具有以下历
史:
1. 拘留
2. 黑客行为;
3. 安全违背;
导致行政处罚或抱怨的骚扰行为
或冲突行为;
旅行、时间以及费用的误用
无法有效控制自身情绪,避免不
当愤怒
以下是工作区域中个人倾向的表现:
针对个人倾向问题的一个建议是:
在招聘过程中对候选者进行背景调查和个体评价,包括候选者
的犯罪记录,同期前雇主交流获取其称职能力与处理工作中人
际关系问题的能力信息。
背景调查应针对未来的员工、合同方以及子合同方;
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 31
drug-relatedoffenses(11%),andnonfinancial/fraud-relatedtheftoffenses
(11%)[Keeney2005].(Notethatsomeoftheinsidershadbeenarrested
for  multipleoffenses.)Therelativelyhighfrequencyofpreviouscriminal
arrestsunderscorestheneedforbackgroundchecks.Theseproactivemea-
suresshouldnotbepunitiveinnature;rather,youshouldindoctrinatethe
employeeintotheorganizationwithappropriatecare.Inaddition,this
informationshouldbeusedaspartofarisk-baseddecisionprocessindeter-
miningwhetheritisappropriatetogivethenewemployeeprivilegedaccess
tocritical,  confidential,orproprietaryinformationorsystems.
Youshouldrequirebackgroundchecksforallpotentialemployees,  including
contractorsandsubcontractors.InonecaseintheCERTdatabase,anorgani-
zationemployedacontractortoperformsystemadministrationduties.The
hiringorganizationwastoldbythecontractor’scompanythatabackground
checkhadbeenperformedonhim.Thecontractorlatercompromisedthe
organization’ssystems;duringtheinvestigationitwasdiscoveredthatthe
contractorhadacriminalhistoryofillegallyaccessingprotectedcomputers.
Disgruntlement and Unmet Expectations
DisgruntlementisarecurringfactorintheCERTinsiderITsabotagecases, 
predominatelyduetosomeunmetexpectationbytheinsider.Forexample:
Theinsiderexpectedcertaintechnicalfreedomsinhis9useofthe
organization’scomputerandnetworksystems,suchasstoring
TIP
To r ed uc e the insi de r thr ea t, begi n in the hir in g pr oc es s by pe rfor min g
background checks and evaluating individuals based on the information
received.
9.  MostoftheinsiderswhocommittedITsabotageweremale.Therefore,malegenderisusedto 
describethegenericinsiderinthischapter.
NOTE
Most insiders who committed IT sabotage were disgruntled due to unmet
expectations.
Unmet expectation: an unsatisfied assumption by an individual that an
organization action or event will (or will not) happen, or a condition will
(or will not) exist.
不满情绪与为满足的期望
ptg7481383
Chapter2. InsiderITSabotage
32
personalfiles,butwasreprimandedbymanagementforexercising
those  freedoms.
Theinsiderexpectedtoworkforthehiringsupervisororworkona 
certainproject,butovertimeanewsupervisorwashiredorhewas 
movedtoadifferentproject.
Theinsiderexpectedacertainfinancialrewardforhiswork,but 
bonusesorraiseswerelowerthanexpectedduetotheorganization’s 
financialstatus.
Figure2-3depictstheinsider’spersonalpredispositionleadingtoheight-
enedexpectations;thenaprecipitatingeventresultsinunmetexpectations 
thatleadtoinsiderdisgruntlement.
Overtime,employeesandcontractorscometoexpectcertainthingsin 
theworkplacebasedonpasthistory.InITsabotagecases,aprecipitating 
eventleadstounmetexpectations,triggeringdisgruntlementininsiders. 
Aprecipitatingeventisanythingthatremovesorrestrictsthefreedomor 
recognitiontowhichtheemployeeorcontractorhasbecomeaccustomed. 
Forinstance,anewsupervisorwhosuddenlyenforcestheorganiza-
tion’sacceptable-usepolicymaycauseextremedisgruntlementincertain 
employees. Other precipitating events include the insider being passed up 
forapromotion,aswellassanctionsbymanagement,transfer,demotion, 
orterminationoftheinsider.
Figure 2-3 Expectationescalation
Disgruntlement
Insider’s Unmet
Expectation
Expectation
Fulfillment
Personal
Predisposition
Precipitating
Event
Insider’s
Expectation (R1)
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 33
Notethatsomeprecipitatingevents,suchasraisesthatarelowerthan 
expected,lackofbonuses,anddownsizing,simplycannotbeavoided, 
especiallyintimesofeconomicdownturn.Itisveryimportantthat 
organizationsappreciatetheinfluencesuchfactorscanplayininsiderIT 
sabotageattacksbyplanningcarefullyandincreasingvigilanceassuch 
stepsareexecuted.InoneCERTcase,asystemadministratorplanteda 
logicbombdesignedtowipeoutdataon70companyserversafterfinding 
outaboutplannedlayoffsduetothecompany’sreorganization.Evenafter 
survivingthedownsizing,theinsiderrefinedthelogicbombandsetitto 
gooffmorethanayearlater.Fortunately,otherITpersonneldiscovered 
thelogicbombwhileinvestigatingasystemproblemandneutralizedthe 
destructivecode.
UnmetexpectationsfromtheCERTcasesinclude
Salary/bonus
Promotion
Freedomofonlineactions
Workethic
Projectrequirements(deadlines,milestones)
Overestimatedabilities
Accesstoinformationfollowingtermination
Useofcompanyresources
Jobdissatisfaction
Supervisordemands
Coworkerrelations
Responsibilities
PrecipitatingeventsintheCERTcasesinclude
Beingpassedoverforpromotion
Demotionduetoprojectcompletion
Transferbetweendepartments
Supervisorissues:
Newsupervisorhired
Disagreementwithsupervisor
Accesschanged
工作道德
常见的为满足的期望(可以认为
是动机或导火索)
起沉淀作用的事件如下:
1. 被忽视升职;
2. 项目完成后降职;
3. 部门间调换职位;
4. 雇佣新监管者以及域监管者
意见不同;
5. 访问改变;
ptg7481383
Chapter2. InsiderITSabotage
34
Financial:
Disagreementoversalaryandcompensation
Bonuseslowerthanexpected
Terminationofsubcontractorcontract
Terminationofpartnershipbecauseoffinancialissues
Coworkersoverridingdecisions
Outsourcingofproject
WhatCanYou Do?
Responsibilitiesandconstraintsofyouremployeesandconsequencesfor 
violationsneedtobeclearlycommunicatedandconsistentlyenforced. 
Policiesorcontrolsthataremisunderstood,notcommunicated,orincon-
sistentlyenforcedcanbreedresentmentamongemployees,leadtounmet 
expectations,andpotentiallyresultinharmfulinsideractions.Aconsistent, 
clearmessageonyourorganization’spoliciesandcontrolswillhelpreduce
thechancethatemployeeswilllashoutforaperceivedinjustice.
Asindividualsjoinyourorganization,theyshouldreceiveacopyof 
organizationalpoliciesthatclearlylaysoutwhatisexpectedofthem, 
togetherwiththeconsequencesofviolations.Evidencethateachindividual 
hasreadandagreedtotheorganization’spoliciesshouldbemaintained.
Consistentenforcementofpoliciesisessentialtomaintainaharmonious 
workenvironment.Whenemployeesseeinconsistentenforcementofpol-
icies,itquicklyleadstoanimositywithintheworkplace.Inmanyofthe 
casesanalyzed,inconsistentenforcementorperceivedinjusticeswithin 
organizationsledtoinsiderdisgruntlement.Coworkersoftenfeltthat“star 
performers”wereabovetherulesandreceivedspecialtreatment.Many 
timesthatdisgruntlementledtheinsiderstocommitITsabotage.
Inonecase,employeeshadbecomeaccustomedtolaxpolicyenforcement
overalongperiodoftime.Newmanagementdictatedimmediatestrictpolicy
enforcement,whichcausedoneemployeetobecomeembitteredandstrike
outagainsttheorganization.Inotherwords,policiesshouldbeenforced
consistentlyacrossallemployees,aswellasconsistentlyenforcedovertime.
TIP
Clearly communicate and consistently enforce responsibilities and
constraints of your employees and consequences for violations.
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 35
Ofcourse,organizationsarenotstaticentities;changeinyourpoliciesand 
controlsisinevitable.Employeeconstraints,privileges,and  responsibilities
changeaswell.Youneedtorecognizetimesofchangeasparticularly 
stressfultimesforemployees,appreciatetheincreasedriskthatcomes 
alongwiththesestresspoints,andmitigateitwithclearcommunication 
regardingwhatemployeescanexpectinthefuture.
Itisimportantthatyouanticipateandmanagenegativeworkplaceissues, 
beginningwithpreemployment,continuingthroughemployment,and 
especiallyattermination.Whenemployeeshaveissuestheyneedanave-
nuewithinyourorganizationtoseekassistance.Employeesneedtobeable 
toopenlydiscusswork-relatedissueswithamemberofmanagementor 
humanresourceswithoutthefearofreprisalornegativeconsequences. 
Managersneedtoaddresstheseissueswhendiscoveredorreported,before 
theyescalateoutofcontrol.
Whenemployeeissuesarisebecauseofoutsideissues,including  financial 
andpersonalstressors,itcanbehelpfultouseaservicesuchasanemployee 
assistanceprogram.Theseprogramsofferconfidentialcounselingtoassist 
employees,allowingthemtorestoretheirworkperformance,health,or 
generalwell-being.
Finally,contentiousemployeeterminationsmustbehandledwithutmost 
care,asmostinsiderITsabotageattacksoccurfollowingtermination.
Behavioral Precursors
Often,thefirstsignofdisgruntlementistheonsetofconcerningbehav-
iorsintheworkplace.SomeexamplesofconcerningbehaviorsintheCERT 
caseswere
Conflictswithcoworkersorsupervisors
Asuddenpatternofmissingwork,arrivinglate,orleavingearly
Asuddendeclineinjobperformance
Druguse
NOTE
Behavioral precursors were observable in insider IT sabotage cases.
Behavioral precursor: an individual action, event, or condition that
involves personal or interpersonal behaviors and that precedes and is
associated with malicious insider activity.
第一次不满的表现会在工作中出
现,如:
ptg7481383
Chapter2. InsiderITSabotage
36
Aggressiveorviolentbehavior
Moodswings
Bizarrebehavior
Sexualharassment
Poorhygiene
Unfortunately,inmanyoftheincidentsintheCERTdatabase,the 
concerningbehaviorswerenotrecognizedbymanagementpriortothe 
incidents,ortheorganizationfailedtotakeactiontoaddressthebehaviors.
NotethattheprecipitatingeventsintheCERTcasesmostlikelyaffected 
manyemployees,notonlythemaliciousinsider.Therefore,itislikelythat 
manyemployeesweresimilarlydisgruntled,andalsoexhibitedconcerning 
behaviorssimilartotheinsider.Therefore,atthispointinthemodel,itis 
mostlikelydifficulttodistinguishbetweeninsiderswhomighteventually 
attack,andthoseemployeeswhoaresimplydisgruntled.Itisimportant 
thatyoudonotrelyononlyoneportionofthemodeltoidentifyaperson 
whomaybeatriskofcommittingITsabotage,butinsteadrecognizethe 
escalatingriskasanemployeeorcontractorprogressesalongthepathin 
themodel.
WhatCanYou Do?
Youshouldinvesttimeandresourcesintrainingsupervisorsto  recognize
andrespondtoinappropriateorconcerningbehaviorinemployees.In 
someoftheCERTcases,lessseriousbutinappropriatebehaviorwas 
noticedintheworkplacebutnotactedonbecauseitdidnotrisetothelevel 
ofapolicyviolation.However,failuretodefineorenforcesecuritypolicies 
insomecasesemboldenedtheemployeestocommitrepeatedviolations 
thatescalatedinseverity,withincreasingriskofsignificantharmtothe 
organization.Itisimportantthatyouconsistentlyinvestigateandrespond
toallruleviolationscommittedbyemployees.
Policiesandproceduresshouldexistforemployeestoreport  concerning 
ordisruptivebehaviorbycoworkers.Whilefrivolousreportsneedto 
TIP
Train supe rv is or s to rec og ni ze a nd res po nd to ina pp ro pr iate or
concerning behaviors.
卫生糟糕
怪异行为
投入时间和资源训练监管者识别
出这些不满的信号,并且懂得如
何处理;
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 37
bescreened,allreportsshouldbeinvestigated.Ifanemployee  exhibits 
suspiciousbehavior,youshouldrespondwithduecare.Disruptive 
employeesshouldnotbeallowedtomigratefromonepositiontoanother 
withintheorganization,evadingdocumentationofdisruptiveorconcern-
ing  activity.Threats,boastingaboutmaliciousactsorcapabilities(“You 
wouldn’tbelievehoweasilyIcouldtrashthisnet!”),andothernegative 
sentimentsshouldalsobetreatedasconcerningbehavior.Manyemploy-
eeswillhaveconcernsandgrievancesfromtimetotime,andaformaland 
accountableprocessforaddressingthosegrievancesmaysatisfythosewho 
might  otherwiseresorttomaliciousactivity.Specifically,anyemployeeor 
contractorwithprivilegedaccesswhoisexperiencingdifficultiesinthe 
workplaceshouldbeaidedintheresolutionofthosedifficulties.
Onceconcerningbehaviorisidentified,severalstepsmightassistyou 
inmanagingrisksofmaliciousactivity.First,theemployee’sprivileged 
accesstocriticalinformation,systems,andnetworksshouldbeevaluated. 
Logsshouldbereviewedtocarefullyexaminerecentonlineactivitybythe 
employee.Whilethisisdone,theorganizationshouldprovideoptionsto 
theindividualforcopingwiththebehavior,perhapsincludingaccesstoa 
confidentialemployeeassistanceprogram.
Stressful Events
TheITsaboteursintheCERTcasesexperiencedoneormorestressfulevents,
includingsanctionsandothernegativework-relatedevents,priortotheir
attack.ThemajorityofinsiderswhocommittedITsabotageattackedafterter-
minationorduringsuspensionfromduties.Stressfuleventsobservedincases
includepoorperformanceevaluations,reprimandsforunacceptablebehavior,
suspensionsforexcessiveabsenteeism,demotionsduetopoorperformance,
restrictedresponsibilities,disagreementsaboutsalaryorbonuses,lackofsev-
erancepackages,beingpassedoverforapromotion,andnewsupervisors.
AsshowninFigure2-4(a),theinsider’sdisgruntlementisexhibited
throughbehavioralprecursors(concerningbehaviors),whichcanbe
NOTE
In most cases stressful events, including organizational sanctions,
contributed to the likelihood of insider IT sabotage.
Stressful events: events that cause concerning behaviors in individuals
predisposed to malicious acts.
ptg7481383
Chapter2. InsiderITSabotage
38
discoveredprovidedtheorganizationhassufficientbehavioral  monitoring
inplace.InsomecasesintheCERTdatabase,managementdidnoteven
noticetheinsider’sescalatingdisgruntlement,whichgavethemlittle
chanceofmitigatingtheescalatingthreat.Inmostcases,however,the
organization’sresponsetoinappropriatebehaviorswaspunitiveinthe
formofsanctions.Sanctionsweretechnical,suchasrestrictingsystem
privilegesortherighttoaccesstheorganization’ssystemsfromhome,or
nontechnical,suchasdemotionorformalreprimand.
ExamplesofsanctionsintheCERTcasesare
Demotions
Reprimands
Suspensions
Responsibilitiesremovedfromprojects
SuspensionofInternetaccess
Theintendedeffectofsanctions,asshownontherightinFigure2-4,isto 
preventadditionalbehavioralprecursors.Inmost“normal”people,sanc-
tionsmostlikelyhavetheintendedeffect.Inthemaliciousinsidersinour 
database,however,sanctionsoftenhadunintendedconsequences,suchas 
furtherincreasingtheinsider’sdisgruntlement.Whethersanctionscurb 
behavioralprecursoractivityorspurtheinsidertogreaterdisgruntlement 
anddisruptiondependslargelyonthepersonalpredispositionsoftheper-
son.Thisisakeyaspectofthemodelinwhichwebegintomoreeasily 
Figure 2-4 Typicalescalationofdisgruntlement(a)andintendedeffect 
ofsanctions(b)
(a) (b)
Behavioral
Precursor
Disgruntlement Discovery of
Precursors
Sanctions
Behavioral
Monitoring
Behavioral
Precursor
Discovery of
Precursors
Sanctions
Behavioral
Monitoring
一般来说惩罚包括:
1. 降职;
2. 训斥;
3. 停职;
4. 项目职责分离;
5. 网络访问权停用;
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 39
distinguishbetweeninsiderswhomightretaliateandthosewhomostlikely 
willnot.Webelievethatinmostnonmaliciousemployeesand  contractors, 
impositionofsanctionswillserveasa“wake-upcall,”andtheyeither 
acceptthecircumstancesorseekanewjob,ratherthan  planninganattack.
WhatCanYou Do?
Itisimportantthatmanagersandhumanresourcesstaffmembers 
understandandconsiderthepotentialforinsiderITsabotagewhenthere 
areongoing,observablebehavioralprecursorsthatcontinueorevenesca-
latefollowingemployeesanctions.Intheremainderofthischapterwewill 
discusstechnicalmonitoringthatshouldbeconsideredoncethisescalating 
patternofdisgruntlementbytechnicallyprivilegedusersisrecognized.
Itisalsoimportanttopointoutthatsanctionscanbequiteimportantwhen 
theyinvolvecontractorsratherthanemployees.Thefollowingexam-
pleillustratesimportantphysicalsecurityandlegal/contractingissues 
regardingcontractors.
Anenergymanagementfacilitysubcontractedwithacompanyfor  system 
administratorsupport.Onesuchsystemadministrator,whoworked 
physicallyon-siteattheenergymanagementfacility,wassuspendedby 
hisemployerlateonFridayafternoonduetoanemployeedispute.His 
employerdecidedtowaitandinformtheenergymanagementfacility 
ofthesuspensiononMondaymorning.LateSundaynightheusedhis 
authorizedphysicalaccesstotheenergyproductionfacility,usedaham-
mertobreaktheglasscaseenclosingtheemergencypoweroffbutton,and 
hitthebutton.Someofthecomputersystemswereshutdownasaresult,
includingcomputersthatregulatedtheexchangeofelectricitybetween 
powergrids.Foraperiodoftwohours,theshutdowndeniedtheorga-
nizationaccesstotheenergytradingmarket,butfortunatelydidn’taffect 
the  transmissiongriddirectly.
Inordertoprotectyourselffromthistypeofrisk,considercontractually 
requiringadvancenotificationofpendingemployeesanctionsbyyour 
subcontractors.
TIP
Managers and human resources staff members must understand and
consider the potential for insider IT sabotage when there are ongoing,
observable behavioral precursors.
ptg7481383
Chapter2. InsiderITSabotage
40
Tec hn ica l Pre curs or s a nd Ac ce ss P ath s
MostoftheinsidersintheCERTinsiderITsabotagecaseswereclearly 
headedtowardterminationthroughanescalatingseriesofconcerning 
behaviorsandassociatedsanctions.Inlightofthissomewhatpredictable 
outcome,manyofthemcreatedaccesspathsunknowntotheorganization 
toenablethemtosetupandcarryouttheirattack,evenafter  termination. 
Forexample,insiderscreatedbackdooraccounts,installedandran 
password crackers,10installedremote network administration tools11
ormodemstoaccesstheorganization’ssystems,andtookadvantageof 
ineffectivesecuritycontrolsinterminationprocesses.
Thesetechnicalprecursorscouldserveasanindicatorofapendingattack 
ifyoudetectthem.RecallthatmostITsabotageattacksactuallyoccurfol-
lowingtheinsider’svoluntaryorinvoluntarytermination.Therefore, 
itisimportantthatyourecognizethepatternsintheMERITmodel,and 
beespeciallyvigilantfortechnicalprecursorspriortoterminationofa 
disgruntledsystemadministratororothertechnical,privilegeduser.
Figure2-5depictstheprogressionfrominsiderdisgruntlementto  technical 
precursorsthatmayindicateapendingattack.Someoftheseactions 
NOTE
In many cases organizations failed to detect technical precursors.
Technical precursor: an individual action, event, or condition that
involves computer or electronic media and that precedes and is
associated with malicious insider activity.
NOTE
Insiders created or used access paths unknown to the organization to
set up their attack and conceal their identity or actions. The majority of
insiders attacked after termination.
Access path: a sequence of one or more access points that lead to a
critical system.
10.  Password cracker:aprogramusedtoidentifypasswordstoacomputerornetworkresource;used 
toobtainpasswordsforotheremployeeaccounts.
11.Remote network administration tools:toolstoallowtheadministrationofacomputerfroma 
locationotherthanthecomputerbeingadministered.
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 41
alsocontributetothedamagepotentialoftheattack.Examplesinclude 
sabotageofbackupsanddecreasesintheredundancyofcriticalservices 
orsoftware.Insidersoftenacquireaccesspathsunknowntotheorganiza-
tion—“unknownaccesspaths.”Thisincreasestheirabilitytoconcealtheir 
activity,makingitmoredifficultforyoutodiscovertheprecursors.Tomake 
mattersworse,thisabilitytohidetheiractionsmayactuallyemboldenthe 
risk-averseinsiderstocontinue,orevenincrease,theireffortstoattack.
Examplesofmethodsusedbyinsiderstocreateunknownaccesspathsto 
setuptheirattackinclude
Creatingbackdoorsbeforeterminationorafterbeingnotifiedof 
termination
Installingamodemforaccessfollowingtermination
Disablinganti-virusprogramsondesktopsandtestingavirus
Network probing(anynumberofpracticesinwhichaparticular 
networkiseitherpassivelysurveilledoractivelyscanned)
Installingaremotenetworkadministrationtool
Downloadingandinstallingmaliciouscodeandtools(e.g.,arootkit,12
passwordcracker,orvirus)
Plantingalogicbombwhilestillemployed—herethelogicbombis 
performingonbehalfoftheinsiderandthusisavirtualaccesspathto 
disruptsystems
Figure 2-5 Technicalprecursorsduetodisgruntlement
Acquiring
Unknown
Paths
Actual Risk of
Insider Attack
Behavioral
Precursor
Ability to
Conceal
Activity
Unknown
Access Paths
Discovery of
Precursors
Disgruntlement
Technical
Monitoring
Technical
Precursor
12.  Rootkit:softwarethatenablescontinuedprivilegedaccesstoacomputerwhileactively  hiding 
itspresencefromadministratorsbysubvertingstandardoperatingsystemfunctionalityorother 
applications.
ptg7481383
Chapter2. InsiderITSabotage
42
Wehavehadtheopportunitytointerviewseveralconvictedinsiders.One 
describedthesituationasa“downwardspiral”wherehecould“seethe 
endcoming.”Inotherwords,theseemployeesare“ontheHRradar”and 
realizethattermination,voluntaryorinvoluntary,isinevitable.
Theextenttowhichinsidersrelyonunknownaccesspathstosetupand 
executetheirattackdependsontheirrisktolerance.Insiderswhodonot 
carewhethertheyarecaught,orinsidersactingimpulsively(oftenoutof 
thepassionofthemoment),mayusebothknownandunknownpathsin 
theirattack.Insiderswhoareparticularlyrisk-aversemayonlyattackusing 
accesspathsthatareunknowntotheorganization.Ofcourse,aninsider 
maynotknowwhethertheorganizationisawareofaparticularaccess 
path.Nevertheless,ineithercase,insiderswhocommitITsabotagegener-
atetechnicalprecursorsthat,ifobserved,mayindicatesuspiciousactivity. 
Justaswithbehavioralprecursors,thedetectionoftechnicalprecursors 
dependsonhavingasufficientleveloftechnicalmonitoringinplace.
Inadditiontocreatingunknownaccesspaths,thefollowingtechnical 
precursorsinthecasesintheCERTdatabaseenabledtheinsiderstocarry 
outtheirattacksorconcealtheiractivityoridentity:
Changingallpasswordsrightbeforeresignation
Disablingsystemlogs
Removinghistoryfiles
Failingtocreatebackupsasrequired
Failingtodocumentsystemsorsoftwareasrequired
Unauthorizedaccessingofcustomers’systems
Unauthorizeduseofcoworkers’machinesleftloggedin
Sharingpasswordswithothersanddemandingpasswordsfrom 
subordinates
Refusingtoswipebadgestorecordphysicalaccess
AccessingWebsitesprohibitedbytheorganization’sacceptableuse 
policy
Refusingtoreturnalaptopupontermination
WhatCanYou Do?
Techniquesthatpromotenonrepudiationofactionensurethatonline 
actionstakenbyusers,includingsystemadministratorsandprivileged 
users,canbeattributedtothepersonwhoperformedthem.Therefore,if 
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 43
maliciousinsideractivityoccurs,nonrepudiationtechniquesalloweach 
andeveryactivitytobeattributedtoasingleemployee.Policies,practices, 
andtechnologiesexistforconfiguringsystemsandnetworkstofacilitate 
nonrepudiation.However,keepinmindthatsystemadministratorsand 
otherprivilegeduserswillbetheonesresponsiblefordesigning,creating, 
andimplementingthosepolicies,practices,andtechnologies.Therefore, 
separation of duties13isalsoveryimportant:Network,system,and 
applicationsecuritydesignsshouldbecreated,implemented,andenforced 
bymultipleprivilegedusers.
Inaddition,policies,procedures,andtechnicalcontrolsshouldenforce 
separationofdutiesandrequireactionsbymultipleusersforreleasingall 
modificationstocriticalsystems,networks,applications,anddata.Inother 
words,nosingleusershouldbepermittedorbetechnicallyabletorelease
changestotheproductionenvironmentwithoutonlineactionbyasecond 
user.Thesecontrolswouldpreventaninsiderfromreleasingalogicbomb 
withoutdetectionbyanotheremployee.
Notethatinordertoenforceseparationofdutiesforsystem  administration 
functions,youmustemployatleasttwosystemadministrators.Thereare 
severalcaseexamplesintheCERTdatabaseinwhichtheorganization 
wasvictimizedbyitssolesystemadministrator.Althoughmanysmall 
organizationscannotaffordtohiremorethanonesystemadministrator, 
itisimportantthattheyrecognizetheincreasedriskthataccompaniesthat 
situation.
Finally,themajorityoftheinsiderswhocommittedITsabotagewereformer 
employees.Youmustbeparticularlycarefulindisablingaccess,espe-
ciallyforformersystemadministratorsandtechnicalorprivilegedusers. 
Thoroughlydocumentedproceduresfordisablingaccesscanhelpensure 
thatstrayaccesspointsarenotoverlooked.Inaddition,the  two-person
ruleshouldbeconsideredforthecriticalfunctionsperformedbythese 
13.  Separation of duties:theseparationoftasksamongvariousindividuals.
14.  Nonrepudiation:abilitytoverifyaparticularuserisaccessingasystemorperformingaparticular 
action;thegoalbeingtomakeitmoredifficultforausertohideillicitactivity.
TIP
Nonrepudiation14 techniques must be implemented to attribute all
actions to the person that performed them.
ptg7481383
Chapter2. InsiderITSabotage
44
userstoreducetheriskofextortionaftertheyleavetheorganization.The 
two-personruleisacontrolmechanismthatrequirestheinvolvementof 
twopersonsforaparticularoperation(adaptedfromWikipedia).
Someunknownaccesspathsusedbymaliciousinsidersincluded 
compromisedaccounts.Theyusedpasswordcrackers,obtainedpasswords 
throughsocial engineering,15andusedunattendedcomputersleftlogged 
in.Passwordpoliciesandproceduresshouldensurethatallpasswordsare 
strong,employeesdonotsharetheirpasswordswithanyone,employees 
changetheirpasswordsregularly,andallcomputersautomaticallyexe-
cutepassword-protectedscreensaversafterafixedperiodofinactivity.As 
aresult,allactivityfromanyaccountshouldbeattributabletoitsowner. 
Inaddition,ananonymousreportingmechanismshouldbeavailableand 
itsuseencouragedforemployeestoreportallattemptsatunauthorized 
accountaccess.
Someinsiderscreatedbackdooraccountsthatprovidedthemwithsystem 
administratororprivilegedaccessfollowingtermination.Otherinsiders 
foundthatsharedaccountswereoverlookedintheterminationprocess 
andwerestillavailabletothem.Systemadministratoraccountswere 
commonlyused.Othersharedaccountsincludeddatabaseadministrator 
(DBA)accounts.Someinsidersusedothertypesofshared accounts,16such 
asthosesetupforaccessbyexternalpartnerslikecontractorsandvendors. 
Oneinsideralsousedtrainingaccountsthatwererepeatedlyreusedover 
timewithouteverchangingthepassword.
Periodicaccountauditscombinedwithtechnicalcontrolsenableidenti-
ficationofthefollowing:
Backdooraccountsthatcouldbeusedlaterformaliciousactionsbyan 
insider,whetherthoseaccountswerespecificallysetupbytheinsider 
orwereleftoverfromapreviousemployee
Sharedaccountswhosepasswordwasknownbytheinsiderandnot 
changedaftertermination
Accountscreatedforaccessbyexternalpartnerssuchascontractors 
andvendorswhosepasswordswereknownbymultipleemployees, 
andwerenotchangedwhenoneofthoseemployeeswasterminated
15.  Social engineering:anontechnicalformofintrusionthatreliesheavilyonhumaninteractionand 
ofteninvolvestrickingotherpeopletobreaknormalsecurityprocedures(Whatis.com).
16.  Shared account:anaccountusedbytwoormorepeople.
ptg7481383
GeneralPatternsinInsiderITSabotageCrimes 45
Theneedforeveryaccountshouldbereevaluatedperiodically.Limiting 
accountstothosethatareabsolutelynecessary,withstrictproceduresand 
technicalcontrolsthatenableauditorsorinvestigatorstotraceallonline 
activityonthoseaccountstoanindividualuser,diminishesaninsider’s 
abilitytoconductmaliciousactivitywithoutbeingidentified.Account 
managementpoliciesthatincludestrictdocumentationofallaccessprivi-
legesforallusersenableastraightforwardterminationprocedurethat 
reducestheriskofattackbyterminatedemployees.
Itisimportantthatyourpasswordandaccountmanagementpoliciesare 
alsoappliedtoallcontractors,subcontractors,andvendorsthathaveaccess 
toyourinformationsystemsornetworks.Thesepoliciesshouldbewritten 
intocontractingagreements,requiringthesamelevelofaccountabilityin 
trackingwhohasaccesstoyoursystems.Contractors,subcontractors,and 
vendorsshouldnotbegrantedsharedaccountsforaccesstoyourinforma-
tionsystems.Theyshouldnotbepermittedtosharepasswords,andwhen 
employeesareterminatedattheexternalorganization,yourorganization 
shouldbenotifiedinadvancesothataccountpasswordscanbechanged. 
Finally,besuretoincludecontractor,subcontractor,andvendoraccounts 
intheregularlyscheduledpassword-changeprocess.
The Trust Trap
Inadditiontoinsiderpredispositionsandbehaviors,organizationalpredis-
positionsandbehaviors—suchasexcessivetrustofemployees,areluctance
to“blowthewhistle”oncoworkers,orinconsistentenforcementoforgani-
zationpolicies—canalsoinfluenceanorganization’sexposuretomalicious 
insideracts.Figure2-6depictsatrapinwhichorganizationssometimes 
findthemselves.WecallthistheTrustTrapandhavedescribeditsrolein 
previousmodels[Andersen2004,Cappelli2006,Band2006].
TounderstandtheTrustTrap,weneedtodistinguishbetweentheactualand
perceivedriskofaninsiderattack.Asshowninthetopportionof  Figure2-6,
actualriskdependsonthebehavioralandtechnicalprecursorsexhibitedby
theinsider.However,yourperceivedriskofinsiderattackisinfluencedbythe
extentthatyoudiscoverandunderstandbehavioralandtechnicalprecursors.
NOTE
The “Trust Trap” contributed to organizations being victimized in IT
sabotage attacks.
ptg7481383
Chapter2. InsiderITSabotage
46
AkeyfactorintheTrustTrapisyourtrustofyouremployees,asshown 
inFigure2-6.Clearly,therearegoodreasonswhyyouwanttocreatea 
workplaceinwhichindividualscantrustoneanotherandthereisagood 
trustrelationshipbetweentheorganizationanditsemployees(e.g.,to 
increasemoraleandproductivity).However,managerswhostriveto 
promotetrustingworkplacerelationshipssometimesshortcutessential 
behavioralandtechnicalmonitoringprocedures,orallowthemtoerode 
overtimeduetocompetingpressuresandpriorities.Lowerlevelsof 
monitoringleadtoundiscoveredprecursors,resultinginanoveralllower 
perceivedriskofattack.Thisfalsesenseofsecurityreinforcesmanag-
ers’trustintheindividualsworkingforthem.Thecyclecontinues,with 
yourmonitoringabilitysteadilydeterioratinguntilamajorcompromise 
becomesobvioustoallinvolved.Itisessentialthatyoutrustyouremploy-
ees,butyoumustbalancetrustwithverification,byapplyingconsistent 
levelsofbehavioralandtechnicalmonitoring.
Mitigation Strategies
TheintentoftheMERITmodelsistocommunicatethepatternsofeach 
specifictypeofinsiderthreatovertimebasedonourin-depthanalysis 
ofempiricalcasedata.Webelievethemodelsalsosuggestkeymitiga-
tionstrategiesforyoutodefendyourselfagainstsomeonefromwithin. 
Figure 2-6 Tr ustTrap
Technical
Precursor
Behavioral
Monitoring Perceived Risk
of Insider Attack
Organization’s
Trust of Insider
Technical
Monitoring
Behavioral
Precursor
Discovery of
Precursors
Actual Risk of
Insider Attack
ptg7481383
MitigationStrategies 47
Wethereforeproposecountermeasuresbasedonexpertopinionsin 
behavioral  psychologyandinformationsecurity.
Itiscriticalthatalllevelsofmanagementrecognizeandacknowledgethe 
threatposedbyinsidersandtakeappropriatestepstomitigatemalicious 
attacks.Whileitmaynotberealistictoexpectthateveryattemptatinsider 
ITsabotagewillbestoppedbeforedamageisinflicted,itisrealisticto 
expectthatyoucanbuildresiliencyintoyourinfrastructureandbusiness 
processestoallowyoutodetecttheattacksearlier,therebyminimizingthe 
financialandoperationalimpact.
Theremainderofthischapterdescribespotentialcountermeasuresthatwe 
believecouldbeeffectiveinmitigatinginsiderITsabotage.Figure2-7depicts 
organizationalissuesofconcerninthesabotagecasesinour  database.
Thesuggestionsthatfollowapplytoidentifyingandmitigatingthemost 
prevalentareasofconcernfromthegraph,aswellassomeoftheother 
issuesthatwererelevantinanumberofcases.
Early Mitigation through Setting of Expectations
First,youshouldrecognizethepersonalpredispositionsofemployeesand 
understandtheimpacttheycanhaveoninsiderthreatrisk.Second,you 
shouldactivelymanagetheexpectationsofemployeestominimizeunmet 
expectations.Thiscanbeachievedthroughcommunicationbetween 
managersandemployees,especiallyintheformofregularemployee 
reviews,takingactiontoaddressemployeedissatisfactionwhenpossible. 
Consistentenforcementofpoliciesforallemployeesisalsoimportantso 
thatindividualemployeesdonotcometofeelthattheyareabovetherules
orthattherulesareinconsistentlyenforced.
TIP
All levels of management must recognize and acknowledge the threat
posed by insiders and take appropriate steps to mitigate malicious
attacks.
TIP
Managers should recognize the personal predispositions of employees
and understand the impact they can have on insider threat risk.
管理员工期望,最小化为满足的
期望;
ptg7481383
Chapter2. InsiderITSabotage
48
Whentheexpectationsoftheinsiderareinlinewithyourpracticesand 
policies,unmetexpectationsarenotanissue.However,ifaprecipitating 
eventimpactsexpectationfulfillment,proactiveactionsbymanagementto 
resetexpectationsmaydecreasethelevelofunmetexpectations.Ifyoufail 
toresetexpectations,thelevelofunmetexpectationsmaycontinuetorise, 
increasingdisgruntlementonthepartoftheinsider.
Forexample,youcanattempttolowerthelevelofunmetexpectations 
regardingsystemuseandjobresponsibilitiesbyanumberofproactive 
countermeasures.
Youinstituteanacceptableusepolicy,describingtheemployee’sroles
andresponsibilitieswhenusingtheorganization’sinformationsys-
tems.Thepolicyshouldbegiventoeachemployeeaspartofhisorher 
orientationtotheorganization.Aschangestothepolicyoccur,employ-
eesneedtobemadeawareofthechangesandtheimpacttothem. 
Finally,thepolicymustbeconsistentlyenforcedforallemployeesso 
thatnoemployeesfeelthattheyare“abovetherules.”
Figure 2-7 Issuesofconcern
80
70
60
50
40
30
20
10
0
Change of Employment Status
Disgruntled Employee
Concerning Behavior or Activity
Users with System Administrator Privileges
to Sabotage Systems or Data
Handling of Negative Employment Issues
Verification of Deletion of Critical Files
Ability to Conduct a Denial-of-Service Attack
Violent or Aggressive Behavior
Insufficient Backups
Compromised Passwords
Conditional, Contract, or Temporary
Employment Status
Inserted Malicious Code into Operational System
Concealment of Current Illicit Activity–Technical
Employee Extortion, Threats, or Legal Demands
Ability of Users to Create Unknown Access
Paths into Organization Systems
Failure to Disable Accounts or Connections
upon Employee Termination
ptg7481383
MitigationStrategies 49
Management,inconjunctionwithhumanresources,shouldclearly 
definejobresponsibilitiesforeachemployeeintheorganization. 
Processessuchasperformancereviewsshouldbeusedtocheckandset 
expectationsperiodically.
Handling Disgruntlement through Positive Intervention
Firstofall,managementshouldbetrainedtopayattentiontoemployee 
behaviorsintheworkplace,andtorecognizethefactthatongoingconcern-
ingbehaviorsintheworkplacecouldsignalpotentialproblems.Remember 
thatinsiderswhocommitITsabotagearetypicallyverytechnical,privi-
legedusers.Itisimportantthatmanagersofinformationtechnologyand 
softwareengineeringteamsreceivemanagementtrainingsothattheyare 
trainedtomanagepeople,notjusttechnology.
Asmanagersobserveongoingconcerningbehaviorsexhibitedbyan
employeeorcontractor,theyshouldconsiderutilizingpositiveinter-
ventionstrategiestolowerthedisgruntlementoftheinsider.Whilethe
intentofemployeesanctioningmaybetoreduceundesirablebehav-
iors,itmaybackfireinsomecases,causingdisgruntlementtoincrease
andleadingtomoredisruptivebehaviors.Whenpositiveinterventionis
used,thedisgruntlementmaybereduced,eliminatingadditionalbehav-
ioral  precursors,aswellastheescalationtotechnicalactionstosetupan
attack.
Onepositiveinterventionstrategyisanemployeeassistanceprogram. 
Theseprogramsaresometimesofferedbyorganizationsasanemployee 
benefit,toassistemployeesindealingwithpersonalorwork-relatedissues 
thatmayaffectjobperformance,health,andgeneralwell-being.Employee 
assistanceprogramscanincludecounselingservicesforemployeesand/or 
theirfamilymembers.
Toexploreanotherpositiveinterventionstrategy,let’ssayanemployee
ispassedoverforapromotion.Managementcouldproactivelyantici-
patethattheemployeemaybecomedisgruntled,andattempttocome
upwithsometypeofcompensatingmeasure.Forexample,perhaps
TIP
Managers should be trained to pay attention to employee behaviors in the
workplace.
首先要训练监管者能够注意到员
工的不满表现,其次开始正向干
预,比如设立员工咨询服务,帮
助员工解决工作、健康及家庭中
的问题建议;
ptg7481383
Chapter2. InsiderITSabotage
50
theemployeecouldbegivenincreasedresponsibilityorprofessional
development,inordertobetterpositionhimforthenextopportunityfor
promotion.
Eliminating Unknown Access Paths
Carefultrackingandmonitoringofaccesspathsavailabletoeachemployee 
andcontractoriscriticalsothattheycanbedisabledupontermination. 
RecallthatunknownaccesspathsusedbyinsiderstocarryoutITsabo-
tageattacksincludebackdooraccounts,sharedaccounts,maliciouscode 
plantedbytheinsider,logicbombs,andremoteaccessviaremoteaccess 
systems.Notethatsomeofthoseaccesspaths,suchassharedaccounts, 
arelegitimatepaths,whileothers,suchaslogicbombs,aresolelyfor 
illegitimatepurposes.
Figure2-8reflectstherelationshipbetweenaccesspathsunknowntothe 
organizationandaccesspathsknowntotheorganization.Theseimportant 
relationshipsareexplainedinthefollowingsection.
ForgettingPaths
ManagementortheITstaffmayforgetaboutknownpaths,makingthem 
unknown.Forexample,amanagermightauthorizeasoftwaredevelop-
er’srequestforthesystemadministratorpasswordduringatimeofheavy 
development.Therefore,thesystemadministratorpasswordisanaccess 
pathknowntoyouatthatpointintime.Ifaformallistofemployeeswith 
accesstothatpasswordisnotmaintained,themanagercouldforgetthat 
decisionovertime.Themanagermayalsoresignfromtheorganization, 
leavingnoorganizationalmemoryofthedecisiontosharethesystem 
administratorpassword.Ineithercase,thesoftwaredeveloper’sknowl-
edgeofthesystemadministratorpasswordhasbecomeanaccesspath 
unknowntoyou,andapotentialattackvectorfollowingtermination.
DiscoveringPaths
Youshouldinstituteproactiveauditingpracticestodiscoveraccesspaths 
thatmightotherwisebeforgotten.Accesspathscanbediscoveredby 
TIP
Careful tracking and monitoring of access paths is critical so that they can
be disabled upon termination.
仔细追踪监控每个员工和合同者可以访问的路
径;
具体地:当发现一个问题路径时,可以关闭该路
径;当内部人请求一个新路径时,记录加到路径
库中;
ptg7481383
MitigationStrategies 51
monitoringnetworktrafficorbycomputersystemaccountauditing,for 
example.Monitoringnetworktrafficfacilitatesdiscoveryofsuspiciousnet-
worktrafficforfurtherinvestigation.Accountauditingfacilitatesdiscovery 
ofunauthorizedaccounts.Oncetheseaccesspathsarediscovered,theycan 
beinvestigatedtodetermineiftheyaresimplyforgottenaccesspathsthat 
shouldbetrackedordisabled,oriftheyhavebeencreated  deliberatelyby 
aninsiderforpotentialmaliciousactivity.
AcquiringUnknownPaths
Insiderscanacquirenewaccesspathsunknowntotheorganizationby, 
forexample,creatingabackdooraccountorstealingpasswords.Notethat 
privilegedusersfrequentlyperformactionssuchasinstallingnewsoft-
wareandsystems,andcreatingaccounts.Therefore,itisimportantthat 
clearpoliciesexisttogoverntheseactions,andtechnicalcontrolsareused 
todetectthesepathsandenforcethepoliciessothatyoucandiscovernew 
accesspathsandassesstheirlegitimacy.
DisablingKnownPaths
Finally,youcandisableaccesspathsthatyouknowaboutby,forexample, 
removingbackdooraccountsorchangingsharedpasswords.Itis  important 
Figure 2-8 Accesspathsavailabletotheinsider
Discovering
Paths Forgetting
Paths
Known
Access Paths
Unknown
Access Paths
Acquiring
Unknown
Paths
Disabling
Known
Paths
ptg7481383
Chapter2. InsiderITSabotage
52
thatyoucarefullytrackaccesspaths,auditthemperiodically,anddisable 
thosethatarenolongerneeded.Akeyvulnerabilityexistswhenyoudo 
notknowaboutalloftheaccesspathseachofyouremployeeshastoyour 
criticalsystems.
Accesspathsunknowntotheorganizationprovideamechanismthatcan 
beusedbytheinsidertofacilitateafutureattack,evenfollowingtermina-
tion.Forexample,organizationsoftendidnotknowabout(ordidnotthink 
about)insiders’accesstosharedaccountssuchassystemadministrator 
ordatabaseadministratoraccounts;overlookingsuchaccountsduringan 
insider’sterminationprocessoftenallowedaninsider’sattackfollowing 
termination.Inaddition,unknownaccesspathscanmakeitmoredifficult 
foryoutoattributetheattacktotheinsider.Ifyouareunawareofthepaths 
thatcanbeusedbyaninsiderforattacks,thetaskofprotectingyourselfis 
significantlymorecomplex.
Diligenttrackingandmanagementofaccesspathsintoyoursystems 
andnetworksisacriticalmitigationstrategyforinsiderITsabotage.As 
trackingincreases,thelikelihoodthatyouwillforgetabouttheexistence 
ofspecificaccesspathsandwhohasaccesstothemdecreases.Ifprecur-
sortechnicalactivityisdetected,unknownaccesspathscanbediscovered 
anddisabled,furtherreducingthenumberofunknownaccesspathsavail-
abletotheinsider.Thismakesitmoreandmoredifficultfortheinsiderto 
concealunauthorizedormaliciousonlineactivity.Conversely,iftechnical 
precursorsarenotdiscovered,theinsidercanaccumulateunknownaccess 
paths,makingiteasierforhimtoconcealhisactions.
Inthecasesweexamined,theaccesspathsoftenusedbytheinsiderbut 
unknowntomanagementwereaccountssecretlycreatedbytheinsideror 
sharedbyothercoworkers.Compoundingtheproblem,lackoftrackingled 
tounknownaccesspathsthatwereoverlookedintheterminationprocess 
andlaterusedbytheinsidertoattack.Therefore,weconsiderongoingand 
thoroughaccountmanagementanimportantpracticefortrackingaccess 
pathsandreducingtheoccurrenceofunknownaccesspaths.Account 
managementisacomplextaskthatencompassesverifyingnewaccounts, 
changingaccountauthorizationlevels,trackingaccesstosharedaccounts, 
anddecommissioningoldaccounts.Unfortunately,ittakesasignificant 
amountoftimeandresourcesfororganizationstorecoverfromobsolete 
account-managementpractices.
More Complex Monitoring Strategies
Someaccesspathsrequireamorecomplexdetectionprogram.Forinstance, 
agoodnumberofinsidersplantedlogicbombstoconducttheirattacks. 
ptg7481383
MitigationStrategies 53
Logicbombsareoftenplantedinaplacewheretheyaresuretoexecute, 
suchasoperatingsystemscriptsorstable,productionsystems.Notethat 
thesearefilesthatshouldnotbemodifiedonafrequentbasis,andtherefore, 
triggeringanalertwhensuchfilesaremodifiedisapracticalmonitoring 
strategy.Commercialconfiguration-managementandchange-management 
softwareprovidethetechnicalsolutionsforimplementingthesetriggers. 
Whileconfiguringsuchasystemtakessometimeupfronttodetermine 
whatfilesshouldbechangedinfrequently,ifever,thetimespentwillbe 
wellworthitshouldmaliciouscodebediscoveredwhenplantedbyamali-
ciousinsideror outsider.
Likewise,oneinsiderdisabledtheanti-virussoftwareonhisdesktop, 
tested a virus, and planted it in his company’s production source code. He 
thenproceededtoreleasethenewproductionexecutabledirectlytoallof 
thecustomers’systems.Whentheydouble-clickedonhiscompany’sicon 
thenextmorning,itdestroyedhardwareandsoftware,forcingmanual 
traveltoeachcustomersitetorecoverthesystems.Obviously,itwould 
havebeentothecompany’sbenefittodetecttheplantingofthevirusinthe 
codebeforeitwasreleasedtothecustomers’systems.Thedetectionstrategy 
actuallyisverypractical.Isthereagoodreasonforuserstodisabletheanti-
virustoolontheirdesktops,eveniftheyareprivilegedusers?Notlikelyin 
mostorganizations.Therefore,analertcouldbetriggeredwhenservices 
aredisabledonthehost,andaninvestigationinitiatedbytheinformation 
securityteam.
Similarly,configuration-managementsoftwarecouldtriggeranalertwhen 
unauthorizedsoftwareisinstalled.Thiscontrolwoulddetecttheinsiders 
whoinstalledaremotenetworkadministrationtool,passwordcrackers, 
andothersoftwarethattheyusedafterterminationtoattack.
A Risk-based Approach to Prioritizing Alerts
SomeinsidersintheCERTcaseswereespeciallydeviousandtheiractions 
wouldbeverydifficulttodetect.Oneinsidersabotagedthesourcecode 
foranexceptionhandlingscreenthatwasonlytobeusedinextenuating 
circumstancesbecauseitoverrodeallsecuritycontrolsthatwerebuiltin 
tothesystem.Thescreenwassodangerousthatanytimeitwasusedan 
alertwasimmediatelysenttoSecurityforinvestigation,tomakesurethe 
TIP
Some access paths require a more complex detection program, such as
monitoring for logic bombs or other malicious code.
ptg7481383
Chapter2. InsiderITSabotage
54
usewaslegitimate.Theinsidersimplycommentedouttheonelineofcode 
thatsentthealerttoSecurity,andthenusedthescreentoattacktheorga-
nization.Thatactionwouldbeextremelydifficulttodetect.First,hewas 
authorizedtomodifythesourcecode,sothatactionalonewouldnotlook 
likeanomalousactivity.Second,howmanyorganizationsdocodereviews
ofeverychangemadetothesourcecodeforproductionsystems?Inour 
experience,notmanydo.Fortunately,thereisasolution.
Aswediscussedpreviously,configuration-managementsystemscandetect
changestofiles,includingsourcecode;infact,thisorganizationusedsucha 
systemandthechangewasinthelogs.However,itisnotusuallypracticalto
investigateeverychangetoeverysourcecodefile.Inthiscase,however,that
particularsourcecodewasinacriticalfile,andanychangestoitcouldhave
triggeredanalert.Werecommendthatsystemownerstakethetimetoprior-
itizethemostcriticalsourcecodefilesintheirsystems—theonesthatshould
triggeracodereviewanytimeachangeismade.Thechange-controlsystem
canbesetuptoreportalertsinorderofpriority,whichwouldmakeiteasy
forinformationsecurityteamstoinvestigatesuspiciouschangesquickly.
Inanothercase,asecuritiestraderforabank,whowaspreviouslya 
computerspecialist,insertedmaliciouscodeintoariskmodelprogram 
thathehadcreated.Thiscausedotheremployeestomakeincreasingly 
riskierfinancialdeals.Themaliciouscodewasdiscoveredbyaprogram-
merwhowasmakinglegitimatemodificationstothesourcecode.Asinthe 
previouscase,thefilemodifiedwasarguablyoneofthemostcriticalsource 
codefilesintheirsystem.Prioritizedalertsbyaconfiguration-management 
systemcouldhavealleviatedthisproblembyimmediatelytriggeringan 
investigationofthechange.
Prioritizingassetsisatime-consumingactivity,andonethatmany 
organizationsdonottakethetimetodo.Ratherthantryingtoprioritize 
everything,wesuggestthateachsystemanddataownertackleonlytheir 
areas,andfocusonidentifyingthehighest-priorityfiles.Inthisway,priori-
tizedalertscanbegeneratedforchangestothosefiles—theonesposingthe 
highestdegreeofrisktotheorganization.
TIP
System and data owners should focus on identifying their highest-priority
assets and implement prioritized alerting when changes to those files
occur.
ptg7481383
MitigationStrategies 55
Tar ge ted M oni to rin g
Itisprobablynotpracticalforyoutomonitoreverybehavioraland 
technicalactiontakenbyeachemployeeandcontractor.However,area-
sonablelevelofproactiveloggingofonlineactivityacrossyournetwork 
providesdatathatcanbemonitoredorauditedforsuspiciousactivitypro-
actively,ortargetedtomonitorpeoplewhohaveraisedthesuspicionsof 
theirmanagers.
Astheperceivedriskofaninsiderattackincreases,duetodetectionof 
behavioralortechnicalprecursors,theamountoftechnicalandbehav-
ioralmonitoringshouldalsoincrease.Increasedmonitoringcouldleadto 
discoveryofprecursoractivity,enablingyoutoidentifyindividualsata 
higherriskformaliciousbehaviorandimplementmoretargeted  individual 
monitoring.
Ifamanagernoticesanemployeeprogressingthroughthepatternof 
behaviordescribedinthischapter,hemightconsideranauditofthat 
employee’sonlineactivity.Iftheemployee’sbehaviors,eithertechnicalor 
nontechnical,areextremeenough,managersmayneedtoescalatethelevel 
ofloggingandmonitoringofthatemployee’sonlineactivity.
Notethatveryclearlydefinedpoliciesshouldbeinplaceinadvanceof 
suchtargetedloggingandmonitoring;anorganizationshouldnotperform 
theseactionswithoutconsultingwithitslegaldepartmentinadvance. 
Thresholdsforbeginningtargetedmonitoringmustbeveryclearly 
defined.Inaddition,suchpoliciesmustbeconsistentlyenforced.Ifyou 
institutetargetedmonitoringofoneemployee,anddonotimplementit 
foranotheremployeeexhibitingthesamebehaviors,therecouldbelegal 
repercussions.
Targetedmonitoringshouldbepartofacomprehensiveinsiderthreat 
incident-managementplan,whichshouldbedevelopedbymanagement, 
workingtogetherwiththehumanresources,informationsecurity,legal, 
andphysicalsecuritydepartments.
TIP
Since it is not practical to monitor every behavioral and technical action,
proactive monitoring of people who are on the HR radar should be
implemented.
ptg7481383
Chapter2. InsiderITSabotage
56
Measures upon Demotion or Termination
Terminationordemotionwasthefinalprecipitatingeventinmanycases 
weexamined.Itisimportantforyoutorecognizethatsuchprecipitating 
eventsmaycausetheinsidertotaketechnicalactionstosetupandcarry 
outtheattack,possiblyusingpreviouslyacquiredunknownaccesspaths. 
Aclearlydefinedprocessfordemotionsandterminationsincombination 
withproactiveITbestpracticesfordetectingunknownaccesspathsand 
eliminatingunauthorizedaccesspathscanreducetheinsider’sability 
and/ordesiretoattackyou.
Priortothedemotionortermination,youshouldbecertainaboutwhat 
accesspathsareavailabletotheinsider.Iftheinsideristobeterminated, 
youmustdisableallaccesspathspriortonotifyingtheinsider.Itisimpor-
tanttounderstandthatifyouhavebeenlaxintrackingandmanaging 
accesspaths,itcouldbetoolatetoconfidentlydemoteorterminatean 
employeewithoutfearofretribution.
Whenademotionoccurs,youshouldanalyzetherolesandresponsibilities
ofthenewpositionandupdateauthorizationlevelsandaccesscontrols, 
includingrole-basedaccess.Someorganizationsinthecasesweanalyzed 
overlookedthechangeinprivileges,allowingtheemployeetoretainprivi-
legesfromhispreviousposition,givinghimaccesstoinformationbeyond 
thatneededforhisnewposition.
Settingexpectationsduringademotionorterminationcanbeadeterrent 
againstfutureattacks.Employeesshouldbeclearlytoldwhattheaccept-
ableusepolicyisregardingtheirnewpositions,whattheirrolesand 
responsibilitiesareintheirnewpositions,whattheirperformanceimprove-
mentplansare(ifapplicable),andthatfuturemonitoringandauditing 
willbeimplementedtomeasurejobperformanceagainstindividualand 
organizationalgoalsandobjectives.
Secure the Logs
Inmostinsiderthreatcases,systemlogsareusedtoidentifytheinsider, 
includingremoteaccesslogs,fileaccesslogs,databaselogs,application 
logs,andemaillogs.Manyinsiderstakestepstoconcealtheiractions;some 
TIP
Precipitating events, such as demotions or termination, may cause
increased disgruntlement, so organizations should follow a consistent
termination process.
ptg7481383
MitigationStrategies 57
insiders,knowingthatthelogswouldbeusedforidentification,attempted 
toconcealtheiractionsbymodifyingthelogs.Insomecases,theymodified 
thelogstoimplicatesomeoneelsefortheiractions.
Tes t Bac kup a nd R ecov er y P roce ss
Preventionofinsiderattacksisthefirstlineofdefense.However, 
experiencehastaughtusthattherewillalwaysbeavenuesfordetermined 
insiders tosuccessfully compromise asystem. Effective backup and recov-
eryprocessesneedtobeinplaceandoperationalsothatifcompromises 
dooccur,businessoperationscanbesustainedwithminimalinterruption. 
Ourresearchhasshownthateffectivebackupandrecoverymechanisms 
affectedtheoutcomesinactualcases,andcanmeanthedifferencebetween
Severalhoursofdowntimetorestoresystemsfrombackups
Weeksofmanualdataentrywhencurrentbackupsarenotavailable
Monthsoryearstoreconstructinformationforwhichnobackupcopies 
existed
Backupandrecoverystrategiesshouldconsiderthefollowing:
Controlledaccesstothefacilitywherethebackupsarestored
Controlledaccesstothephysicalmedia(e.g.,nooneindividualshould 
haveaccesstobothonlinedataandthephysicalbackupmedia)
Separationofdutiesandthetwo-personrulewhenchangesaremade 
tothebackupprocess
Inaddition,accountabilityandfulldisclosureshouldbelegallyand 
contractuallyrequiredofanythird-partyvendorsresponsiblefor  providing 
backupservices,includingoff-sitestorageofbackupmedia.Itshouldbe 
clearlystatedinservicelevelagreementstherequiredrecoveryperiod, 
whohasaccesstophysicalmediawhileitisbeingtransportedoff-site,as 
wellaswhohasaccesstothemediainstorage.
Whenpossible,multiplecopiesofbackupsshouldexist,with  redundant
copiesstoredoff-siteinasecurefacility.Differentpeopleshouldbe 
responsibleforthesafekeepingofeachcopysothatitwouldrequirethe 
TIP
It is particularly important that you architect your systems to ensure the
integrity of your logs by implementing continuous logging to a centralized,
secure log server.
ptg7481383
Chapter2. InsiderITSabotage
58
cooperationofmultipleindividualstocompromisethemeanstorecovery.
Anadditionallevelofprotectionforthebackupscanincludeencryption, 
particularlywhentheredundantcopiesaremanagedbyathird-partyven-
dorattheoff-sitesecurefacility.Encryptionprovidesanadditionallevel 
ofprotection,butitdoescomewithadditionalrisk.Thetwo-personrule
shouldalwaysbefollowedwhenmanagingtheencryptionkeyssothatyou 
arealwaysincontrolofthedecryptionprocessintheeventtheemployees 
responsibleforbackingupyourinformationleaveyourorganization.
Systemadministratorsshouldensurethatthephysicalmediaonwhich 
backupsarestoredarealsoprotectedfrominsidercorruptionor  destruction. 
Insidercasesinourresearchhaveinvolvedattackerswhohave
Deletedbackups
Stolenbackupmedia(includingoff-sitebackupsinonecase)
Performedactionsthatcouldnotbeundoneduetofaultybackup 
systems
Somesystemadministratorsneglectedtoperformbackupsinthefirstplace, 
whileotherssabotagedestablishedbackupmechanisms.Suchactionscan 
amplifythenegativeimpactofanattackbyeliminatingtheonlymeansof 
recovery.Toguardagainstinsiderattack,youshoulddothefollowing.
Performandperiodicallytestbackups.
Protectmediaandcontentfrommodification,theft,ordestruction.
Applyseparationofdutiesandconfiguration-managementprocedures 
tobackupsystemsjustasyoudoforothersystemmodifications.
Applythetwo-personruleforprotectingthebackupprocessand 
physicalmediasothatonepersoncannottakeactionwithoutthe 
knowledgeandapprovalofanotheremployee.
Unfortunately,someattacksagainstnetworksmayinterferewithcommon 
methodsofcommunication,therebyincreasinguncertaintyand  disruption 
inorganizationalactivities,includingrecoveryfromtheattack.Thisis 
especiallytrueofinsiderattacks,sinceinsidersarequitefamiliarwith 
organizationalcommunicationmethodsand,duringanattack,mayinter-
ferewithcommunicationsessentialtotheorganization’sdata-recovery 
process.Youcanmitigatethiseffectbymaintainingtrustedcommunication 
pathsoutsidethenetworkwithsufficientcapacitytoensurecriticalopera-
tionsintheeventofanetworkoutage.Thiskindofprotectionwouldhave 
twobenefits:Thecostofstrikesagainstthenetworkwouldbemitigated, 
ptg7481383
Summary 59
andinsiderswouldbelesslikelytostrikeagainstconnectivitybecauseof 
thereducedimpact.
One Final Note of Caution
Youmustbeawareofthepossibilitythatyouremployeescouldattack 
anotherorganization,possiblyapreviousemployer,usingyoursystems. 
Whilenotcommon,suchcrimescananddohappen—thereareafew 
suchcasesintheCERTdatabase.Youneedtoconsidertheliabilityand 
disruptionthatsuchacasecouldcause.
Onesuchattackbyaninsideragainsthisformeremployerfromhiscurrent 
employer’ssystemsmayhavebeenamajorfactorinthecurrentemployer’s 
downfall.Theinsiderclaimedthattheattackwaspaybackformisdeeds 
againsthimandhiscurrentcompany.Althoughthecurrentemployerdis-
avowshavinganythingtodowiththeattack,ittoosufferedasaresultof 
theinsider’saction.Thelawenforcementsurroundeditsofficesandtold 
workersnottotamperwithanycompanydataorfiles,puttingitsworkon 
temporaryhold.Inapanic,theinsiderstartedmassiveerasureofpoten-
tialevidence.Theinsiderreceivedfiveyearsforcomputerhackingand 
20yearsforobstructionofjustice.
Summary
InsiderITsabotagecrimesarethemosttechnicallysophisticatedcrimes 
inourdatabase.Theyarecommittedbytechnicallyprivilegeduserswho 
havetheaccessandabilitytocarryoutsuchattacks.Theimpactsofthese 
typesofcrimescanbedevastating—organizationshavegoneoutofbusi-
ness,lostmillionsofdollars,andsufferedfar-reachingnegativemedia 
exposureasaresultoftheseattacks.
Mostoftheinsiderswhocommittheseattackshavepersonal 
predispositionsthatareindicatedthroughobservablebehaviorssuchas 
conflictswithcoworkers,seriouspersonalityconflicts,andinabilitytofol-
lowtherules.Theseemployeesattackfollowingsometypeof  negative 
TIP
Effective backup and recovery processes need to be in place and
operational so that if compromises do occur, business operations can be
sustained with minimal interruption.
ptg7481383
Chapter2. InsiderITSabotage
60
precipitatingeventintheworkplace,suchasnoraisesduetoapoor 
economy,anewsupervisorthatnoonecaresfor,orbeingputontoanew 
project.Asaresult,theybecomedisgruntled.Chancesarethatothersinthe 
organizationaresimilarlydisgruntled,sincetheymostlikelyaresubjected 
tothesamecircumstances.Foracertainperiodoftime,theatmosphereat 
workisprobablytense,butthenmostemployees“getoverit.”Themali-
ciousinsiders,however,donotgetoverit.Instead,theybecomemoreand 
moredisgruntled.Theycontinuetoexhibitconcerningbehaviorsinthe 
workplace,basicallycaughtinadownwardspiralthatcontinuestoget 
increasinglyworseuntiltheymakethedecisiontoattack.
Bythetimetheydecidetheywantrevenge,theyrealizetheymostlikely 
willbefired,ortheyvoluntarilyquittheorganization.Theyknowtheywill 
needtogetbackintotheorganization’snetworkfollowingtheirtermina-
tion,sotheycreatewhatwecall“unknownaccesspaths.”Forinstance,they 
createbackdooraccounts,insertmaliciouscodeintosourcecode,social-
engineerpasswords,downloadmaliciouscode,orwritelogicbombs.Itis 
atthispointthatyoueitherdetecttheunknownaccesspathandsetupof 
theattack,orhavelittlechanceofpreventingtheattackfromoccurring.
Ourrecommendationsforpreventingthesetypesofattacksinvolve 
multiplepartsofyourorganization.Managementneedstobetrainedto 
recognizethesignsofapotentialinsiderattack.Theyneedtorecognizethe 
warningsigns,andtrytoalleviatetheproblemifpossible.Ifnot,theyneed 
toworkwithhumanresourcestocarefullyhandletheproblem.Ifthesitu-
ationworsens,theyneedtobeabletopullintheinformationsecurityand 
ITdepartmentstoauditrecentactivitybytheemployeeorcontractor,and 
performtargetedmonitoringofhisactivityonanongoingbasis.
Itisimportantthatyouplanahead,however,oryouwillbeprohibited 
fromperformingthoseactionsbyemployeeprivacylaws.Youneedtoput 
policiesinplacethatclearlydefinewhenyoucanconducttargetedauditing 
andmonitoringofanindividualemployeeorcontractor’sonlineactivity. 
Youalsomusthaveclearlydefinedpracticesthatareconsistentlyenforced 
toimplementthosepolicies.
NowthatyouunderstandinsiderITsabotage,youhaveachoiceofwhere 
togonextinthisbook.Ifyouwanttofollowupimmediatelyonthe 
insiderITsabotageproblem,youcangotoChapter6,BestPracticesfor 
the  PreventionandDetectionofInsiderThreats,ortoChapter7,Technical
InsiderThreatControls.
Ifyouwanttounderstandthewholelandscapeofinsiderthreats,youcan 
continuewithChapter3,InsiderTheftofIntellectualProperty.
ptg7481383
61
Chapter  3
InsiderTheftof 
IntellectualProperty
Insider theft of intellectual property (IP): an insiders use of IT to steal
proprietary information from the organization. This category includes
industrial espionage involving insiders.
Intellectual property: intangible assets created and owned by an organiza-
tion that are critical to achieving its mission.1
1.  WhileIPdoesnotgenerallyincludeindividuals’PersonallyIdentifiableInformation(PII), 
whichanorganizationdoesnotown,itcouldincludeadatabasethattheorganizationdevelopedthat 
containsPII.
Types of IP Stolen
ThetypesofIPstoleninthecasesinourdatabaseincludethefollowing:
Proprietarysoftware/sourcecode
Businessplans,proposals,andstrategicplans
Customerinformation
Productinformation(designs,formulas,schematics)
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
62
Whatifoneofyourscientistsorengineerswalkedawaywithyourmost 
valuabletradesecrets?Oracontractprogrammerwhosecontractended 
tookyoursourcecodewithhim—sourcecodeforyourpremierproduct 
line?Whatifoneofyourbusinesspeopleorsalespeopletookyourstrategic 
planswithhimtostarthisowncompetingbusiness?Andpossiblyworstof 
all,whatifoneofthemgaveyourintellectualpropertytoaforeigngovern-
ment or organization? Once your IP leaves the United States it’s extremely 
difficult,oftenimpossible,togetitback.
Thosearethetypesofcrimeswewillexamineinthischapter.  Organizations 
inalmosteverycriticalinfrastructuresectorhavebeenvictimsofinsider 
theftofIP.
InonecaseofinsidertheftofIP,anengineerandanaccomplicestoletrade 
secretsfromfourdifferenthigh-techcompaniestheyworkedfor,withthe 
intentionofusingtheminanewcompanytheyhadcreatedwithfunding 
fromaforeigncountry.Inanother,acompanydiscoveredthatanemployee 
hadcopiedtradesecretsworth$40milliontoremovable media,2andwas 
usingtheinformationinasidebusinessshehadstartedwithherhusband. 
Inyetanother,alargeITorganizationdidn’trealizethatithadbeenvictim-
izeduntilithappenedtoseeaformeremployeeatatradeshowsellinga 
productthatwasremarkablysimilartotheorganization’s!
WhenwebeganexaminingthetheftofIPcasesinourdatabasewe 
surmisedthatinsidersprobablystoleIPforfinancialreasons.Wewerevery 
wrongaboutthat!Wefoundthatquitetheoppositeistrue:Veryfewinsid-
ersstealintellectualpropertyinordertosellit.Instead,theystealitfora 
businessadvantage:eithertotakewiththemtoanewjob,tostarttheirown 
competingbusiness,ortotaketoaforeigngovernmentororganization.
AnothermisconceptionabouttheftofIPisthatsystem  administratorsare 
thebiggestthreat,sincetheyhold“thekeystothekingdom.”Not   according 
2.  Removable media:computerstoragemediathatisdesignedtoberemovedfromthecomputer 
withoutpoweringthecomputeroff.ExamplesincludeCDs,USBflashdrives,andexternalhard 
diskdrives.
Very few insiders steal intellectual property in order to sell it. Instead, they
steal it for a business advantage: either to take with them to a new job, to
start their own competing business, or to take to a foreign government or
organization.
ptg7481383
63InsiderTheftofIntellectualProperty
toourdata!Wedon’thaveasinglecaseinourdatabaseinwhichasystem 
administratorstoleintellectualproperty,althoughwedohaveafewcases 
involvingotherITstaffmembers.However,keepinmindthatweonly 
havecasesinwhichtheperpetratorwasdiscoveredandcaught;itispos-
siblethatsystemadministratorsarestealingIPandaresimplygettingaway 
withit.
Infact,theinsiderswhostealIPareusuallycurrentemployeeswhoare 
scientists,engineers,programmers,orsalespeople.Mostofthemaremale. 
WecheckedtheU.S.BureauofLaborStatisticstodetermineifmostofthose 
typesofpositionsareheldbymen,buttheresults,listedherefor2010,were 
inconsistent.
12.9%ofallarchitecturalandengineeringpositionswereheldby 
women.
45.8%ofallbiologicalscientistswerewomen.
33.5%ofallchemistsandmaterialsscientistswerewomen.
26.2%ofallenvironmentalscientistsandgeoscientistswerewomen.
39.5%ofallotherphysicalscientistswerewomen.
49.9%ofallsalesandrelatedoccupationswereheldbywomen.3
Wearenotsuggestingthatyouassumemenaremorelikelythanwomen 
tocommitthesetypesofcrimes.Onthecontrary,wesuggestthatrather 
thanfocusingondemographiccharacteristics,youshouldfocusonthe 
following:
Understandingthepositionsatriskforthesecrimes
Recognizingthepatternsandorganizationalfactorsthattypically 
surroundinsidertheftofIPincidents
Implementingmitigationstrategiesbasedonthosepatterns
Thesetypesofcrimesareverydifficulttodetectbecausewefoundthat 
theseinsidersstealinformationforwhichtheyalreadyhaveauthorized 
3.  ftp://ftp.bls.gov/pub/special.requests/lf/aat11.txt
Insiders who steal IP are usually current employees who are scientists,
engineers, programmers, or salespeople.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
64
access,andusuallystealitatworkduringnormalbusinesshours.Infact, 
theystealthesameinformationthattheyaccessinthecourseoftheir 
normaljob.Therefore,itcanbeverydifficulttodistinguishillicitaccess 
fromlegitimateaccess.
Fortunately,wehavecomeupwithsomegoodstrategiesbasedonour 
MERITmodelofinsidertheftofintellectualpropertythatwewilldetail 
inthischapter.Thefirsthalfofthischapterdescribesthemodelatahigh 
level.Inthesecondhalfofthechapterwewilldigdeeperintothetechni-
calmethodsusedincommittingthesecrimesandmitigationstrategiesthat 
youshouldconsiderbasedonallofthisinformation.
TheMERITmodeldescribestheprofileofinsidertheftofIPbyidentifying 
commonpatternsintheevolutionoftheincidentsovertime.Thesepat-
ternsarestrikinglysimilaracrossthecasesinourdatabase.Unfortunately, 
wewerenotquiteasluckyincreatingourtheftofIPmodelaswewerein 
creatingourinsiderITsabotagemodel.Whilewefoundoneverydistinct 
patternthatwasexhibitedinalmosteveryITsabotagecase,wecouldnot 
identifyasinglepatternfortheftofIP.Instead,weendedupidentifying 
twooverlappingmodels.
Entitled Independent:aninsideractingprimarilyalonetosteal 
informationtotaketoanewjobortohis4ownsidebusiness
Ambitious Leader:aleaderofaninsidercrimewhorecruitsinsidersto 
stealinformationforsomelargerpurpose
Thecasesinourdatabasebreakupjustabout50/50betweenthetwo
models.Inaddition,themodelshavedifferentbutoverlappingpatterns;
theAmbitiousLeadermodelbuildsfromtheEntitledIndependent
model. This is good news, as our suggested mitigation strategies apply
tobothmodels.
4.  MostoftheinsiderswhostoleITpropertyweremale.Therefore,malegenderisusedtodescribethe 
genericinsiderinthischapter.
Insiders steal information for which they already have authorized access,
and usually steal it at work during normal business hours. In fact, they
steal the same information that they access in the course of their normal
job. Therefore, it can be very difficult to distinguish illicit access from
legitimate access.
ptg7481383
65InsiderTheftofIntellectualProperty
Inthischapterwewilldescribethepatternsidentifiedinboth 
models,andwillpresentmitigationstrategiesthatusethosepatternsto 
your  advantage.5Thesetechniquesincludeacombinationofautomated 
andmanualcountermeasures. In addition,some are focused on protection 
ofyourmostvaluableinformationassets,whileothersaretargetedatspe-
cificemployeestriggeredbyindicatorsthatcouldsuggestanincreasedrisk 
ofattack.
Forexample,ifyoucanidentifyyourmostcriticalassets,technical 
solutionssuchasdigital watermarking,6digital rights management,7and 
data loss prevention systems8canbeimplementedtopreventthoseassets 
fromleavingyournetwork.Thereareseveraldrawbackstothesetechnical 
solutions,however.Firstofall,mostorganizationscan’torhaven’tiden-
tifiedandlocatedalloftheirmostcriticalcomputerfiles.Thiscanbean 
overwhelmingtask,particularlyinalargeorganization.Inaddition,many 
ofyouhavetrustedbusinesspartnersthatlegitimatelymoveyourcriti-
calfilesbackandforthfromtheirownnetworkstoyours.Thosetypesof 
environmentscancomplicateuseofthosetypesoftechnologies.
Becauseofthecomplexityofimplementingapurelytechnicalsolution 
focusedoncriticalassets,wealsosuggesttargetedmonitoringofemploy-
eesorcontractorswhoareleavingyourorganization.Wefoundthatmost 
insidersstealintellectualpropertyastheyareleavingtheorganization, 
suggestingthatitcouldbebeneficialtowatchtheiractionsmoreclosely, 
specificallythoseinvolvingremovablemedia,email,andothermethods 
usedinexfiltratinginformation.
Wewillprovidesuggestedcountermeasuresthroughoutthischapter,and
detailedtechnicalinformationforthetheftofIPcasesinthesection  Mitigation
StrategiesforAllTheftofIntellectualPropertyCasesattheendofthechap-
ter.ThebottomlineisthatunlikeITsabotage,wherethegoalistocatchthe
5.  Materialinthischapterincludesportionsofpreviouslypublishedworks.Specifically,theinsider 
theftofintellectualpropertymodelingworkwaspublishedbyAndrewMoore,DawnCappelli,Dr.Eric 
Shaw,ThomasCaron,DerrickSpooner,andRandyTrzeciakintheJournal of Wireless Mobile Networks,
Ubiquitous Computing,andDependable Applications[Moore2011a].Anearlierversionofthemodelwas 
publishedbythesameauthorsin[Moore2009].
6.  Digital watermarking:theprocessofembeddinginformationintoadigitalsignalthatmay 
beusedtoverifyitsauthenticityortheidentityofitsowners,inthesamemanneraspaperbearing 
awatermarkforvisibleidentification(Wikipedia).
7.  Digital rights management (DRM):atermforaccesscontroltechnologiesthatareusedby  hardware 
manufacturers,publishers,copyrightholders,andindividualstolimittheuseofdigitalcontent 
anddevices.
8.  Data loss prevention (DLP) systems:referstosystemsdesignedtodetectandprevent  unauthorized 
useandtransmissionofconfidentialinformation(Wikipedia).Alsocommonlycalleddata leakage tools.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
66
insiderasheissettinguphisattack—plantingmaliciouscodeorcreatinga 
backdooraccount—youcannotreallydetecttheftofIPuntiltheinformation
isactuallyintheprocessofbeingstolen—asitisbeingcopiedtoremovable
mediaoremailedoffofthenetwork.Inotherwords,yourwindowofoppor-
tunitycanbequitesmall,andthereforeyouneedtopaycloseattentionwhen
youseepotentialindicatorsofheightenedriskofinsidertheftofIP.
Wehavesome“good-news”casesthatindicatethatitispossibleto
detecttheftofIPusingtechnicalmeasuresintimetopreventdisastrous
consequences.
AnorganizationdetectedIPemailedfromacontractor’semailaccount 
atworktoapersonalemailaccount,investigated,anddiscoveredsig-
nificantdataexfiltrationbythecontractor.Theorganizationfoundthe 
contractorwasworkingwithaformeremployeetostealinformation 
tostartacompetingbusiness.Obviously,thestolenIPwasextremely 
valuable,asthecontractorwasarrested,convicted,orderedtopaya 
fineof$850,000,andsentencedto26yearsinprison!
Afteraresearcherresignedandstartedanewjob,hisformeremployer 
noticedthathehaddownloadedasignificantnumberofproprietary 
documentspriortohisdeparture.Thisledtohisarrestbeforehe 
couldtransfertheinformationtohisnewemployer’snetwork.The 
informationwasvaluedat$400million.
Duringanorganization’sroutineauditingofHTTPS traffic9it 
discoveredthatanemployeewhohadturnedinhisresignationhad 
exfiltratedproprietarysourcecodeonfourseparateoccasionstoa 
serverlocatedoutsidetheUnitedStates.Althoughtheemployee 
claimedthetransferwasaccidental,andthathehadonlyuploaded 
opensourceinformation,hewasarrested.
Impacts
TheimpactsofinsidertheftofIPcanbedevastating:Tradesecretsworth 
hundredsofmillionsofdollarshavebeenlosttoforeigncountries, 
competingproductshavebeenbroughttomarketbyformeremployees 
andcontractors,andinvaluableproprietaryandconfidential  information 
9.  HTTPS traffic:networktrafficthatisencryptedviatheSecureSocketsLayerprotocol.
ptg7481383
Impacts 67
hasbeengiventocompetitors.MorethanhalfofourtheftofIPcases 
involvedtradesecrets.
Inaddition,impactsinthesecasescanreachbeyondthevictim  organization. 
Herearesomeexamples.
SourcecodeforproductsontheU.S.MunitionsListwassharedwith 
foreignmilitaryorganizations.10
Agovernmentcontractorstolepasswordsthatprovidedunauthorized 
accesstosensitive,potentiallyclassifiedinformation.
Sourcecodewasaddedtosoftwareinatelecommunicationscompany 
thatenabledtheperpetratorstolisteninonphonecallsmadeby103 
high-rankinggovernmentandnongovernmentofficials.
EstimatedfinancialimpactsinthetheftofIPcasesintheCERTdatabase 
averagedaround$13.5million(actual)and$109million(potential).11The 
medianestimatedfinancialimpactwas$337,000(actual)and$950,000 
(potential).Thismeansthatafewextremelyhigh-impactcasesskewthe 
averagesignificantly.Thehighestestimatedpotentialfinanciallosseswere
$1billioninahigh-techcaseintheITsector
$600millioninatelecommunicationscompany
$500millioninapharmaceuticalcompany
$400millioninachemicalcompany
$100millioninabiotechcompany
Thehighestestimatedactualfinanciallosseswere
$100millioninamanufacturingbusiness
$40millioninamanufacturingbusiness
$6millioninthefinancialservicessector
$1.5millioninahigh-techsoftwaredevelopmentorganization
10.  InU.S.law,theU.S.MunitionsLististhelistofweaponsandsimilaritemsthataresubjectto 
licensingbecauseofthedangertheypose.TheU.S.MunitionsListisrelatedtotheInternationalTrafc
inArmsRegulations.FarlexFinancialDictionary.Copyright©2009Farlex,Inc. 
11.  Twenty-veofthe85casesoftheftofIPhadknownestimatesonactualorpotentialfinancialimpact.
More than half of our theft of IP cases involved trade secrets.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
68
Theseareonlysomeofthecaseswiththehighestfinancialconsequences.
Weprovidedthislistforseveralreasons.First,wearefrequentlyaskedhow
tocalculatereturnoninvestment(ROI)forinsiderthreatmitigation.Thatis
averydifficultquestion,andonethathasnotyetbeenansweredadequately
forcybersecurityingeneral.Tostart,youshouldidentifywhatyourcritical
assetsare,andestimatethepotentiallossifthoseassetsweretoleaveyour
organization.Thelosseswelistedfromactualcasesshouldhelpyoutocon-
vinceyourmanagementthatinsiderthreatisnottobetakenlightly!
Second,althoughalmosthalfoftheinsidertheftofIPcasesoccurred
intheITsector,wewanttoemphasizethatthesetypesofcrimeshave
resultedinsignificantlossesinothersectorsaswell.
Westronglysuggestthatyoupaycloseattentiontothischapterifyou 
areconcernedaboutthesecurityofyourproprietaryandconfidential 
information.Nowthatwehavecaughtyourattention,let’slookatthe 
characteristicsand“bigpicture”ofinsidertheftofintellectualproperty.
General Patterns in Insider Theft of Intellectual
Property Crimes
TheintentofourMERITmodelofinsidertheftofintellectualpropertyisto 
describethegeneralprofileofinsidertheftofIPcrimes.TheMERITmodels 
describethepatternsinthecrimesastheyevolveovertime—profilingthe 
lifecycleofthecrime,ratherthanprofilingonlytheperpetrator.
TheMERITmodelofinsidertheftofIPwasfirstpublishedin2009.The 
modelwascreatedusingsystemdynamicsmodeling,whichisdescribed 
intheoriginalreportandinAppendixF,SystemDynamicsBackground. 
Overtheyears,however,wehavefoundthatahigher-levelviewofthat 
modelismoreusefulindescribingthepatternstopractitionerssothat 
clear,actionableguidancecanbeprovidedformitigatingtheseincidents. 
Thathigher-levelformofthemodelandaccompanyingcountermeasure 
guidanceispresentedintheremainderofthischapter.
Asmentionedearlier,ouroverallmodelfortheftofIPactuallyconsistsof 
twomodels:theEntitledIndependentandtheAmbitiousLeader;wewill 
presentthoseoneatatime.Wehavebrokeneachmodeldownintosmall 
piecesinthischapterinordertomakeitmoreunderstandable.Thefull 
modeloftheEntitledIndependentisshowninFigure3-1.Figure3-2shows 
thefullmodeloftheAmbitiousLeader.
ptg7481383
69GeneralPatternsinInsiderTheftofIntellectualPropertyCrimes
Figure 3-1 MERITmodelofinsidertheftofIP:  Entitled  Independent
Organization’s
Denial of
Insider Request
Insider’s
Planning to Go
to Competitor
Level of Technical
and Behavioral
Monitoring
Organization’s
Discovery of Theft
Opportunity
to Detect
Theft
Information
Stolen
Insider’s Desire
to Steal
Insider’s
Dissatisfaction
Insider’s
Entitlement
Insider’s
Contribution
Precipitating Event
(e.g., Proposal by
Competitor)
Figure 3-2 MERITmodelofinsidertheftofIP:AmbitiousLeader
Insider’s
Contribution
Insider’s
Entitlement
Precipitating Event
(e.g., Proposal by
Competitor)
Insider’s
Planning to Go
to Competitor
Level of Technical
and Behavioral
Monitoring
Perpetrated
Deceptions
Organization’s
Discovery of
Deceptions Organization’s
Discovery of Theft
Insider’s
Concern Over
Being Caught
Insider’s Desire
to Steal
Opportunity
to Detect
Theft
Extent of
Planning to
Steal
Information
Stolen
Increasing
Access to
Information
Recruitment
of Other
Insiders
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
70
The Entitled Independent
ThissectiondescribesthemodeloftheEntitledIndependent,aninsider 
actingprimarilyalonetostealinformationtotaketoanewjobortohis 
ownsidebusiness.
Basedonourreviewofincidentdescriptionsandinterviewswithvictim 
organizations,investigators,andprosecutorsofinsidercases,wedeter-
minedthatmostinsidersfeltentitledtotaketheinformationtheywere 
accusedofstealing.Themajorityoftheinsidersstoleinformationthatthey 
hadworkedonwhileemployedbytheorganization.
Insider Contribution and Entitlement
Figure3-3showshowtheinsider’sfeelingofentitlementtowardthe
informationhedevelopsescalatesovertime.Theemployeecomesintoyour
organizationwithadesiretocontributetoitsefforts.Astimegoesonand
hedevelopsinformation,writessourcecode,orcreatesproducts,hiscontri-
butionbecomesmoretangible.Theseinsiders,unlikemostemployeesand
contractors,havepersonalpredispositionsthatresultinaperceivedsenseof
ownershipandentitlementtotheinformationcreatedbytheentiregroup.
Thelongerheworksontheproduct,themorehissenseof  entitlementgrows.
Thissenseofentitlementcanbeparticularlystrongiftheinsiderperceives
hisroleinthedevelopmentofproductsasespeciallyimportant.Ifhiswork
isdedicatedtoaparticularproduct—forexample,developmentofasoft-
waresystem,orthebuildingofcustomercontactlists—hemayhaveagreat
senseofownershipofthatproductorinformation.Thisleadstoaneven
greatersenseofentitlement.Inaddition,consistentwithgoodmanage-
ment  practice,individualsmayreceivepositivefeedbackfortheirefforts,
NOTE
Most insiders felt entitled to take the information they were accused of
stealing.
Figure 3-3 Insiderentitlement
Insider’s
Contribution
Insider’s
Entitlement
ptg7481383
TheEntitledIndependent 71
whichmayfurtherreinforcetheirsenseofownership,becauseoftheir
predispositions.
Evidenceofentitlementwasextremeinafewcases.OneEntitled 
Independent,whohadstolenandmarketedacopyofhisemployer’s 
criticalsoftware,createdalengthymanuscriptdetailinghisinnocenceand 
declaringthateveryoneatthetrialhadlied.Afterbeingdeniedaraise, 
anotherinsiderstolethecompany’sclientdatabaseandthreatenedtoput 
themoutofbusinessonhiswayoutthedoor.
WhatCanYou Do?
KnowingthatinsiderswhostealIPtendtostealtheassetstheyhelpedto 
developisakeyfactorindesigningamitigationstrategy.Ifyoucanidentify 
yourcriticalintellectualproperty,youcannarrowdownthelistofemploy-
eesandcontractorswhoareathighestriskofstealingittothosewhoare 
workingonitnoworhaveworkedonitinthepast.
Inaddition,keepinmindthatpeoplemovearoundwithinyour  organization.
Howgoodareyouatadjustingaccesscontrolsasthosemoveshappen?Just
becausesomeonehasmovedtoanotherprojectorareaoftheorganization
doesn’tmeanhedoesn’tstillfeelasenseofentitlementtohispastwork.Ero-
sionofaccesscontrolsisaproblemthatneedstobesolvedinordertoreduce
riskofinsidertheftofintellectualproperty.Almostthree-quartersofthe
insidersinourtheftofIPcaseshadauthorizedaccesstotheinformationsto-
lenatthetimeofthetheft,butthatdoesn’tmeanthatallofthemshouldhave
hadaccess.Inmanyorganizations,employeestendtotransferovertimeto
differentpartsoftheorganization.Theyoftenaccumulateprivilegesneeded
toperformnewtasksastheymove,withoutlosingaccesstheynolonger
need.Unfortunately,manyinsiders,atthetimewhentheystoleinforma-
tion,hadaccessesaboveandbeyondwhattheirjobdescriptionsrequired.
Wesuggestthatyouperiodicallyreviewandadjustyouraccesscontrols 
forcriticalassets.Wehelpedoneorganizationsetupaneffectivemecha-
nismforcontrollingaccessonceanemployeetransferstoanothergroup. 
Theorganizationrealizedthatitcouldn’tdisabletheemployee’saccess 
immediatelyupontransfersincethereistypicallyatransitionperiodin 
whichtheemployeestillneedsaccesstohisoldteam’sinformation.Sothe 
organizationsetupanautomatedemailtobesentfromitsHRsystemto 
theemployee’sprevioussupervisorthreemonthsafterthedateoftransfer. 
Thisemaillistsalloftheemailaliasestheemployeeison,sharedfold-
ersandcollaborationsitestowhichtheemployeehasaccess,andsoon, 
andsuggeststhatthesupervisorcontactITtodisableanyaccessthatisno 
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
72
longernecessary.Thismechanismhasbeenverysuccessfulincontrolling 
theerosionofaccesscontrolsintheorganization.
Someinsidersexhibitedanunusualdegreeofpossessivenesstowardtheir 
workbeforestealingit.Forinstance,afewinsiderskeptallsourcecodeon 
theirownlaptopsandrefusedtostoreitonthefileservers,sotheywould 
havefullcontroloverit.Thistypeofbehaviorshouldberecognizedand 
remediatedasearlyaspossible.
Insider Dissatisfaction
DissatisfactionplayedaroleinmanyoftheEntitledIndependentcases.Dis-
satisfactiontypicallyresultedfromthedenialofaninsider’srequest,asshown
inFigure3-4.Denialofanemployeeorcontractorrequestcanleadtodissat-
isfaction,whichinturndecreasestheperson’sdesiretocontribute.Thisalso
affectstheperson’ssenseofloyaltytoyou.Dissatisfactionoftenspurredthe
insiderinourcasestolookforanotherjob;themajorityhadalreadyaccepted
positionswithanothercompanyorhadstartedacompetingcompanyatthe
timeoftheirtheft.Oncetheinsiderreceivesajobofferandbeginsplanningto
gotoacompetingorganization,hisdesiretostealinformationincreases.This
desireisamplifiedbyhisdissatisfactionwithhiscurrentemployerandhis
senseofentitlementtotheproducts  developedbyhisgroup.
Inone-thirdofthecases,theinsideractuallyusedtheproprietary 
informationtogetanewjobortobenefithisnewemployerinsomeway. 
Dissatisfaction often spurred the insider in our cases to look for
another job.
Figure 3-4 Insiderdissatisfactionleadingto  compromise
Organization’s
Denial of
Insider Request
Precipitating Event
(e.g., Proposal by
Competitor)
Insider
Planning to Go
to Competitor
Insider’s
Dissatisfaction
ptg7481383
TheEntitledIndependent 73
Inmorethanone-thirdofthecases,theinsidertooktheinformationjustin 
caseheeverneededit,withnospecificplansinmind.Oneinsideractually 
brokeintohisorganization’ssystemsafterhewasterminatedtofindout 
whethertheorganizationhadmadeanyfurtherprogressontheproducthe 
hadhelpeddevelopwhileheworkedthere.
WhatCanYou Do?
Itisinevitablethatmanyofyouremployeeswillfindnewjobsatsome 
pointintime.Nowthatyouunderstandthatthesedepartingemploy-
eescouldposeincreasedriskofinsidertheftofintellectualproperty,you 
shouldconsiderareviewofyourterminationpoliciesandprocesses.As 
soonasanemployeeturnsinhisresignation,youneedtobepreparedto 
act,asyouwillseeinthenextsection.Ifyoucanquicklyandeasilyidentify 
thecriticalinformationthatemployeehasaccessto,youcankickintopre-
ventionanddetectionmode.
Also,foodforthought:SomeoftheinsiderswhostoleIPwere  contractors.
Howdoyouhandlecontractorswhentheyleaveyourorganization?
Inourinsiderthreatassessmentswehavediscoveredadisturbingtrend
inill-definedorlooselyenforcedproceduresforcontractortermina-
tions.Althoughcontractorsonlyaccountfor12%ofourinsidertheft
ofIPcrimes,therisktheyposeshouldnotbedisregarded.Contract
awardcyclescanrangefromfiveyears,tothree,toevenoneyear.Are
youabletotrackaccessgrantedtocontractorsandensureappropriate
Issues Leading to Dissatisfaction
IssuesleadingtodissatisfactionintheCERTdatabaseincludethe 
following:
Disagreementoverownershipofintellectualproperty
Financialcompensationissues
Disagreementoverbenefits
Relocationissues
Hostileworkenvironment
Mergersandacquisitions
Companyattemptingtoobtainventurecapital
Problemswithsupervisor
Passedoverforpromotion
Layoffs
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
74
accessevenwhen  contractorsandcontractingorganizationschangeona 
frequentbasis?
Insider Theft and Deception
AsshowninFigure3-5,eventuallythedesiretostealinformationbecomes 
strongenough,leadingtothetheftandfinallytheopportunityforyouto 
detectthetheft.Perhapssomeoneobservesanemployee’sactions,orcon-
sequencesofthoseactions,thatseemsuspiciousinsomeway.Themost 
likelypersontodiscoveraninsidertheftaccordingtoourdataisanon-
technicalemployee;incaseswherewewereabletoisolatethepersonwho 
discoveredtheincident,72%weredetectedbynontechnicalemployees. 
Therefore,youshouldhaveprocessesinplaceforemployeestoreport
suspiciousbehavior,employeesshouldbeawareofthoseprocesses,and 
youshouldfollowuponreportsquickly,particularlyiftheyconcernan 
employeewhofitstheprofiledescribedinourmodels.
NOTE
The insider’s plan to leave the organization, dissatisfaction, and his sense
of entitlement all contribute to the decision to steal the information.
Figure 3-5 Insidertheftanddeception
Insider
Planning to Go
to Competitor
Insider’s
Dissatisfaction
Organization’s
Discovery of Theft
Level of Technical
and Behavioral
Monitoring
Opportunity
to Detect
Theft
Information
Stolen
Insider’s Desire
to Steal
Insider’s
Entitlement
ptg7481383
TheEntitledIndependent 75
OurEntitledIndependentsdidnotexhibitgreatconcernwithbeingcaught. 
EventhoughsignedIPagreementswereinplaceinaround40%ofthe 
cases,fewerthanone-quarteroftheEntitledIndependentstriedtodeceive 
theorganizationwhiletakingtheirinformation.Whileexplicitdeception 
isnotamajorfactorinmostofthesecrimes,thefactthatitdidoccurin 
one-fourthofthemsuggeststhatyouneedtoanticipateitwhendesigning 
yourcountermeasures.
Forexample,uponannouncinghisresignation,oneinsiderliedtohis 
managerandsaidhehadnofollow-onemployment,eventhoughhehad 
toldacoworkerabouthisnewjobatacompetitor.Ifyoubecomeawareof 
deliberatedeceptionlikethis,itmaybeanindicatorofproblemstocome. 
Deceptionsgenerallymakeitharderforyoutosensetheriskoftheft,and 
thatiswhytheinsiderdoesit.Butifyouarevigilant,deceptionsmaybe 
discovered,alertingyoutoincreasedriskofinsiderthreat.Iftheorganiza-
tioninthisexamplehadknownthattheinsiderhadgivencontradictory 
informationtohismanagerandcoworker,itmayhavebeenforewarnedof 
theheightenedrisk.
Ingeneral,youraccurateunderstandingofyourriskisdirectlyrelated
toyourabilitytodetecttheinsider’sillicitactions.Withsufficient
levelsoftechnicalandbehavioralmonitoring,theseactionsmaybe
discoverable.
Mostofthesecrimestendtobequicktheftsaroundresignation.Morethan 
one-halfoftheEntitledIndependentsstoleinformationwithinonemonth 
ofresignation,whichgivesyouawell-definedwindowofopportunityfor 
discoveringthetheftpriortoemployeetermination.Itisimportantthatyou 
fullyunderstandtheone-monthwindow,however,asitisabitmorecom-
plexthanitfirstappears.First,theone-monthwindowincludesthemonth 
beforetheinsiderturnsinhisresignationandthemonthafterheresigns;actu-
allytwomonthstotal.Thismeansthatyouneedtohavetechnicalmeasures 
inplaceatalltimessothatyoucangobackintimeandreviewpastonline 
activity.Second,someoftheseinsidersstoleIPlongbefore  resignation;just 
becausetheystoleitwithinonemonthof  resignationdoesn’tmeanthat 
iswhentheyfirststartedstealingit.Someofthemstoleslowlyovertime, 
NOTE
Most information was stolen within one month of resignation using a
variety of methods.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
76
committingtheirfinaltheftrightbefore  resignation.However,fewerthan 
one-thirdoftheinsiderscontinuedtheirtheftformorethanonemonth.
Oneinsiderplannedwithacompetingorganizationabroadandtransferred 
documentstothecompanyforalmosttwoyearspriortoherresignation.
However,forthemostpart,theinsidersdidstealtheinformationquickly 
uponresignation.
Inonecasetheinsideracceptedapositionwithacompetingorganization, 
resignedhisposition,andproceededtodownloadproprietaryinformation 
totakewithhimtothenewcompanybeforehislastdayofwork.Hestole 
theinformationdespitewarningsbyhisnewemployernottobringany 
proprietaryinformationwithhimtohisnewposition.Whenquestioned 
aboutthetheft,theinsideradmittedtodownloadingtheinformation, 
sayingthathehopedtouseitifheeverstartedhisownbusiness.
Inasimilarcase,theinsideracceptedapositionwithacompetitorand 
starteddownloadingdocumentscontainingtradesecretstheverynext 
day.Afewweekslater,afterseveralsessionsofhigh-volumedownloading, 
theinsiderlefttheorganizationandstartedworkingforthecompetitor. 
Justtwodaysafterstartinghisnewjob,theinsiderloadedthestolenfiles 
ontohisnewlyassignedlaptop,andwithinamonthhademailedthetrade 
secretstohisnewcoworkers.Thisexemplifiesthelackofanyeffortto 
concealthetheft.
Awidevarietyoftechnicalmeanswereusedinthetheftcasestotransfer 
information,includingemail,phone,fax,downloadingtoorfromhome 
overtheInternet,maliciouscodecollectionandtransmission,andprint-
ingoutmaterialontheorganizations’printers.Oneparticularlyvengeful 
insideractedinangerwhenhisemployerrewardedexecutiveswithexor-
bitantbonuseswhilelower-levelemployeeswerereceivingmeagerraises 
orbeinglaidoff.Hebegandownloadingconfidentialcorporatedocu-
mentstohishomecomputer,carryingphysicalcopiesoutoftheoffices, 
and  emailingthemtotwocompetitors.Neitherofthetwocompetitors 
wantedtheconfidentialinformationandbothsenttheinformationthey 
NOTE
The one-month window includes the month before the insider resigns and
the month after he resigns—actually two months in total.
ptg7481383
TheEntitledIndependent 77
receivedbacktothevictimorganization.Thisinsideralsomadenoattempt 
to  concealordenyhisillicitactivity.
WewillexplorethetechnicaldetailsofthetheftofIPcaseslaterinthis 
chapter,followingtheAmbitiousLeadermodel.
WhatCanYou Do?
Ourcasedatasuggeststhatmonitoringofonlineactions,particularly 
downloadswithinonemonthbeforeandafterresignation,couldbepar-
ticularlybeneficialforpreventingordetectingthetheftofproprietary 
information.Youneedtoconsiderthewidevarietyofwaysthatinforma-
tionisstolenanddesignyourdetectionstrategyaccordingly.Data leakage
tools12mayhelpwiththistask.Manytoolsareavailablethatenableyouto 
performfunctionssuchasthefollowing:
Alertingadministratorstoemailswithunusuallylargeattachments
Taggingdocumentsthatshouldnotbepermittedtoleavethenetwork
Trackingorpreventingprinting,copying,ordownloadingofcertain 
information,suchasPIIordocumentscontainingcertainwordssuchas 
new-productcodenames
Trackingofalldocumentscopiedtoremovablemedia
Preventingordetectingemailstocompetitors,togovernmentsand 
organizationsoutsidetheUnitedStates,toGmailorHotmailaccounts, 
andsoon
Youmightalsoconsiderasimplemechanismtoprotectyourselffrom 
beingtheunknowingrecipientofstolenIPfromanotherorganization. 
AspartofyourIPagreementthatyoumakenewemployeessign,you 
mightwanttoincludeastatementattestingtothefactthattheyhavenot 
broughtanyIPfromanypreviousemployerwiththemtoyourorganiza-
tion.WeareheartenedbythefactthatmanyofthetheftofIPcasesinour 
databaseweredetectedbythenewemployer,andreportedtothevictim 
organizationand/orlawenforcement.Youshouldbesurethatyouhavea 
processdefinedforhowyouwouldrespondtothattwistofinsiderthreat. 
Inaddition,youmayconsideraskingdepartingemployeestosignanew 
12.  Data leakage tools:systemsdesignedtodetectandpreventunauthorizeduseandtransmissionof 
confidentialinformation(Wikipedia).Alsocommonlycalleddata loss prevention (DLP) systems.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
78
IPagreement,remindingthemofthecontentsoftheIPagreementwhile 
theyarewalkingoutthedoor.
The Ambitious Leader
ThissectiondescribestheAmbitiousLeadermodel.Thesecasesinvolvea 
leaderwhorecruitsinsiderstostealinformationwithhim—essentiallya 
“spyring.”UnliketheEntitledIndependent,theseinsidersdon’tonlywant 
theassetstheycreatedorhaveaccessto,theywantmore:anentireproduct 
lineoranentiresoftwaresystem.Theydon’thavetheaccesstostealallthat 
theywantthemselves,sotheyrecruitothersintotheirschemetohelp.
WeomittedtheWhatCanYouDo?sectionfrommostoftheAmbitious 
LeaderscenariosbecauseitissosimilartotheEntitledIndependentmodel. 
Butweprovideextensiveadviceattheendofthechapterwhenweexplore 
thetechnicaldetailsinallofthecases.
MorethanhalfoftheAmbitiousLeadersplannedtodevelopacompeting 
productorusetheinformationtoattractclientsawayfromthevictimorga-
nization.Others(38%)workedwithanewemployerthatwasacompetitor. 
Only10%actuallysoldtheinformationtoacompeting  organization.
Aboutone-thirdofourtheftofIPcaseswereforthebenefitofaforeign 
governmentororganization.Theaveragefinancialimpactforthesecases 
wasmorethanfourtimesthatofdomesticIPtheft.Inthesecases,loyaltyto 
theinsider’snativecountrytrumpedloyaltytotheemployer.Insiderswith 
anaffinitytowardaforeigncountryweremotivatedbythegoalofbringing 
valueto,andsometimeseventuallyrelocatingin,thatcountry.
Ingeneral,thecasesinvolvingaforeigngovernmentororganizationfit 
theAmbitiousLeadermodel.However,becausetheconsequencesofthese 
crimesaremuchmoresevere,andbothgovernmentandprivateorgani-
zationsaresoconcernedaboutthisthreat,wehaveincludedaseparate 
sectionattheendoftheAmbitiousLeadermodelthatanalyzesthose 
crimesinabitmoredepth.
About one-third of our theft of IP cases were for the benefit of a foreign
government or organization. The average financial impact for these cases
was more than four times that of domestic IP theft.
ptg7481383
TheAmbitiousLeader 79
TherestofthissectiondescribesadditionalaspectsoftheAmbitious 
LeadermodelnotexhibitedbyEntitledIndependents.Thesecasesare 
morecomplexthantheEntitledIndependentcases,involvingmoreintri-
cateplanning,deceptiveattemptstogainincreasedaccess,andrecruitment
ofotheremployeesintotheleader’sscheme.
ThemotivationfortheAmbitiousLeaderisslightlydifferentfromthatof 
theEntitledIndependent.Therewaslittleevidenceofemployeedissatis-
factionintheAmbitiousLeaders.Insidersinthisscenarioweremotivated 
notbydissatisfaction,butratherbyanAmbitiousLeaderpromisingthem 
greaterrewards.
Inonecase,theheadofthepublicfinancedepartmentofasecuritiesfirm 
organizedhisemployeestocollectdocumentstotaketoacompetitor.Over 
oneweekendhethensentaresignationletterforhimselfandeachrecruit
to the head of the sales department. The entire group of employees started 
workwiththecompetitorthefollowingweek.
Inanothercase,anoutsiderwhowasoperatingafictitiouscompany 
recruitedanemployeelookingforanewjobtosendhimreamsofhiscur-
rentemployer’sproprietaryinformationbyemail,postalservice,anda 
commercialcarrier.
ExceptforthedissatisfactionoftheEntitledIndependent,theinitialpat-
ternsforAmbitiousLeadersareverysimilar.Infact,thebeginningof 
theAmbitiousLeadermodelismerelytheEntitledIndependentmodel 
withoutthe“organizationdenialofinsiderrequestand“insiderdissatis-
faction.”MostAmbitiousLeadersstoletheinformationthattheyworked 
on,justliketheEntitledIndependents.Thedifferenceisthattheywere 
notcontentonlytostealtheinformationtheyhadaccessto;theywanted 
theentiresystem,program,orproductline,andneededamorecomplex 
schemetogetit.
ThefttookplaceeventhoughIPagreementswereinplaceforalmosthalf 
(48%)oftheAmbitiousLeadercases.Inatleastonecase,theinsiderlied 
whenspecificallyaskedifhehadreturnedallproprietaryinformationand 
softwaretothecompanyasstipulatedintheIPagreementhehadsigned. 
Helaterusedthestolensoftwaretodevelopandmarketacompetingprod-
uctinaforeigncountry.
Insider Planning of Theft
TheAmbitiousLeadercasesinvolvedasignificantlygreateramountof
planningthantheEntitledIndependentcases,particularlythe  recruitment
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
80
ofotherinsiders.Otherformsofplanninginvolvedcreatinganew
businessinalmosthalfofthecases,coordinatingwithacompetingorga-
nizationinalmosthalfofthecases,andcollectinginformationinadvance
ofthetheft.
ThisaspectoftheinsiderbehaviorisreflectedinFigure3-6,whichdescribes 
theAmbitiousLeaderformulatingplanstostealtheinformationpriorto 
theactualtheft.Thisextensiveplanningisanadditionalpotentialpoint 
ofexposureoftheimpendingtheft,andthereforeresultsinmeasuresby 
theinsidertohidehisactions.InmostoftheAmbitiousLeadercases,the 
insiderwasplanningthetheftamonthormorebeforehisdeparturefrom 
theorganization.
Theone-monthwindowsurroundingresignationholdsformost  Ambitious 
LeadersjustasitdoesforEntitledIndependents.
Increasing Access
InmorethanhalfoftheAmbitiousLeadercases,theleadinsiderhad 
authorizationforonlypartoftheinformationtargetedandhadtotakesteps 
togainadditionalaccess.Inonecaseinvolvingthetransferofproprietary 
documentstoaforeigncompany,theleadinsideraskedhersupervisorto 
assignhertoaspecialprojectthatwouldincreaseheraccesstohighlysen-
sitiveinformation.Shedidthisjustweekspriortoleavingthecountrywith 
acompanylaptopandnumerouscompanydocuments,bothphysicaland 
electronic.
Figure 3-6 TheftplanningbyAmbitiousLeader
Information
Stolen
Extent of
Planning to
Steal
Insider’s
Concern Over
Being Caught
Opportunity
to Detect
Theft
Insider’s Desire
to Steal
ptg7481383
TheAmbitiousLeader 81
AsshowninFigure3-7,therecruitmentofadditionalinsidersisthe  primary 
meansAmbitiousLeadersusetogainaccesstomoreinformation.Theneed 
forrecruitmentincreasestheamountofplanningactivity  necessarytocoor-
dinateinsideractivities.
Organization’s Discovery of Theft
Therearemanymoreavenuesforyoutodetectheightenedriskofinsider 
theftofIPinAmbitiousLeadercasesthaninEntitledIndependentcases. 
EntitledIndependentsareoftenfullyauthorizedtoaccesstheinformation 
theysteal,anddosoveryclosetoresignationwithverylittleplanning. 
Inaddition,EntitledIndependentsrarelyactasifwhattheyaredoingis 
wrong,probablybecausetheyfeelaproprietaryattachmenttotheinforma-
tionorproduct.AmbitiousLeaders,ontheotherhand,oftenhavetogain 
accesstoinformationforwhichtheyarenotauthorized.Thisinvolves,in 
part,coordinatingtheactivitiesofotherinsidersandcommittingdeception 
tocoveruptheextensiveplanningrequired.
WhatCanYou Do?
Figure3-8illustratestheavenuesavailableforyoutocontinuallyassessthe 
riskyoufaceregardingtheftofIP.Becausedeceptionissuchaprominent 
factorinAmbitiousLeadercases,itsdiscoverymaybeabettermeansto 
detectheightenedinsiderriskherethaninEntitledIndependentcases.
Figure 3-7 IncreasingaccessbytheAmbitiousLeader
Information
Stolen
Recruitment
of Other
Insiders
Increasing
Access to
Information
Opportunity
to Detect
Theft
Insider’s Desire
to Steal
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
82
Insomeofthecaseswereviewed,theorganizationonlyfoundoutabout 
thetheftwhentheinsidertookhiscompetingproducttomarketorsolicited 
businessfromhispreviousemployer’scustomers.Whilethisdetectionis 
laterthanonewouldprefer,itisstillnottoolatetotakeactionandprevent 
furtherlosses.However,westronglysuggestthatyouconsiderthecoun-
termeasuresattheendofthischaptertofacilitateearlierdetection.Manyof 
theincidentsinourdatabaseweredetectedbynontechnicalmeans,suchas 
thefollowing:
Notificationbyacustomerorotherinformant
Detectionbylawenforcementinvestigatingthereportsofthetheft
Byvictims
Reportingofsuspiciousactivitybycoworkers
Suddenemergenceofnewcompetingorganizations
YoucanusetechnicalmonitoringsystemstodetectinsidertheftofIP.
Morethanone-halfoftheEntitledIndependentsandalmosttwo-thirds
oftheAmbitiousLeadersstoleinformationwithinonemonthofresig-
nation.Manyoftheseinvolvedlargedownloadsofinformationoutside
thepatternsofnormalbehaviorbythoseemployees.Inmorethanone-
quarteroftheAmbitiousLeadercases,aninsideremailedorotherwise
electronicallytransmittedinformationorplansfromanorganizational
computer.
Keepingtrackofbackupsofcriticalinformationisalsoimportant—inone 
caseaninsidertookthebackupmediafromhiscomputeronhislastdayof 
work.Understandingthepotentialrelevanceofthesetypesofprecursors 
Figure 3-8 OrganizationsdiscoveryoftheftofIPinAmbitiousLeadercases
Information
Stolen
Increasing
Access to
Information
Extent of
Planning to
Steal
Perpetrated
Deceptions
Insider’s
Concern Over
Being Caught
Opportunity
to Detect
Theft
Level of Technical
and Behavioral
Monitoring
Organization’s
Discovery of Theft
ptg7481383
TheftofIPinsidetheUnitedStatesInvolvingForeignGovernmentsorOrganizations 83
providesawindowofopportunityforyoutodetecttheftpriortoemployee 
termination.
Ofcourse,theearlieryoucanbecomeawareofillicitplansthebetter.Early 
awarenessdependsonbehavioralaswellastechnicalmonitoringandis 
morelikelytocatchincidentsinvolvingAmbitiousLeadersthanEntitled 
Independents.InAmbitiousLeaderscenarios,youneedtolookforevolv-
ingplansandcollusionbyinsiderstostealinformation,includingattempts 
togainaccesstoinformationoverandabovethatforwhichanemployeeis 
authorized.Therewerebehavioralortechnicalprecursorstothecrimein 
alloftheAmbitiousLeadercases.
Oneinsider,overaperiodofseveralyears,exhibitedsuspiciouspatterns 
offoreigntravelandremoteaccesstoorganizationalsystemswhileclaim-
ingmedicalsickleave.Itisnotalwaysthisblatant,butsignsareoften 
observableifyouarevigilant.
Theft of IP inside the United States Involving Foreign
Governments or Organizations
Thissectionfocusesoncasesofmaliciousinsiderswhomisuseda 
company’ssystems,data,ornetworktostealintellectualpropertyfroman 
organizationinsidetheUnitedStatesforthebenefitofaforeignentity—
eitheranexistingforeignorganizationoranewcompanythattheinsiders 
establishedinaforeigncountry.13Thesecasesfittheproblemdescribedin 
theAnnual Report to Congress on Foreign Economic Collection and Industrial
Espionage, FY07preparedbytheOfficeoftheNationalCounterintelligence 
Executive.
TheUnitedStatesremainstheprimetargetforforeigneconomiccollec-
tionandindustrialespionageasaresultofitsworldwidetechnological 
andbusinessleadership.Indeed,strongUSinternationalcompetitiveness 
underliesthecontinuingdrivebyforeigncollectorstotargetUSinforma-
tionandtechnology.14
13.  Materialinthissectionincludesportionsfromapreviouslypublishedwork.Specifically,ajoint 
CyLabandCERTProgramarticlewaspublishedas“SpotlightOn:InsiderTheftofIntellectualProperty 
insidetheU.S.InvolvingForeignGovernmentsorOrganizations”byDerrickSpooner,DawnCappelli, 
AndrewMoore,andRandyTrzeciak[Spooner2008].
14.  Seewww.ncix.gov/publications/reports/fecie_all/fecie_2007/FECIE_2007.pdf.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
84
ThesecasesalsoincludeactivitiesdefinedbytheOfficeoftheNational 
CounterintelligenceExecutiveaseconomicespionageorindustrial 
espionage.
Economic Espionage—the conscious and willful misappropriation of trade
secrets with the knowledge or intent that the offense will benefit a foreign govern-
ment, foreign instrumentality, or foreign agent.15
Industrial Espionage—the conscious and willful misappropriation of trade
secrets related to, or included in, a product that is produced for, or placed in, inter-
state or foreign commerce to the economic benefit of anyone other than the owner,
with the knowledge or intent that the offense will injure the owner of that trade
secret.16
CasesthatinvolveforeignbeneficiariescandifferfromothertheftofIP
casesbecausetheinsidersmayhaveasenseofdutyorloyaltytotheir
countriesoforiginthatoverridesanyloyaltytotheiremployer.More-
over,someofthesecasessuggestthatsomeforeignentitiesappeartobe
interestedinrecruitinginsiderstostealIPtoadvancebusinessesinthat
particularcountry.Competingloyalties,coupledwithrecruitmentof
employeesinU.S.businessesbyforeignnationsororganizations,make
thistypeofcrimeapotentthreatfororganizationsthatrelyonIPforcom-
petitiveadvantage.
Thereareseveralreasonsforheightenedconcernaboutthiskindofcrime.
TheimpactofacrimethatextendsoutsidethejurisdictionofU.S.law
enforcementonanorganizationcanbesubstantiallygreaterthanacase
thatremainswithinU.S.jurisdiction.InsiderswholeavetheUnitedStates
maybedifficultorimpossibletolocateandarrest.Andeveniftheinsider
werelocatedandarrested,extraditiontotheUnitedStateswouldbe
required.Therefore,therecanbemoreriskfromanemployeewhointends
toleavetheUnitedStatesfollowingthetheftthanfromemployeescon-
templatingcriminalactsagainsttheiremployerwhoremainintheUnited
States.
15.  Ibid.
16.  Ibid.
NOTE
We have not included any cases of national security espionage in
this book.
ptg7481383
TheftofIPinsidetheUnitedStatesInvolvingForeignGovernmentsorOrganizations 85
Inaddition,itcanbeverydifficulttorecoverstolenIPonceitleavesthe 
UnitedStates.IncaseswithinU.S.borders,companiesthatreceivethesto-
lenIPcansuffersimilarconsequencesunderthesamelawsastheinsiders 
iftheyusethestolenIPfortheirownadvantage.Thus,domesticorganiza-
tionsareundergreaterobligationtocooperatewithauthoritiesandreturn
allstolenIPthanforeignorganizationsmightbe.
Who They Are
Themajorityoftheinsidersworkedaseitherascientistoranengineer. 
Malescommittedmostoftheincidents.Ofthecasesthatidentifycitizen-
ship,abouthalfwereforeignnationals,about40%werenaturalizedU.S. 
citizens,twowereU.S.citizens,andtherestwereresidentaliensorhad 
dualcitizenship.
Theinsiders’countriesoforigin,forcasesinwhichtheinformationwas 
available,areshowninTable3-1.
Aboutone-fourthofthecasesinvolvedatleastoneaccomplicewhowas 
alsoaninsider.Someofthoseinvolvedmultipleinsiders;onecaseinvolved 
14insidersinall!Almost40%hadatleastoneexternalaccomplice.
Table 3-1 CountriesofOrigin(WhenKnown)
Country Number of Cases
China 13
United States 2
Taiwan 2
Canada (naturalized citizen from China) 2
South Korea 1
Germany 1
Russia 1
Iran 1
Ecuador 1
India 1
Dual citizenship, China and United States 1
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
86
Notethatwhenmultipleinsidersareinvolvedinacaseweonlycodeitas 
asinglecase,andcodedetailsfortheprimaryinsider.Additionalinforma-
tionaboutconspiratorsisalsocodedforthecase.Ifyouareinterestedin 
adetaileddescriptionoftheinformationcodedforeachcase,pleasesee 
AppendixD,InsiderThreatDatabaseStructure.
What They Stole
Alloftheseinsidersstoleintellectualpropertyindigitalform,physical 
form,orboth.Themethodsusedwereconsistentwiththosedescribedelse-
whereinthischapter.
Table3-2containsthedetailsknownforthesecases.Damageamountsare 
suppliedwhentheywereavailable.Weonlyusedthetermtrade secrets
whenthattermwasusedinthecasefile;otherwise,weusedthedescrip-
tionsuppliedinthecasefile.
Table 3-2 BreakdownofCases17
Sector
Number
of Cases Damages17 What Was Stolen
Information and
telecommunications
11 1 case,
$1 billion
1 case,
$600 million
Trade secrets
(4 cases)
Source code
(3 cases)
1 case,
$1 million
1 case,
$100,000
1 case, $5,000
6 cases,
Unknown
Confiden-
tial product
information
(3 cases)
Confidential
manufacturing
information (1 case)
Proprietary
documents and
source code
(1 case)
17.  Inthemajorityofthecases,damagesreportedwereintheformofpotentiallosstotheorganization 
asreportedincourtdocuments.
ptg7481383
TheftofIPinsidetheUnitedStatesInvolvingForeignGovernmentsorOrganizations 87
Chemical indus-
try and hazardous
materials
7 1 case,
$400 million
1 case,
$100 million
1 case,
$50 million to
$60 million
4 cases,
Unknown
Trade secrets
(5 cases)
Sensitive product
information
(1 case)
Confidential
documents
(1 case)
Manufacturing 3 1 case,
$40 million
1 case,
$32 million
Trade secrets
(2 cases)
Confidential
documents
(1 case)
Banking and finance 1 $5,000 Source code
Commercial facilities 1 Unknown Trade secrets
Defense industrial
base
1 Unknown Source code
Education 1 $3 million Patentable
proprietary
information
Energy 1 Unknown Sensitive software
Government– Federal 1 Unknown Government
restricted
information
Public health 1 $500 million Trade secrets
Water 1 $1 million Trade secrets and
source code
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
88
Why They Stole
Thespecificmotivesfallintoseveralcategories.
To fo rm a ne w c om pet in g b us ine ss :One-thirdoftheinsidersstolethe 
IPtoestablishanewbusinessventureinaforeigncountrythatwould 
competewiththeircurrentemployer.Inallofthesecases,theinsiders 
hadatleastoneaccomplicewhoassistedthemwiththeirtheft,with 
formingand/orrunningthenewbusiness,orwithboth.Allbutone 
oftheseinsidershadalreadystartedtheirbusinessbeforetheyleftthe 
victimorganization;infact,someofthemhadalreadyestablishedthe 
businessandhadmademoneyforquitesometime.
To t ake to a n ew e mpl oy er i n a c omp et ing bus in ess :Morethan40%of 
theseinsidersstoleIPtotaketotheirnewemployers,businesseslocated 
outsidetheUnitedStatesthatcompetedwiththeircurrentemployer.In 
allbuttwoofthesecases,theinsidershadalreadyacceptedjobswith 
thecompetitorsbeforeleavingthevictimorganization.
To t ak e t o t hei r ho me c oun try :Inthreeofthecases,thiswasthe 
somewhatvaguereasontheygavefortheirtheft.Inanothercase,the 
insiderstatedhewantedto“benefitthehomeland.”
To se ll to a co mpe ti tor :Intwocases,theinsiderstoletheinformationto 
selltoacompetitorinanothercountryoutsidetheUnitedStates.
Mitigationstrategiesforthesecasesarethesameasforanyothercasesof 
insidertheftofintellectualproperty,whichiscoveredinthenextsection.
Mitigation Strategies for All Theft of
Intellectual Property Cases
TheintentoftheMERITmodelsistoidentifythecommonpatternsofeach 
typeofinsiderthreatovertimebasedonouranalysisofthecasesinour 
database.Wehavefoundthatthemodelssuggestkeymitigationstrategies 
for you to defend yourself against these types of threats. We therefore pro-
posecountermeasuresbasedonexpertopinionsinbehavioralpsychology, 
organizationalmanagement,andinformationsecurity.
Yourinsiderthreatmitigationstrategiesshouldinvolvemorethantechnical 
controls.Anoverallsolutionshouldincludepolicies,businessprocesses, 
andtechnicalsolutionsthatareendorsedbyseniorleadershipinHR, 
ptg7481383
MitigationStrategiesforAllTheftofIntellectualPropertyCases89
legal,dataowners,physicalsecurity,informationsecurity/information 
technology,andotherrelevantareasoftheorganization.Itiscriticalthat 
alllevelsofmanagementrecognizeandacknowledgethethreatposedby 
theircurrentandformeremployees,contractors,andbusinesspartners, 
andtakeappropriatestepstomitigatetheassociatedrisk.Itmaynotbe 
realistictoexpectthatallintellectualpropertyexfiltratedbyinsiderswill 
bestoppedbeforetheinformationleavesyournetwork,butitisrealisticto 
expectthatyoucanimplementcountermeasuresintoyourinfrastructure 
and  businessprocessestoallowyoutodetectasmanyincidentsaspos-
sible,therebyminimizingthefinancialimpactonyourorganization.
Theremainderofthischapterdescribespotentialcountermeasuresthatwe
believecouldbeeffectiveinmitigatinginsidertheftofintellectualproperty.
Exfiltration Methods
Webeginthissectionbyprovidingmorein-depthdetailsofthe  technical 
methodsusedbyinsiderstostealIPinourdatabase.Methodsvaried 
widely,butthetopthreemethodsusedwereemailfromwork,remov-
ablemedia,andremotenetworkaccess.Table3-3describestheprimary 
methodsofexfiltration.
Table 3-3 ExltrationMethods
Exfiltration Method Description
Email Insiders exfiltrated information through their work
email account. The email may have been sent to a
personal email account or directly to a competitor or
foreign government or organization. Insiders used
email attachments or the body of the email to transmit
the sensitive information out of the network.
An overall solution should include policies, business processes, and tech-
nical solutions that are endorsed by senior leadership in HR, legal, data
owners, physical security, information security/information technology,
and other relevant areas of the organization.
Continues
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
90
Table 3-3 ExltrationMethods(Continued)
Exfiltration Method Description
Removable media Common removable media types were USB devices,
CDs, and removable hard drives.
Printed documents Insiders printed documents or screenshots of
sensitive information, and then physically removed
the hard copies from the organization.
Remote network
access
Insiders remotely accessed the network through a
virtual private network (VPN) or other remote channel
to download sensitive information from an off-site
location.
File transfer The insider was at work, on the company network, and
transferred a file outside of the network using the Web,
File Transfer Protocol (FTP),18 or other methods.
Although email could potentially fit this category, we
thought that email should be considered separately
due to the large number of crimes that used email.
Laptops Insiders exfiltrated data by downloading IP onto a
laptop at work and bringing it outside the workplace.
For example, one insider was developing an applica-
tion for his company on a laptop and later purposely
leaked the source code. In other cases the insiders
simply downloaded sensitive files onto their laptops
for personal or business use later.
Wedugalittledeeperintothosemethodstodeterminewhereour  mitigation
strategiesneedtobefocused—onthehost,thenetwork,orthephysi-
calremovalofinformation—andfoundthatmorethanhalfinvolvedthe
network,42%involvedthehost,andonly6%involvedphysicalremoval.
Network Data Exfiltration18
Dataexfiltrationoverthenetworkwasthemostcommonmethodof 
removinginformationfromanorganization,usedbymorethanhalfof 
18.  File Transfer Protocol (FTP):acommunicationstandardusedtotransferfilesfromonehostto 
anotheroveranetwork,suchastheInternet(Wikipedia).
ptg7481383
MitigationStrategiesforAllTheftofIntellectualPropertyCases91
theinsidersinthedatabasewhostoleIP.Removalmethodsincludedin 
thiscategorywereemail,aremotenetworkaccesschannel(originating 
externally),andnetworkfiletransfer(originatingoutsidethenetwork).
Aboutone-fourthoftheinsidersusedtheirworkemailaccounttosendthe 
IPoutsidethenetwork,eithersendingIPtotheirpersonalemailaccount, 
ordirectlyemailingtheIPtoacompetitororforeigngovernmentor 
organization.
Forexample,aninsiderinonecasesentcustomerlistsandsourcecodehe 
hadwrittenfromhisworkemailaccounttohispersonalemailaccount. 
Duringthistime,hewasbeingrecruitedbyacompetingorganization.He 
acceptedthecompetitor’sofferandtookthecustomerlistsandsourcecode 
tohisnewjobtohelphimgetaheadstartthere.
Inanothercase,aninsideraskedhissuperiorsforconfidentialdataabout 
theirproductcostsandmaterials.Twomonthslater,heacceptedanew 
jobwithacompetitor.Theoriginalemployerwarnedhimagainsttaking 
or  distributinganyofitsproprietaryinformation.However,theinsider 
emailedinternalbusinessinformationfromhisworkemailaccounttotwo 
ofhisnewsupervisorsbeforehestartedatthenewcompany.
Interestingly,almosthalfofthecasesinvolvingemailexfiltrationalso 
involvedanothertypeofexfiltration.Thissuggeststhatifyoususpectan 
insiderisstealinginformationyoushouldcheckothercommunication 
channelsforsimilaractivity.Mostfrequently,theadditionalexfiltration 
pathinvolvedstealinginformationonalaptop,butuseofremoteaccess 
channelsandtheftofprinteddocumentseachhappenedafewtimesin 
combinationwiththeftviaemail.
Thesecondmostfrequentnetworkexfiltrationmethodwasremotenetwork 
access.AsintheMERITmodel,manyofthesecasesoccurredimmediately 
beforeresignationorshortlyafteracceptanceofanewjobatacompetitor. 
Inmorethanone-thirdofthesecases,theremoteconnectionswereestab-
lishedafternormalworkhours;inalmostone-thirdofthecases,thetimeof 
exfiltrationwasunknown.
Duringtheremotesessions,insidersdownloadedsensitivedocuments 
totheirremotecomputers.Inonecase,aninsiderandacoworkerwere 
About one-fourth of the insiders used their work email account to send the
IP outside the network.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
92
employedascontractsoftwaredevelopersforthevictim  organization. 
Theircontractswereperiodicallyrenewedwhenmodificationstothe 
softwarewereneeded.Eachtimetheircontractsended,thevictim 
organizationneglectedtodisabletheirremoteaccesstothenetworksince 
the  organizationknewtheywouldbecontractedagaininthenearfuture. 
However,atonepointbothinsiderssuddenlyclaimedthattheprograms 
theydevelopedbelongedtothem,andrequestedthattheorganization 
cease using them. The company continued to use the applications, and the 
insiderandaccomplicewereabletoremotelyaccessanddownloadthe 
proprietarysourcecodetheyclaimedtoown.
Theleastcommonmethodofnetworkdataexfiltrationwastransferring 
dataoutsidethenetworkthroughoutboundchannelssuchasFTP,the 
Web,orinstantmessaging.Thesecrimeswereallperpetratedbymore 
technicallyskilledinsiders.Examplesincludethefollowing.
Acomputerprogrammerataninvestmentbankingorganization 
submittedhisletterofresignationtohismanager.Hethenusedascript 
thatcopied,compressed,andmergedfilescontainingsourcecode, 
andthenencrypted,renamed,anduploadedthefilesusingFTPtoan 
externalfilehostingserver.
Aninsidertransferredtradesecretsandsourcecodetoa 
password-protectedWebsiteusingstandardHTTP.Theinsider 
intendedtostartasidebusinesswiththecompany’sstolenIP.
Aninsiderwhofailedtoreceivearaiseandwhoserequestfortransfer 
wasrejectedsubmittedhisresignationanddownloadedproprietary 
informationfromhisorganizationforpotentialuseinanewjob.He 
usedFTPtotransferthedatatohishomecomputer.
WhatCanYou Do?
Mostcasesthatinvolveduseofthenetworktoperpetratethetheftinvolved 
emailandremoteaccessoverVPN.Giventhatseveralcasesinvolvedemail 
toadirectcompetitor,youshouldconsideratleasttracking,ifnotblocking, 
emailtoandfromcompetingorganizations.Ourcasesdidnotexplicitly 
showsophisticatedconcealmentmethods,suchasuseofproxies19or 
extensiveuseofpersonal,Web-basedemailservices.However,wedidfind 
thatinsidersperiodicallyleveragetheirpersonal,Web-basedemailasan 
19.  Proxies:Aproxyserver,morecommonlyknownasaproxy,isaserverthatroutesnetworktraffic 
throughitself,therebymaskingtheoriginsofthenetworktraffic.
ptg7481383
MitigationStrategiesforAllTheftofIntellectualPropertyCases93
exfiltrationmethod.Youshouldcarefullyconsiderthebalancebetween 
securityandpersonaluseofemailandWebservicesfromyournetwork.
Asmentioned,mostinsidersstealIPwithin30daysofleavingan 
organization.Youshouldconsideramoretargetedmonitoringstrategyfor 
employeesandcontractorswhentheygivenoticeoftheirexit.Forinstance, 
checkyouremaillogsforemailstheysenttocompetitorsor  foreign 
governmentsororganizations.Alsocheckforlargeemailattachmentsthey 
senttoGmail,Hotmail,andsimilaremailaccounts.
Further,youshouldconsiderinspectingavailablelogtrafficforanyindi-
catorsofsuspiciousaccess,largefiletransfers,suspiciousemailtraffic, 
after-hoursaccess,oruseofremovablemediabyresigningemployees. 
Centralloggingappliancesandevent correlation20enginesmayhelp 
craftautomatedqueriesthatreduceananalyst’sworkloadforroutinely
inspectingthisdata.
Host Data Exfiltration
Host-basedexfiltrationwasthesecondmostcommonmethodof  removing
IPfromorganizations;closetohalfofthecasesinvolvedaninsider 
removingdatafromahostcomputerandleavingtheorganizationwith 
it.Inthesecases,insidersoftenusedtheirlaptopstoremovedatafrom 
theorganization.Wehaddifficultydeterminingtheexactownership 
andauthorizationofthelaptopsused.However,wedoknowthatabout 
one-sixthoftheinsiderswhostoleIPusedlaptopstakenfromtheorganiza-
tion’ssiteduringnormalworkhours.Halfofthemtransferredproprietary 
softwareandsourcecode;theotherhalfremovedsensitivedocuments 
fromthe  organization.
Inonecase,theinsiderworkedforaconsultingcompanyandstole 
proprietarysoftwareprogramsfromacustomerbydownloadingthemto 
alaptop.Heattemptedtodisguisethetheftbydeletingreferencestothe 
victimorganizationcontainedintheprogram,andthenattemptedtosell 
portionsoftheprogramtoathirdpartyforalargesumofmoney.
Anothercaseinvolvedaninsiderwhoaccessedanddownloadedtrade 
secretstohislaptopafterheacceptedanofferfromaforeigncompetitor.He 
gavehisemployertwoweeks’notice,andcontinuedtosteal  information 
untilheleft.
20.  Event correlation:atechniqueformakingsenseofalargenumberofeventsandpinpointingthe 
feweventsthatarereallyimportantinthatmassofinformation(Wikipedia).
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
94
Byfar,themostcommonmethodofhost-basedexfiltrationinthedatabase 
wasremovablemedia;80%ofthesecasesinvolvedtradesecrets,andthe 
majority of those insiders took the stolen trade secrets to a competitor. The 
typeofremovablemediausedvaried.Whereinformationwasavailable, 
wedeterminedthatinsidersmostoftenusedwritableCDs.Thumbdrives 
andexternalharddiskswereusedinjust30%ofthecases.However,the 
typeofremovablemediausedhaschangedovertime.Insidersprimarily 
usedCDspriorto2005.Since2005,however,mostinsidersusingremov-
ablemediatostealIPusethumbdrivesandexternalharddrives.This 
trendindicatesthatchangesintechnologyareprovidingnewandeasier 
methodsofstealingdatafromhostcomputers.
Inonecase,aninsiderresignedfromhisorganizationafteracceptinga 
positionatanotherorganization.Hedownloadedpersonalfilesaswell 
astheorganization’sproprietaryinformationontoCDs.Despitesigninga 
nondisclosureagreement,theinsidertookthetradesecretstoacompetitor.
Inasimilarexample,aninsiderreceivedanofferfromacompetitorthree
months prior to resignation. He lied about his new position and employ-
mentstatustocoworkers.Onlydaysbeforeleavingtheorganization,he
convincedacoworkertodownloadhisfilestoanexternalharddrive,
supposedlytofreeupdiskspace.Hecameintoworkatunusualhours
todownloadadditionalproprietaryinformationontoaCD.Finally,
hetookthisinformationwithhimtohisnewpositionatacompeting
organization.
WhatCanYou Do?
Itisunlikelythatthevictimorganizationsinourdatabaseprohibited
removablemediaintheirdailycomputingenvironments.Youshould
considercarefullywhoinyourorganizationreallyneedstouseremov-
ablemedia.Perhapsaccesstoremovablemediaisaprivilegegranted
onlytousersincertainroles.Alongwiththatprivilegecouldcome
enhancedmonitoringofallfilescopiedontosuchdevices.Inaddition,
understandingwhorequiresremovablemediaandforwhatpurposescan
helpyoutodeterminewhatmayconstitutenormalandhealthybusiness
use,andtomonitorforusagepatternsthatdeviatefromthat.Inventory
control,asitpertainstoremovablemedia,mayalsobehelpful.Forexam-
ple,youcouldallowuseofremovablemediaonlyoncompany-owned
devicesprohibitedfromleavingyourfacility.Organizationsrequiring
thehighest-assuranceenvironmentshouldconsiderdisallowingremov-
ablemediacompletely,orallowingitonlyinspecialsituationsthatare
carefullyaudited.
ptg7481383
MitigationStrategiesforAllTheftofIntellectualPropertyCases95
Finally,recallthe30-daywindowinourtheftofIPcases.Canyoulogallfile 
transferstoremovablemedia?Youmightnothavetheresourcestoreview
allofthoselogs(dependingonhowrestrictedyouruseofsuchmediais). 
However,ifthelogsexist,youcanauditthemimmediatelyonthehosts 
accessedbyanyemployeewhohasannouncedhisresignation.Thiswould 
provideonequickmechanismfordetectingIPthatmightbeexfiltratedby 
anemployeeonhiswayoutthedoor.
Physical Exfiltration
Only 6% ofthe theft of IP casesinvolvedsome sortof physical  exfiltration. 
Wefoundthatphysicalexfiltrationusuallyoccursinconjunctionwith 
someotherformofexfiltrationthatwouldhaveproducedamoreobvious 
networkorhost-basedobservableevent.
Exfiltration of Specific Types of IP
OncewedeterminedwhatkindsofIPwerestolenandhow,wedetermined 
whatmethodsofexfiltrationwereassociatedwiththedifferenttypesofIP. 
Severalinterestingfindingssurfaced.Inparticular,businessplanswere 
stolenalmostexclusivelythroughnetworkmethods,particularlyusing 
remoteaccess.Conversely,proprietarysoftwareandsourcecodeinvolvea 
muchhigheruseofnon-networkmethods.Thismaybedueinparttothe 
volumeofdataassociatedwithdifferentassettypes.Softwareandsource 
codefilesareoftenlarge,butbusinessplansareusuallysmallerdocuments 
thatareeasiertomoveoveraVPNorasanemailattachment.  Enumerating 
themostfrequentmethodsbywhichparticularassetsareexfiltratedmay 
helpsteermonitoringstrategieswithrespecttocomputersthathousepar-
ticulartypesofassetsorareallowedtoaccessgivenassetsoverthe  network.
Concealment
SomeinsidersattemptedtoconcealtheirtheftofIPthroughvarious 
actions.Thesecasessignifyaclearintenttooperatecovertly,implying 
theinsidersmayhaveknowntheiractionswerewrong.Inonecase,an 
insiderwasarrestedbyfederalauthoritiesafterstealingproductdesign 
documentsandtransferringthemtoaforeigncompanywherehewastobe 
employed.Afterbeingarrested,heaskedafriendtologintohispersonal 
emailaccount,whichwasusedintheexfiltration,anddeletehundredsof 
emailsrelatedtotheincident.
Anothercaseinvolvedaninsiderwhousedanencryptionsuitetomaskthe 
datahehadstolenwhenmovingitoffthenetwork.
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
96
Tru st ed B usin ess P artn ers
Trustedbusinesspartnersaccountedforonly16%ofourtheftofIPcases, 
butthisisstillacomplicatedinsiderthreatthatyouneedtoconsiderin 
yourcontractingvehiclesandtechnicalsecuritystrategies.
Forexample,atelecommunicationscompanywasinvolvedinalawsuit,
andhadtohandoverallofitsapplicableproprietaryinformationtoits
attorneys,whichitdidinhard-copyform.Thelawfirmsubcontracted
withadocumentimagingcompanytomakecopiesofalloftheinforma-
tion.Oneoftheemployeesofthedocumentimagingcompanyaskedhis
nephew, a student, if he would like to make a little extra spending money
byhelpinghimmakethecopiesatthelawfirm.Thenephewrealizedthat
hehadaccesstoproprietaryaccesscontroltechnologythatthetelecom-
municationscompanyusedtorestrictitsservicesbasedonfeespaidby
eachindividualcustomer.Hefelt,likemanyothers,thatthecompany
unfairlyoverchargedfortheseservices,sohepostedtheinformation
onlinetotheInternetunderground.Thisbasicallyreleasedthetelecom-
municationscompany’s“secretsauce,”andnowitwaseasyformembers
ofthatcommunitytoobtainfreeservices.Whenthepostwasdiscovered,
lawenforcementinvestigatedthesourceofthepostandtracedtheactivity
backtothestudent.
Itisimportantthatyouconsiderthesetypesofthreatswhendrawing
upcontractswithyourbusinesspartners.Couldthatscenariohappen
toyou?Doyouwritelegallanguageintoyourcontractsthatdictates
howyourconfidentialandproprietaryinformationcanandcannotbe
handled?
Itisimportantthatyouunderstandthepoliciesandproceduresofyour 
trustedbusinesspartners.Youestablishpoliciesandproceduresinorder 
toprotectyourinformation.Whenyouenlistthesupportofatrustedbusi-
nesspartner,youshouldensurethattheirpoliciesandproceduresareat 
leastaseffectiveasyoursafeguards.Thisincludesphysicalsecurity,staff 
education,personnelbackgroundchecks,securityprocedures,  termination, 
andothersafeguards.
Inaddition,youshouldmonitorintellectualpropertytowhichaccessis 
provided.Whenyouestablishanagreementwithatrustedbusinesspart-
ner,youneedassurancethatIPyouprovideaccesstoisprotected.You
needtogetassurancesthataccesstoanddistributionofthisdatawillbe 
monitored.Youshouldverifythattherearemechanismsforloggingthe 
disseminationofdata,andreviewtheirproceduresforinvestigating 
possibledisclosureofyourinformation.
ptg7481383
MitigationStrategies:FinalThoughts 97
Thesearejustafewrecommendations.Wedetaileightrecommendations
inChapter9,ConclusionandMiscellaneousIssues,regardingtrusted 
businesspartners.
Mitigation Strategies: Final Thoughts
Wedevotedagooddealofthischaptertotechnicalcountermeasures. 
Figure3-9depictsorganizationalissuesofconcerninthetheftofintel-
lectualpropertycasesinourdatabase.Weaddressedthetechnicalissues 
intheprevioussection,buttherearenontechnicalissuesworthnotingas 
well.Forinstance,noticethatthemostprevalentissueofconcernisan 
employeewhowenttoworkforacompetitor.Therefore,youmightwant 
Figure 3-9 Issuesofconcern
Employee Went to Work for a
Competitor
Change of Employment Status
Foreign National/Non-U.S. Native
Employee/Coworker Susceptibility
to Recruitment
Unauthorized Data Download
to/from Home
Unauthorized Data Download to Media
Employee Sought Other Employment
Email/Chat with Competitors or
Conspirators
Planning with Competitor
Failure to Protect Critical Files
Employee Side Business
Unauthorized Data Exports—Unknown
Unauthorized Data Exports—Digital
Equipment/Media
Concealment of Current Illicit
Activity—Nontechnical
Concerning Behavior or Activity
40
35
30
25
20
15
10
5
0
ptg7481383
Chapter3. InsiderTheftofIntellectualProperty
98
tomonitoremailsgoingtoacompetitor.Weprovideacontrolfordoing 
thatinChapter7,TechnicalInsiderThreatControls.Also,notethe  second 
mostprevalentissueofconcern:changeinemploymentstatus,which 
wouldaccountfortheinsiderswhostoleinformationwithin30daysof 
resignation.Thethirdmostprevalentissueisforeignnational/non-U.S. 
native,whichwecoveredindepthinthesectionTheftofIPinsidethe 
UnitedStatesInvolvingForeignGovernmentsorOrganizationsearlierin 
thischapter.Thefourthissue,employee/coworkersusceptibilitytorecruit-
ment,appliesinalloftheAmbitiousLeadercases.
Onefinalthoughtregardingthe30-daywindow:Youshouldreviewyour
access-terminationproceduresassociatedwithemployeeandcontractorexit
procedures.Severalcasesprovidedevidencethatinsidersremotelyaccessed
systemsbyusingpreviouslyauthorizedaccountsthatwerenotdisabled
upontheemployee’sexit.Precautionsagainstthiskindofincidentseemtobe
commonsense,butthistrendcontinuestomanifestinnewlycatalogedcases.
Summary
Insiderswhostealintellectualpropertyareusuallyscientists,engineers, 
salespeople,orprogrammers.TheIPstolenincludestradesecrets,proprie-
taryinformationsuchasscientificformulas,engineeringdrawings,source 
code,andcustomerinformation.Theseinsiderstypicallystealinformation 
thattheyhaveaccessto,andhelpedtocreate.Theyrarelystealitforfinan-
cialgain,butrathertheytakeitwiththemastheyleavetheorganization 
totaketoanewjob,givetoaforeigngovernmentororganization,orstart 
theirownbusiness.
Theseinsiderthreatsfallintotwogroups.ThefirstistheEntitled 
Independent,aninsiderwhoactsalonetotaketheinformationwithhimas 
heleavestheorganization.ThesecondistheAmbitiousLeader,aninsider 
whocreatesa“ring”ofinsiderswhoworktogethertostealthe  information. 
AmbitiousLeaderswanttostealmorethanjusttheinformationthey 
created—theywanttheentireproductline,orwholesuiteofsourcecode, 
forexample.
NOTE
For more details of technical controls you can implement to prevent or
detect insider theft of IP, see Chapter 7, where we describe new technical
controls from our insider threat lab.
ptg7481383
Summary 99
AportionofthischapterwasdevotedtoinsiderswhostoleIPtotaketo 
aforeigngovernmentororganization.Thesecrimescanbeparticularly 
disastrous,sinceitismuchmoredifficulttorecovertheinformationonceit 
leavestheUnitedStates.Wedescribedthecountriesinvolved,thepositions 
oftheemployees,andthemethodsoftheft.
Themostusefulpatternwefoundinmodelingthesecrimeswasthatmost 
oftheinsidersstoleatleastsomeoftheinformationwithin30daysofres-
ignation.Thattimeframeactuallyencompassesa60-daywindow:30days 
beforeturningintheirresignation,and30daysafter.Ourmitigationstrate-
giesusethattimeframe;werecommendloggingofallpotentialexfiltration 
methods,especiallyemailsoffofthenetworkanduseofremovablemedia, 
sothatyoucanaudittheinformationwhenanemployeewhohasaccess 
toyourcriticalinformationresigns.Youneedtobeabletogobackwardin 
timewhensuchanemployeeresignstomakesurehehasnotemailedyour 
IPoutsidethenetwork—forexample,tocompetitors,togovernmentsor 
organizationsoutsidetheUnitedStates,ortoGmailorHotmailaccounts. 
Youalsoneedtobeabletoidentifyinformationthatwascopiedto 
removablemediaduringthattimeframe.Finally,youneedtodo  real-time
alertingwhensuchonlineactivitytakesplaceinthatperiodbetweenwhen 
theinsiderresignsandwhenhisemploymentactuallyterminates.
Thenextchapterturnstoinsiderfraud.Insiderfraudinvolvestheftas 
well,buttheftofadifferenttypeofinformation:PersonallyIdentifiable 
Information(PII),creditcardinformation,andotherdatathatcouldbe 
usedtocommitfraud.Italsoincludescrimesinwhichaninsidermodified 
informationforfinancialgain,oftenforpaybyoutsiders.
ptg7481383
This page intentionally left blank
ptg7481383
101
Chapter  4
InsiderFraud
Insider fraud: an insiders use of IT for the unauthorized modication,
addition, or deletion of an organization’s data (not programs or systems)
for personal gain, or the theft of information that leads to an identity crime
(identity theft, credit card fraud) [Weiland 2010].
Identity crime: the misuse of personal or financial identifiers in order to
gain something of value and/or facilitate some other criminal activity.1
Wehavetwoquestionsforyoutoconsider.First,doyouhandle  information 
thatcouldbeusedtocommitidentitytheftorcreditcardfraud?What 
wouldtherepercussionsbeifthatinformationwasstolen?Withcurrent 
databreachnotificationlaws,keepingthetheftasecretisprobablynotan 
option,whichmeanspublicexposureofthecrime.Howwillyourcustom-
ersfeelaboutyourorganizationifthathappens?Willlossoftheirtrust 
affectyourbottomline?
Secondquestion:Doyouhandleanyinformationthatsomeonemightwish 
tomodify,delete,oraddfraudulentinformationto?Thisinformationcan 
rangefromtheobviousfinancialdatatolessobviousinformationsuch 
asdriver’slicenses,criminalhistories,credithistories,utilitybills,food 
stamps,andsoon.Youneedtotakeaminutetoreallythinkaboutthis 
question.Itislikelythattheownerofawatercompanywouldnothave 
1.  ThisdefinitioncomesfromtheSecretServiceWebsite:www.secretservice.gov/criminal.shtml.
使用非法的信用卡(伪造卡、作
废卡)以及恶意透支等
ptg7481383
Chapter4. InsiderFraud
102
anticipatedthatthreeofhismeterreaderswouldcarryoutafraudscheme 
with17customersfor18monthsforatotalof$325,000.Butthat’sexactly 
whathappened.Takeaminutetothinkaboutyourinformationsystems 
andwhichonesmightprovideanattractivemeansofearningsomeextra 
cashtoyouremployees,contractors,orbusinesspartners.
Thosearethetypesofcrimeswewillexploreinthischapter.Recallfrom 
Chapter1,Overview,thatfraudcrimesarebyfarthemostprevalentin 
theCERTinsiderthreatdatabase.Thedatabreachlawscouldaccountfor 
thesignificantnumberofcases,becausevictimorganizationscannolonger 
handlethosetypesofcrimesquietly,internaltotheorganization.However, 
thefactremainsthatthesetypesofcrimesaredefinitelyoccurring,andnot 
onlyinthefinancialsectorasonemightinitiallyguess.
Inourinsiderfraudcases,theinsiderisnotnecessarilytheonewho
commitstheactualidentitycrime,buttheinsiderisoftenassociatedwith
others(possiblyoutsiders)whodocommitanidentitycrime.Infact,all
ofthecrimesintheCERTdatabasethatinvolvedorganizedcrimewere
insiderfraudcases.Inthischapterwedescribetheprofileofinsiderfraud
andpresentstrategiesformitigatingtheinsiderfraudcrimes.2Wedevote
asectionofthischapterspecificallytothecasesinvolvingorganized
crimebecausetheimpactsofthoseweresubstantial:Theaveragedam-
agesinthesecasesexceed$4million,withonecaseresultinginalmost
$50  millioninlosses.
2.  Materialinthischapterincludesportionsfroma2010CERT Research Annual Reportarticleoninsider 
fraudmodelingworkbyAndrewMoore,AdamCummings,andDerrickSpooner.Seewww.cert.org/
cert/information/researchers.html.
NOTE
By insider fraud we mean insiders who modify, add, or delete information
for their own advantage, and those who relay information to others, either
insiders or outsiders, who use it to commit fraud.
We devote a section of this chapter specically to the cases involving
organized crime because the impacts of those were substantial: The
average damages in these cases exceed $4 million.
ptg7481383
103InsiderFraud 
Wedecidedtoexcludetwotypesofinsiderfraudfromourstudies:
Casesofcorporatefraud,suchastheEnroncase,inwhichthefraudis 
pervasivethroughouttheorganizationandlargelyperpetratedforthe 
(near-term)benefitoftheorganization
Insidertrading3casesthatdonotinvolveITincarryingoutthecrime
Ourinsiderfraudcasesinvolveindividualsorgroupsofindividualsthat 
actintheinterestsofthatindividualorgroup,andcountertotheinterests 
ofthevictimorganization.
Fraudcasescanhavehugefinancialimpacts,asexemplifiedbythe 
followingcaseinwhichanorganizationlostnearly$20million.
Acustomerservicerepresentativeatacompanythatprocessedhealth
insuranceclaimsrealizedthathecouldtakeadvantageofthelackof
oversightortwo-personcontrolforcheckingclaimsenteredintothe
system.Heretrievedthenamesofmedicalcareproviderswhorarely
filedclaims,changedtheiraddresses,andthensubmittedfalseclaims
forthem.Thepaymentsforthoseclaimsweresenttothenewaddresses
hehadentered—thoseofhisassociatesinorganizedcrime.Overasix-
monthperiod,theschemedivertednearly$20millioninpayoutsto
fraudulentMedicareclaimsfromthecompanytotheinsiderandhis
accomplices.
Insiderfraudcanalsoleadtothecompromiseofsubstantialpersonalinfor-
mation,asinthefollowingcase,inwhichalmost60,000employeerecords
wereputupforsaleontheInternet.
Adatabaseadministratorataninsurancecompanywasresponsiblefora 
databasecontainingpersonalemployeeinformationforallofthecompa-
ny’semployeesacrosstheUnitedStates.Afterbecomingfrustratedover 
timebywhatheperceivedtobeunfairlylowpay,hecameupwithaplan 
thatenabledhimtogetrevengeagainsthisemployerandmakesomeextra 
moneyatthesametime.Hedownloadedpersonalemployeeinformation 
fromthedatabasetoremovablemedia,resultinginthecompromiseof 
60,000employeerecords.Then,followingadisputewithhisemployer,he 
quithisjob.
HesolicitedbidsfortheinformationovertheInternet.Heposted 
employeecreditcardnumbersinnewsgroupsdedicatedtocreditcard 
3.  FromWikipedia:“Insidertradingisthetradingofacorporation’sstockorothersecurities(e.g.,bonds
orstockoptions)byindividualswithpotentialaccesstonon-publicinformationaboutthe  company.”
这里的欺
诈应当排
除企业团
体欺诈以
及不借助
IT系统的
内部交易
案例;
ptg7481383
Chapter4. InsiderFraud
104
fraud,andencouragedthemalicioususeofthosecreditcardsaswellas 
othersopenedinthenamesofthevictimemployees.Hecontinuedto 
carryouthisfraudulentactivityforatwo-yearperiodbeforeanunder-
coveragentposingasapotentialbuyeroftheinsider’sstoleninformation 
arrestedhim.
ItisimportanttonotethatthiscasewasoneofonlythreecasesintheCERT 
databaseinwhichtheinsiderstoleanentiredatabaseaspartofthefraud. 
Thiscasewasinthefinancialservicessector;theothertwocaseswerein 
thegovernmentsectorandthewaterutilitiessector.
Insiderfraudcanalsocompromisenationalsecurity—forinstance,by 
allowingunauthorizedindividualsaccesstotheUnitedStates.Thefol-
lowingcaseshowshowaninsidercompromisedtheprocessofgranting 
foreignnationalsaccesstotheUnitedStates.
Theinsidersupervisedemployeesprocessingasylumapplicationsforthe 
U.S.government.HefraudulentlyalteredU.S.immigrationasylumdeci-
sionsinreturnforpaymentsofuptoseveralthousanddollarspercase. 
Hewouldapproveanasylumdecisionhimselfandrequestthatoneofhis 
subordinatesapprovethedecision,oroverturnsomeoneelse’sdenialof 
anasylumapplication.Anoutsiderrecruitedtheforeignnationalswho 
wishedtoacquirepoliticalasylum.Toconcealhisactivity,theinsideroften 
usedhissubordinates’computersandcredentials.Severalforeignnation-
alseitheradmittedinanintervieworpleadedguiltyinacourtoflawto 
lyingontheirasylumapplicationsandbribingpublicofficialstoapprove 
theirapplications.Theinsiderreceived$50,000forgrantingpoliticalasy-
lumfor20to30foreignnationals.Thefraudwasdetectedbythedirector 
ofhisofficeandwasreportedtolawenforcement.Theinsiderwascon-
victedandsentencedto21monthsofimprisonment.
Clearlytheimpactsofinsiderfraudcanbewide-ranging—frompurely 
financialtopersonalprivacy,orevennationalsecurity.Thepreviouscase 
examplesarenotuniqueintheirimpact:Manyotherorganizationslost 
hugesumsinmoney,assets,andemployeesecurityandprivacy.
LikeinsidertheftofIP,insiderfraudisusuallycommittedbycurrent 
employeesengaginginthesametypesofonlineactivitiesthattheyper-
formaspartoftheirnormaljobs.Unfortunately,insteadofworkingtoward 
themissionoftheorganization,theyareworkingtobenefitthemselves. 
Mostengageinfraud-relatedactivitiesduringnormalworkhours,while 
on-site,usingtheirownauthorizedaccess.
UnlikecrimesofinsidertheftofIPandITsabotage,however,insiderfraud 
crimeswereoftenconductedbyinsidersinlower-levelpositionsinthe 
organization.Theseinsidersweregenerallynotprofessionalsandwerenot 
内部欺诈的危害从经济到个人隐私甚至到国
家安全;
与破坏与IP窃取不同,内部欺诈的实施者通常是低层的人
员,而非专家和技术人员。
ptg7481383
105InsiderFraud 
technicalinsiders.Abouthalfofthemwereonthelowerendofthepay 
scales,suchasentry-leveldataentryclerksoradministrativeassistants. 
Thismakessomeintuitivesensesincemanyoftheinsiderfraudcaseswere 
financiallymotivated,perpetratedbyindividualsinsomeleveloffinancial 
difficulty.
Insiderfraudcrimesalsohadthegreatestmixofperpetratorsofboth 
genders,withjustslightlymorefemaleperpetratorsthanmale.Thiscould 
beduetothegreatermixofpeopleinnontechnicalrolesinorganizations 
aswellaspeopleexperiencingfinancialdifficulties.WecheckedtheU.S. 
BureauofLaborStatisticsfor2010todeterminethebreakdownofthose 
typesofpositionsbetweenmenandwomen.
90.8%ofallpayrollandtimekeepingclerkswerewomen.
88%ofalltellerswerewomen.
75.9%ofallcourt,municipal,andlicenseclerkswerewomen.
66.6%ofallcustomerservicerepresentativeswerewomen.
80.5%ofalldataentrykeyerswerewomen.4
Aswiththeothertypesofcrimes,theagesrangequitebroadlyfrompeople 
intheirteenstothoseintheir70s.Again,wedonotbelievethat  demographic 
4.  ftp://ftp.bls.gov/pub/special.requests/lf/aat11.txt
Impacts of Insider IT Fraud
TheimpactsofinsiderITfraudattacksincludethefollowing:
Lossesofalmost$700millionhiddenfromafinancialorganizationfor 
fiveyears
Morethan$8millionworthofmilitaryequipmentlost
Driver’slicensesprovidedto195peopleunabletoobtainlegal 
licenses
Credithistoriesof178consumersmodifiedordeleted,resultingin 
morethan$4millioninhigh-riskloansthatotherwisewouldnot 
havebeengranted
Losstofraudof$335,000amongtenfinancialinstitutionsand 
25retailersinmultiplestates
Morethan$600,000infraudulentdisabilitypayments
Lossofmorethan$250,000byacitygovernmentthroughpayments 
tofakevendors
Almost$63,000infraudulentlotterywinningspaid
ptg7481383
Chapter4. InsiderFraud
106
characteristicsareallthatusefultoidentifylikely  perpetrators.Instead, 
werecommendfocusingongeneralpatternsofbehaviorthatcanprovide 
insightsintothenatureofthecrimeandhowtopreventit,oratleastdetect 
andrespondtothecrimetolimitdamage.
Atthetimethischapterwaswritten,theU.S.DepartmentofHomeland
Security(DHS)ScienceandTechnology(S&T)Directoratebroughttheorigi-
nalSecretService/CERTInsiderThreatStudyteambacktogethertostudy
insiderfraudinthefinancialsector.TheU.S.DepartmentoftheTreasuryalso
participatedinthestudytohelpustoconnectwiththefinancialsector.We
arestillinthecase-gatheringmode,anddonotyethaveanalysistoreport.
However,thischapterreportspreliminaryfindingsbasedonourearlier
fraudmodelingworksponsoredbyCyLab,updatedbasedonallofthefraud
casescurrentlyintheCERTdatabase.PleasekeepcheckingourWebsiteat
www.cert.org/insider_threatforourreportandfraudmodel.
General Patterns in Insider Fraud Crimes
Thestartingpointfordescribingpatternsofinsiderfraud,includingthe 
MERITfraudmodel,istheFraudTriangle,developedbythecriminolo-
gistDonaldCresseyintheearly1950s[Cressey1974].5TheFraudTriangle
evolvedthroughCressey’sinterviewswithimprisonedbankembezzlers. 
Hisobservationthatmanyoftheseformerlylaw-abidingcitizenshadwhat 
hetermeda“non-sharablefinancialproblem”ledtohisdevelopmentof 
theFraudTriangle.AsdepictedinFigure4-1,theFraudTriangleinvolves 
threedimensions:pressure,opportunity,andrationalization.Asthetheory 
goes,allthreeelementsmustbepresentinorderforfraudtooccur.
Pressureiswhatcausesapersontocommitfraud,oftenstemmingfrom 
asignificantfinancialneedorproblem.Thisproblemorneedcanarise 
duetoexternalpressuressuchasmedicalbills,addictionproblems, 
orevenjustexpensivetastes.Whilesomefraudiscommittedsimply 
outofgreed,Cressey’sobservationwasthattherewasoftenaneedto 
resolvetheprobleminsecret,thatis,itwas“non-sharable.”
5.  Atthetimewewerewritingthisbook,ourinsiderfraudcasefilesdidnothavesufficientdatato 
supportstrongconclusionsaboutthedynamicover-timenatureofthecrime,asisrequiredforour 
modelingefforts.Wethereforethoughtitwasevenmoreimportanttostartthemodelingeffortsoffin 
theexisting,fairlywell-establishedtheoryoftheFraudTriangle.Ourcurrentworkexpandsinsider 
fraudcasedataandwehopetovalidatethesefoundationsaswemoveforwardinrefiningtheMERIT 
insiderfraudmodel.
ptg7481383
GeneralPatternsinInsiderFraudCrimes 107
Opportunityistheperpetrator’sabilitytocommitfraud.Withinan 
organization,weaksecuritycontrolsandinadequateoversightbyman-
agementprovideopportunitiesforsomefraudsters.Organizations 
havemorecontrolovertheopportunitydimensionthantheothertwo 
dimensions.Organizationscanbuildprocesses,procedures,andcon-
trolsthatinhibitordeteranemployee’sabilitytocommitfraudand 
thateffectivelydetectitwhenitdoesoccur.
Rationalizationinvolvestheprocessofovercominganypersonalethical 
hesitationstocommitthefraud.Itinvolvesreconcilingthebadbehav-
iorwithcommonlyacceptednotionsofdecencyortrust.Rationalizing 
individualsmaybelievethat,duetoperceivedmistreatment,theorga-
nizationowesthemsomething,orthatcommittingthefraudistheonly 
waytosavetheirfamilyfromsuredevastation.Rationalizationmay 
includebeliefsthatthefraudsterismerely“borrowing”moneyuntil 
itcanbepaidback.Attheotherendofthespectrum,rationalization 
includesmisunderstandingabouttheseverityofthefraudulentactsor 
apathyabouttheirconsequences.
Figure 4-1 FraudTriangle
What causes a person to
commit fraud. Examples:
medical bills,
expensive tastes,
addiction problems, etc.
Personal reconciling behavior
(stealing) with commonly
accepted notions of decency and
trust. Examples: sacrifice for
loved one, only “borrowing,” it is
owed, does not care, etc.
Ability to commit fraud.
Created through weak internal
controls, poor management
oversight, use of one’s position
and authority, etc.
Rationalization
(Attitude)
Opportunity
(Ability)
Pressure
(Incentive)
ptg7481383
Chapter4. InsiderFraud
108
TheFraudTrianglehasgainedwidespreadsupport,mostprominently 
fromtheAmericanInstituteforCertifiedPublicAccountants[AICPA2002]. 
WeadoptedtheFraudTriangleasthebasisofourinitialefforttomodel 
theprimarypatternsofinsiderfraudbecausethepatternsinthecasesin 
theCERTdatabasesupportit.Figure4-2showsourinterpretationofthe 
FraudTriangleforinsiderthreat.Startinginthelowerleft,youcansee 
thatincentivesforinsiderfraudstemfromtheinsider’sfinancialproblems 
ortheneedtohelpfamilyandfriends,aswellasothersocialnetwork-
ingpressures.Financialproblemscanleadtogreaterdissatisfactionwith 
compensation.Thatdissatisfactionresultsinrationalizationofthecrime, 
feelingthattheorganizationowestheinsiderforpastmistreatment.Some 
insidersinourcasesrationalizedthattheiractionswereonlytemporary 
andtheywouldrepaytheorganizationlater.Anothercommonfeelingwas 
thattheinsiderwasataturningpointinhisorherlifeandhadnoother 
optionbuttocommitthecrime.
Opportunitytocommitthefraudislimitedbythefraudpreventioncon-
trolsimplementedbytheorganization.
ThefollowingsectionsfurtherexplainthethreeaspectsoftheFraud 
TrianglebasedonobservationsfromfraudcasesintheCERTdatabase.
Origins of Fraud
Theprimarymotivationforinsiderfraudisfinancialgain.Insiders 
stoleinformationtosellit;modifieddatatoachievefinancialbenefits 
for  themselves,friends,orfamily;orwerepaidbyoutsiderstomodify 
Figure 4-2 InsiderFraudTriangle
Social Networking
Pressures Insider’s Feeling
that Organization
Owes Him
Insider’s Feeling
of Having No
Other Option
Insider’s Intent to
Make Things
Right Eventually
Fraud Prevention
Controls
Implemented
Need to Help
Family/Friends
Insider’s Incentive
(Pressures) to
Commit Fraud
Insider’s Opportunity
to Commit Fraud
Insider’s
Financial
Problems
Insider’s Rationalization of
(Attitude Toward) Fraud
Insider’s
Dissatisfaction with
Compensation
内部欺诈的主要原因是经济利
益,偷信息卖钱、修改数据达到
自身经济利益、或受雇于外部修
改数据;
ptg7481383
GeneralPatternsinInsiderFraudCrimes 109
information.Someinsidersweremotivatedtoprovideadditionalincome 
fortheirrelatives,andafewinsidershadlargecreditcarddebtsordrug-
relatedfinancialdifficulties.
Themostcommonandstraightforwardmeansusedbyinsiderswas 
stealinginformationtowhichtheyhadaccess.Mosttheftswerenotvery 
sophisticated.Remember,thesearelargelynottechnical,andarenotcom-
mittedbyhighlyeducatedindividuals.
Someofthemdiduseelectronicmeanstoexfiltrateinformation,however.
Theydownloadedtheinformationtohome.
Theylookedituponlineanduseditimmediately.
Theycopiedittoremovablemedia.
Theytelephonedorfaxedtheinformation.
Theyemailedtheinformation.
Afewfraudcasesdidinvolvemoresophisticatedmethods.Oneinsider 
waspaidbyanoutsidertointentionallydouble-clickonanemailattach-
mentthatcontainedmaliciouscodeandasoftware keystroke logger.6The 
maliciouscodeperiodicallytransmittedcustomerinformationtoacompet-
itor.Anotherinsiderusedananonymous remailertomaskhisinvolvement 
inafraudscheme.Ananonymousremailerisaserverthatreceivesemail 
messagescontainingembeddedinstructionsonwheretoforwardthem. 
Theserverthenforwardsthemessageswhilealsomaskingtheiroriginat-
inglocation.
Someinsiderfraudcrimesinvolvedtheftofinformation,butotherinsiders 
modifiedinformation,oftenpaidforbyoutsiderswhostoodtobenefit.For 
example,aseriesofinsidercrimesintheCERTdatabasevictimizedcredit 
historyorganizations;dataentryclerksfiguredoutthattheycouldmake 
moneyby“improving”thecredithistoryofindividualstryingtoobtain 
loansforwhichtheydidnotqualify.
6.  Software keystroke logger:asoftware-basedmethodofrecordingkeystrokesenteredfroma 
keyboard.
NOTE
Fraud crimes involved theft and modication of information, often to solve
the insider’s financial problems.
ptg7481383
Chapter4. InsiderFraud
110
Mostmodificationcasesinvolvedchanginginformationinasystem,asinthe
previousexample.However,someinsidersaddedinformation—asincases
inwhichfakedriver’slicenseswerecreatedbyaddingfalseinformationtoan
applicationandgeneratingthecorrespondinglicense.Veryfewcasesinvolved
thedeletionofinformation,butsomeinvolvedacombinationofmethods.
Figure4-3showshowfinancialproblems,ontheleft-handsideofthe 
figure,provideincentivesfortheinsidertoconductfraudulentactivities. 
Thecrimeresultsinfinancialbenefit,whichhelpstoreducethefinancial 
problemsthatoriginallymotivatedthecrime.(ThedottedlineinFigure4-3 
indicatesthattheinsider’sfinancialproblemsarereduced.)
Continuing the Fraud
Amajordifferencebetweeninsiderfraudandtheothertypesofinsider 
crimesisthetimeframeoverwhichthecrimestypicallyoccur.Insiderfraud 
istypicallyalongandongoingcrime.InsiderITsabotageand,toalesser 
extent,theftofIParelargelybig-bangeventswheretheinsidercommits 
thecrimeandleavestheorganizationasfastashecan.Suchsmash-and-
grabeventsdonotworkaswelltoperpetratefraud,sinceinsiderstypically 
wanttosiphonofformodifyinformationslowlyandrepeatedlyforaslong 
aspossiblesoasnottobenoticed.Sincefinancialdifficultyisoftenthe 
motivatingfactor,losingorleavingone’sjobisnotanattractiveoption.
Figure 4-3 Originsoffraud
Insider’s Incentive
(Pressures) to
Commit Fraud Insider’s Rationalization of
(Attitude Toward) Fraud
Insider’s
Financial
Problems
Insider’s
Greed Insider’s
Activities
Related to
Fraud
Insider’s Financial
Benefit Due to
Fraud
Insider fraud is typically a long and ongoing crime.
ptg7481383
GeneralPatternsinInsiderFraudCrimes 111
Theaverageinsiderfraudcrimespannedaboutfifteenmonths,with
halfofthecrimeslastingfivemonthsormore.Morethanhalfoftheinci-
dentswereongoingwithfrequentperiodsofsignificantcompromise.
Oftheshort,quickcompromises,abouthalfendedbecausetheinsider
wascaughtquickly,andmostoftheothersendedbecausethecrimewas
committedastheemployeewasleavingtheorganization,orfollowing
termination.
Interestingly,manycrimesinvolvedthetheftormodificationofrelatively
smallpiecesofinformation—acreditcardnumber,SocialSecuritynum-
ber,orcredithistoryrecordincontrasttothemuchlargertheftstypical
inthetheftofIPcases.Eachsmallpieceofinformationbroughttheinsider
asmallfinancialbenefit,sotheinsiderwasmotivatedtokeepthefraud
goingaslongaspossibleandto“flyundertheradar”ofanyorganizational
scrutiny.
Often,theinsider’sfinancialproblemsareeventuallyresolved,butthe 
additionalincomeistoogoodtoresistandthefraudtakesonalifeofits 
own.Thisiswheretheinsider’sgreedcomesintoplayinFigure4-3.The 
financialbenefits,alongwiththeabilitytogetawaywiththecrime,result
inanemboldeningoftheinsiderandthedesiretokeepthingsgoing.
Outsider Facilitation
Manyoftheinsiderswhocommittedfraudcolludedeitherwithpeople 
externaltotheorganizationorwithotherinsiders.Somecasesinvolved 
collusionwithbothinsidersandoutsiders.Theycolludedwithatleastone 
outsiderinabout40%ofthecases.Outsidersactuallyrecruitedinsiders 
tohelpthemcommitfraudinaboutone-quarterofthecases.Arecurring
patterninvolvedoutsidersrecruitinganinsiderinalow-paying,nontech-
nicalpositionwhohadaccesstoPersonallyIdentifiableInformation(PII) 
orcustomerinformation.Theinsiderstoletheinformationandprovidedit 
totheoutsiderforpay;theoutsiderthenusedtheinformationtocommit 
thefraud.
Theright-handsideofFigure4-4depictstheoutsiderfacilitationofthe 
fraud,whichgivestheinsidertheopportunitytocommitthecrime.Most 
oftheinsidersdidnothavethecontactsorexpertiseneededtocommit 
NOTE
Outsiders facilitated many of the fraud crimes and recruited the insider to
commit the crime in about one-third of the cases.
ptg7481383
Chapter4. InsiderFraud
112
identitytheftorcreditcardfraud,ortocarryoutotherfraudschemeson 
theirown.However,theoutsiderswhoapproachedthemhadtheknowl-
edgeandability,andthereforewerecriticalinactuallycarryingoutthe 
fraudusingtheinformationprovidedormodifiedbytheinsider.Thebot-
tomofFigure4-4depictshowtheinsider’sactionsresultinfinancialbenefit 
fortheoutsider,whichencouragestheoutsidertopressuretheinsiderto 
continuestealingormodifyinginformation.
Thelooparoundtheoutsideofthefigureillustrateshowthegrowthof 
thefraudbusinesswilllikelyresultintheoutsiderspressuringtheinsider 
toincreasetheirparticipationbystealingormodifyingmoreandmore 
information.Whiletherearelimitstogrowthofthefraudbusiness,we 
oftensawaperiodofescalationoffraudactivitiesinthecasesintheCERT 
database.Anotherincentivefortheinsidertocontinuecouldalsocome 
fromthethreatthattheoutsidercouldturntheinsiderinifheorshedoes 
notparticipatefully.
Identity crimes are the most prevalent type of fraud in the CERT database; 
inourcasestherewasnoshortageofoutsidersexperiencedincommitting 
Figure 4-4 Outsiderfacilitationofinsiderfraud
Outsider’s Pressure on
Insider to Begin or
Continue Fraud
Insider’s Incentive
(Pressures) to
Commit Fraud
Insider’s Opportunity
to Commit Fraud
Insider’s Rationalization of
(Attitude Toward) Fraud
Outsider’s
Facilitation
of Fraud
Insider’s
Activities
Related to
Fraud
Extent of
Fraud
Committed
Outsider’s Financial
Benefit Due to
Fraud
ptg7481383
GeneralPatternsinInsiderFraudCrimes 113
thattypeofcrime.Outsidersrecruitedinsiderstostealinformationmore 
oftenthantomodifyit,probablybecausecommittingidentitytheftismuch 
easierthancomingupwithaschemeformodifyinganorganization’sinfor-
mationtotheiradvantage.Asyouwillseeinthenextsection,notonlywas 
modificationtocommitfraudmorelikelytheinsider’sidea,butinsiders 
oftenrecruitedothercoworkerstohelp.
Recruiting Other Insiders into the Scheme
Insidersrecruitedotherinsiders,oftencoworkers,inaboutone-fifthof
ourcasesofinsiderfraud.Thepercentageishigherininsiderfraudcrimes
inwhichinformationwasmodifiedaspartofthecrimethanthetheft
cases.Thismakessenseforthefollowingreason.Modificationofinfor-
mationisamoredetectableactthantheft,atleastfromatechnicalpoint
ofview.Rememberthatinsiderswhocommittedfraudthroughtheft
stolesmallpiecesofinformationsuchascreditcardnumbersorSocial
Securitynumbers.Thistypeoftheftmayinvolvesomethingassimple
asopeningascreenandmanuallycopyingthenumbersdown.Weeven
hadcaseswheretheinsiderjustrememberedtheinformation,andtold
ittoanoutsidersothathecouldcommittheidentitycrime.Modifying
information,atleastonline,requirestechnicalactiontochangecomputer
data.Thisactioniseasilyauditableandmoreeasilyobservable,especially
bycoworkersworkingwiththeinsiderusingthesamedataorinclose
physical  proximity.
Figure4-5depictstheinsider’srecruitmentofotheremployeesinto 
thefraudcrime.Asthefraudcrimegrows,theinsider’sperceivedrisk 
ofgettingcaughtalsogrows,dependingtosomeextentontheinsider’s 
knowledgeoftheorganization’sfraudcontrols.Therecruitmentisseenas 
awaytohelpconcealtheexpandedoperationsofthefraudcrime.Another 
reasonwe’veseenincasesforrecruitingotheremployeesissimplyto 
handletheexpandedworkloadofthecrime.Theinsiderrecruitmentin 
NOTE
Coworkers facilitated many of the insider fraud crimes, especially for
fraud involving modification of information.
Outsiders recruited insiders to steal information more often than to
modify it.
ptg7481383
Chapter4. InsiderFraud
114
thesecasesresultsinrealescalationofthefraudactivities.Finally,some 
insidersrecruitinsidehelptoovercomeseparationofdutiescontrols 
thatexistwithinorganizations.Often,actionsofmultipleemployeesare 
requiredtomakeanecessarychangetothedata.
Asthefraudinvolvesmoreandmorepeople,theoperationhasmore 
mouthstofeedandthepressuresontheinsidertocontinuethefraud 
schemegrowaccordingly.Hereagain,thecrimecantakeonalifeofits 
own,independent oftheinsider’sdesiretocontinue.Asshowninthetop-
leftportionofFigure4-5,theinsider’sperceivedriskofbeingcaught,based 
onhisperceivedlossandknowledgeofcontrol,maycausehimtowantto 
stopthefraudulentactivity—theincentivetocontinueisreduced(depicted 
bythedottedline).Severalinsiderstoldusthatthecrimefeltlikeadown-
wardspiral—itwasactuallyarelieftobecaught.Butbetweenthepressures 
provided byothercomplicitinsidersandthepressure from theoutsiderto 
Figure 4-5 Coworkerrecruitment
Insider’s Perceived
Risk of Getting
Caught
Insider’s Perceived
Loss if Caught
Insider’s
Knowledge of
Organization’s
Fraud Controls
Insider’s Incentive
(Pressures) to
Commit Fraud
Insider’s
Activities
Related to
Fraud
Insider Recruits
Other Employees
to Conceal Crime
ptg7481383
InsiderFraudInvolvingOrganizedCrime 115
continue(asshowninFigure4-4),theinsidersfounditextremelydifficult 
toextractthemselves.
Weincludeboththeperceivedriskofbeingcaughtandtheperceivedloss 
ifcaughtinthemodelsinceinsidersmayengageinfraudactivitieseither 
becausetheydonotbelievetheywillbecaughtorbecause,eveniftheyare 
caught,theydonotexpectsignificantrepercussions.Iftheorganizationhas 
ahistoryofsweepingsuchincidentsundertherug,thennomattertheir 
vigilanceregardingdetection,insidersmaybelievetheyhavelittletolose 
andalottogainbycommittingfraud.
Insider Stressors
Thelivesofinsiderswhocommittedfraudinourcaseswereoftenin
turmoil.Aswediscussedpreviously,insidersoftenhadseverefinancial
problems.Inaddition,insidershadotherpersonalissuessuchasafam-
ilymemberwithhealthproblems,substanceabuse,andphysicalthreats
byoutsiders.Whilethemotivationsforthecrimesappearedtolargely
comefromoutsidetheworkplace,someworkplaceissueswereevident.
Someinsidershaddisagreementsoverfinancialcompensationorwith
supervisors.Suchissuesattimesledtointensesituationsandwhatmight
bedeemedasahostileworkenvironment.Thethreatoflayoffswasalso
anissueinsomecases.Heretheinsidersmayhavewantedtomakeas
muchmoneyattheorganization’sexpenseaspossiblepriortobeing
terminated.
Insider Fraud Involving Organized Crime
TheFederalBureauofInvestigation(FBI)definesorganizedcrimeas  follows.
Anygrouphavingsomemannerofaformalizedstructureandwhose 
primaryobjectiveistoobtainmoneythroughillegalactivities.Suchgroups 
NOTE
Stressors both inside and outside the workplace were observable in
insider fraud cases.
ptg7481383
Chapter4. InsiderFraud
116
maintaintheirpositionthroughtheuseofactualorthreatenedviolence, 
corruptpublicofficials,graft,orextortion,andgenerallyhaveasignificant 
impactonthepeopleintheirlocales,region,orthecountryasawhole.7
The24insiderthreatcasesfacilitatedbyorganizedcrimeintheCERT 
databaseconstituteabout10%ofallofourfraudcases.Thesecasestypi-
callyinvolvemultipleinsidersand/oroutsiderscommittinglong-term 
fraud.Theaveragedamagesinthesecasesexceeded$4million,andone 
caseamountedtoalmost$50millioninlosses.Criminalenterprisesmask 
theirfraudbyinvolvingmultipleinsiderswhooftenworkindifferentparts 
oftheorganization.Theseinsidersknowhowtobypasscriticalprocesses 
andremainundetected.
Inseveralcases,managementwasinvolvedinthefraud.Theinsiders 
affiliatedwithorganizedcrimeeithersellinformationtothemforfurther 
exploitationoraredirectlyemployedbythemtoenablethefraud.
Snapshot of Malicious Insiders Involved with Organized Crime
Alloftheinsidersinvolvedwithorganizedcrimeinthe24casesattacked 
theorganizationforfinancialgain.Theinsiderswereusuallyemployedin 
lower-levelpositionsintheorganization,weremotivatedbyfinancialgain, 
andwereoftenrecruitedbyoutsiderstocommittheircrimes.Soundfamil-
iar?Althoughthesecrimesfitthepatternswehavealreadydescribedfor 
fraud,theimpactsseemtobeamplifiedbytheinvolvementoforganized 
crime.8
Thissectionwilldiscussthetwodifferenttypesofinsiderorganizedcrime 
activity.
Insiderswithtiestoexistingexternalorganizedcrimegroups.
Insiderswhoformorparticipateintheirowncriminalenterprises. 
Acriminalenterpriseisagroupofindividualswithanidentifiedhier-
archy,orcomparablestructure,engagedinsignificantcriminalactivity.9
Hereisasamplecaseinvolvingacriminalenterprise.
Fiveinsidersworkedforacreditreportingcompany.Eachofthem
wasalow-levelemployeewithjobresponsibilitiesofdataentryand
7.  www.fbi.gov/about-us/investigate/organizedcrime/glossary
8.  ThissectionincludesmaterialauthoredbyChristopherKingin“SpotlightOn:MaliciousInsiders 
andOrganizedCrimeActivity”publishedinSEI Technical Note CMU/SEI-2011-TN-025[King2011].
9.  www.fbi.gov/about-us/investigate/organizedcrime/glossary
ptg7481383
InsiderFraudInvolvingOrganizedCrime 117
modificationofcreditreports.Acarsalesmanbefriendedoneofthe
insiderswhileshoppingforacar,andfoundoutwhattheinsider’sjob
entailed.Heofferedtopaytheinsider$150percustomertochangecredit
reportsofindividualswhowishedtopurchaseacarbuthadinsufficient
credit.Theinsiderthenrecruitedhiscolleaguestoparticipateinthe
scheme.Eachweekthe  outsiderdroppedoffthenamesoftheindividu-
alsand  associatedpayments.Theorganizationhadabusinessprocess
inplacetoverifychangestocreditreports,buttwooftheemployees
involvedintheschemehadtheauthoritytooverridetheverification
process.Thefraudcontinuedformorethanayearuntilaroutineaudit
discoveredthe  discrepancy.
Hereisanexamplecaseofapersonaffiliatedwithorganizedcrime.
AtelleratalargeU.S.bankhandledcustomerinformationonadailybasis 
andprocessedchecksforcustomers.Heavilyindebt,theinsiderwas 
approachedbyindividualsintheMafiawhoofferedtopayhimtosteal 
customers’PII.Overthecourseofseveralyears,theinsidersoldPIIto 
theorganizedcrimegroup,whousedittocreatefraudulentchecks,open 
unauthorizedcreditcards,andcommitidentitytheft.Thetheftwascaught 
whenthebankbecamesuspiciousoftheexceptionallyhighrateoffraud 
occurringinoneofitslocalbranches.
Who They Are
Thissectionisbasedon20casesthatinvolvedacriminalenterpriseand 
fourcaseswithtiestoorganizedcrime.Themajorityoftheinsiderswere 
employedinnontechnicalpositions,althoughfourheldamanagement 
position.Thecrimesinvolvingmanagementwentonforalongerperiodof 
timeandthescaleofthecrimewasmuchlarger.Themajorityoftheinsid-
erswerefemale,whichisgreaterthanthebreakdownofallfraudcases 
intheCERTdatabase(roughly50%male/female).Finally,almostallcases 
involvedcollusionwithoutsiders.Incasesinvolvingexistingorganized 
crimegroupstheretendedtobefewerinsidersinvolved.
Inthecrimesinvolvingmanagement,theaveragelosswasveryhigh.One 
caseinvolvingamanagerataDepartmentofMotorVehicles(DMV)caused 
lossesof$250,000;anotherDMVcaseresultedina$1millionlossforthe 
organization.Themostdamagingcaseinvolvedaninsiderworkingfora 
citytaxoffice,whowasabletosteal$48millionoverthecourseofalmost 
twodecades.Theseinsiderswerelower-ormid-levelmanagerswithfew 
technicalskills.Theyusedtheirdeepknowledgeoftheorganization’spro-
cessesandsystemstobypassthechecksandbalancesinplaceandrecruited
theirsubordinatesintothecrime.
ptg7481383
Chapter4. InsiderFraud
118
Why They Strike
Theseinsidersheldlow-levelpositionsintheorganization,andcommitted 
thecrimesforfinancialgain.
What They Strike
Theseinsidersprimarilycopiedormodifieddataforfinancialgain.Crimes 
includedstealingcustomerinformationtosellforidentitytheft,modi-
fyingcreditreportstogivebuyersahighercreditscore,orcreatingfake 
credentials,suchasdriver’slicenses.Insidersprimarilymodifieddatain 
organizationdatabasesandbypassedintegritychecks.
How They Strike
Nearlythree-fourthsoftheattacksoccurredon-siteduringnormalwork 
hours.Forthemostpart,insidersusedtheirauthorizedaccesstocopy, 
modify,ordeletecriticaldatafromtheorganization’ssystems.
Technicalmethodsusedincludedthefollowing.
Socialengineeringtoobtaincredentialsorinformation
Theinsider,afterresigningfromalawenforcementagency,convinced 
colleaguestorunsearchesandgatherinformationoncompaniesto 
helphimandhisconspiratorsperforminsidertrading.
Authorizeduseoftheorganization’ssystems
Aninsiderusedhisaccesstocustomercreditreportstosellthedatato 
conspiratorswhowouldconductidentitytheft.
Bypassedsecureprocesses
Anorganizationrequiredtwoemployeestoissuetax-refundchecks, 
butbothinsidersintheprocesswerepartofthesamecriminalenter-
priseandwouldissuefraudulentcheckstotheirconspirators.
Compromisedaccount
Aninsiderworkingforacreditreportingagencyperformedmodifica-
tionsofcustomercreditinexchangeformoney.Theinsiderusedstolen 
passwordsofcoworkerstoconcealevidenceofthecrime.
Table4-1containssummaryinformationforalloftheinsiderfraudcasesin 
theCERTdatabasethatinvolvedorganizedcrime.
ptg7481383
InsiderFraudInvolvingOrganizedCrime 119
Table 4-1 SummaryofOrganizedCrimeCases
Case #
Total # of
Conspirators
# of
Insiders
# of
Outsiders Impact Insider-Led?
110 4 6 $48,115,451 Yes
294 1 93 $10,000,000 No
34 3 1 $6,775,434 Yes
43 1 2 $2,700,000 Ye s
514 13 1 $2,288,946 Unknown
610 1 9 $1,500,000 Unknown
77 2 5 $1,000,000 No
84 1 3 $841,164 Yes
910 5 5 $800,000 Yes
10 6 1 5 $638,000 No
11 6 2 4 $335,000 No
12 16 6 10 $287,500 Unknown
13 4 4 0 $250,000 Yes
14 6 1 5 $231,500 Yes
15 6 1 5 $157,000 Unknown
16 16 1 15 $77,300 No
17 6 2 4 $75,000 Yes
18 2 1 1 $10,000 No
19 8 2 6 Unknown No
20 4 2 2 Unknown No
21 9 5 4 Unknown Yes
22 11 1 10 Unknown No
23 Unknown 1 Unknown Unknown No
24 21 1 20 Unknown Unknown
ptg7481383
Chapter4. InsiderFraud
120
Organizational Issues of Concern and Potential
Countermeasures
Figure4-6depictsorganizationalissuesofconcerninthefraudcasesinthe 
CERTdatabase.
Thesuggestionsthatfollowapplytoidentifyingandmitigatingthefive 
mostprevalentareasofconcernfromthegraph,aswellassomeofthe 
otherissuesthatwererelevantinanumberofcases.
Inadequate Auditing of Critical and Irregular Processes
Inclosetohalfoftheinsiderfraudcases,insidersremainedundetectedfor 
longperiodsduetoinadequateauditingofcriticalorinfrequentbusiness 
processes.Inoneincident,maliciousinsiderswereabletomodifyrecords
attheDMVbecausetherewasnoauditinginplace.Inasecondincident,an 
insiderwasabletosubmitfalsecreditreportstothecreditbureausbecause 
Figure 4-6 Issuesofconcern
120
80
100
60
20
40
0
Inadequate Auditing of Critical
Processes
Employee / Coworker Susceptibility
to Recruitment
Verification of Modification
of Critical Data
Financial Problems
Excessive Access Privilege
Unauthorized Data Exports
Unauthorized Data Export—Paper
Insufficient Separation of Duties
Concerning Behavior or Activity
Inadequate Auditing of Irregular
Processes
Unexplained Wealth
Falsified or Omitted Information
Concealment of Current Illicit Activity–
Nontechnical
Compromised Passwords
Employee Susceptibility to
Social Engineering
Quality Control of Critical Data
Verification of Authorized
Access of Critical Data
Masquerading
Violation of Need to Know Policy
ptg7481383
OrganizationalIssuesofConcernandPotentialCountermeasures 121
shesocial-engineeredhermanagementintoleavingherdepartment’s 
activitiesoutoftheauditingprocess.Detailsofthosecasesfollow.
Inthefirstcase,alicensing-registrationexaminerataDMVconspired 
withnineotheraccomplicestosellfraudulentIDsanddriver’slicensesby 
modifyingarealcustomer’srecordwithapictureoftheirclient.Thiscrim-
inalenterpriseincludedfiveDMVemployeesandfiveoutsiders(three 
brokersandtworecruiters).Mostoftheirclientswereundocumented 
immigrantsdesperatefordriver’slicensesoridentitycards.Theinsid-
erswereemployeesthathadauthorizedaccessandoccupiedlower-level 
positionsintheorganization.TheDMV’scomputersystemwasdesigned 
tocross-checkSocialSecuritynumbers(SSNs)withtheSocialSecurity 
Administration,buttheemployeesfoundawaytobypassthatcheck.The 
insiderseitherusedbogusSSNsorstoleactualSSNsfromtheDMVsys-
temwithoutbeingflaggedbysecurity.Theringmade$800,000inillicit 
profitsfromsellingthefraudulentcredentials.
Inthesecondcase,aninsiderworkedforataxofficepreparingproperty 
taxrefundchecks.Shegeneratedtaxrefundcheckstoboguscompanies 
andthengavethecheckstoherniece.Herniecedepositedthechecksinto 
thebankaccountsofthefakecompaniesandthendistributedthefunds 
tovariousparticipantsinthefraudscheme.Sincetheinsiderplayeda 
roleindesigningherorganization’snewcomputersystem,sheconvinced 
managementthatherdepartmentshouldnotbeincludedintheaudit-
ingprocess.Shewasabletosteal$48millionoverthecourseofalmost 
twentyyears.
Bothofthesecasesinvolvednontechnicaloverridesofcriticalprocesses. 
Vulnerabilitiesincriticalprocessesshouldbeincludedinyourriskassess-
ment.Periodicauditsoftheworkproductsfromthesetypesofcritical 
processesshouldbeconductedtodetectabusesofthesystem.
Employee/Coworker Susceptibility to Recruitment
Manyinsiderfraudcasesinvolveoutsiders,sometimesfromorganized 
crime,whoapproachemployeesofthevictimorganizationsandofferto 
paytheminexchangeforsomeservice,oftentheunauthorizedmodifica-
tionofdata.Thefollowingincidentsareexamplesofhowanoutsiderwas 
successfullyabletorecruitaninsidertocommitacrime.
Inthefirstcase,theinsiderworkedataninsurancecompanyandbegan 
stealingPIIthatincludedbankinginformationforthecompany’scustom-
ers.Theinsiderthensoldthisinformationtoanoutsidecoconspirator 
whocreatedfraudulentchecksforvariousbanksusingthecustomers’PII. 
ptg7481383
Chapter4. InsiderFraud
122
Theinsiderandoutsiderthenhad“check-runners”cashthechecksat 
variousbanksposingaslegitimatecustomers,thusmakingfraudulent 
withdrawalsfromtheiraccounts.Theinsideralsopassedonthecus-
tomers’informationtoindividualswhocreatedfakeIDsandcounterfeit 
checksinthenamesofthebankcustomers.Multipleemployeesfromsev-
eraldifferentbankswererecruitedforthisscheme.
Inanothercase,aninsiderwasemployedasaservicerepresentativefor 
thevictimorganization.ShesoldpersonalinformationtotheNigerian 
Mafiatosupportidentitytheft.Afterseveralyears,shewasapproached 
byaNigerianmale,andgavehimherhomephonenumber.Theinsider, 
facingfinancialdifficulties,agreedtoprovidethemanwithpersonal 
informationfromhercompany’sSSNrecords.Theoutsiderpaidher 
$15–$20perSSNrecord. Afewmonthslater,severalmajorfinancialinsti-
tutionsreportedfraudulentlyissuedandauthenticatedcreditcards.The 
subsequentinvestigationledbacktotheinsider,whoconfessedtolaw 
enforcement,resignedfromherjob,andwassubsequentlyarraignedand 
pleadedguilty.Shewassentencedtotenmonthsinjailandtwoyearsof 
probation,andwasorderedtopay$10,000inrestitution.Theimpactof 
thisschemeisunknown,butseveralfinancialinstitutionshadtoreissue
creditcardsandimplementfraudmonitoringoncustomeraccounts.
Bothofthesecasesinvolvedrecruitmentbyoutsiders,whichcanbehard 
foryoutodetect,particularlyifitoccursoutsidetheworkplace.Youshould 
considerraisingawarenessinapplicablemanagersandemployeestothis 
potentialrecruitment.Youcouldletthemknowthattheyaresusceptibleto 
beingrecruitedtostealthesensitiveinformationtowhichtheyhaveaccess. 
Theyneedtounderstandthetypesofcrimesthatcouldbecommittedwith 
theinformationandthat,althoughtheywouldnotactuallycommitthe 
fraud,theevidenceinyoursystemlogswillpointdirectlytothem.Further-
more,theywillbeturnedovertolawenforcement.Providingexamples 
suchasthoseweprovideinthisbook,includingthesentencestheinsid-
ersreceived,mightbehelpfulinreinforcingthepotentialconsequencesof 
theseillicitactions.
Inaddition,youshouldencourageyouremployeestorecognizeandreport
suspicious contact in which an insider or outsider approaches them to join 
inafraudscheme.Employeeswhohaveanunderstandingofthepoten-
tialforrecruitmentbybothinsidersandoutsidersandtheconsequencesof 
committingsuchanactmaydecreaseyourriskandincreasereporting.
Yourtrainingshouldbebasedonyourpolicies,whichshouldincludea 
confidentialmeansofreportingsecurityissues.Confidentialreporting
allowsreportingofsuspiciouseventswithoutfearofrepercussions,thereby 
overcomingtheculturalbarrierofwhistle-blowing.Employeesneedto 
ptg7481383
OrganizationalIssuesofConcernandPotentialCountermeasures 123
understandthatyouhavepoliciesandprocedures,andthatmanagerswill 
respondtosecurityissuesinafairandpromptmanner.
Ver ifi cat io n o f Mo di fica ti on o f Cr it ica l Da ta
Inaboutone-thirdofthefraudcases,insiderswereabletocarryouttheir 
crimebecausetheorganizationdidnotreviewcriticaldatawhenitwas 
modified.Insidersusedauthorizedaccessandwereabletochangedata 
withoutoversight.Twosamplecasesfollow.
Inthefirstcase,theinsiderworkedataconsumercreditreportagency. 
Herdutywastomaintaintheinformationstoredintheconsumercredit 
database.Inexchangeformoneyfromoutsiders,sheinflatedthecredit 
scoresofconsumerstoenablethemtosecureloansfromthird-partycredit 
institutionsandlenders.Shealsorecruitedotherinsiderconspiratorswho 
helpedhertomodifyordeletecredit-historydatafor178consumersin 
returnforashareofthepayments.Thepurposewastostrengthenthecon-
sumers’creditworthiness;theimpactwasthatlendersissued$4.2million 
innewloanstotheseconsumers.
Inthesecondcase,sixcontractorspocketed$32,000infoodstampkick-
backsbyissuingfoodstampsto53peoplewhodidnotqualifyforthem, 
andincreasingmonthlyallotmentsforexistingcases.Forpayment,each 
recipientturnedoveranenvelopetotheinsidersfilledwithaportionof 
themonthlyfoodstampallotment.Theywereabletocarryouttheircrime 
byexploitingaweaknessinexceptionhandlinginthesystem:Ifthefood 
stamprequestwascodedasan“Expedited”case,thecaseworkercould 
openitwithoutasupervisor’sauthorization.
Auditingdatabasetransactionsmayhelptodetectunauthorizedaccess 
andmodificationofdata.Frequent,randomauditsofcriticaldatabase 
fieldsshouldverifytheinformationenteredsincethelastaudit.Butaudit-
ingdatachangesforalltablesinadatabaseisnotpracticalandmayin 
factdegradeperformance.Amonitoringstrategyforfraudshouldinclude 
monitoringaccessanddatamodificationsoncriticaltables,suchastables 
containingPIIand/orcustomerinformation.Ideallyamonitoringstrategy 
should include logging successful and unsuccessful data access and modi-
ficationattempts.
Additionally,automatedflaggingofmismatcheddatamaydetect 
impropermodificationsofthedatabases.Dataintegritychecksbuiltinto 
yourdatabasescouldbeusedaspreventivemeasures.Externalauditsof 
thesedatabasescanalsouncoverfraudthatmaybeconcealedbyaninter-
nalaudit.Finally,learnfromthepast.Inassessmentsandworkshops,we 
haveworkedwithorganizationsthathavebeenvictimizedmultipletimes 
ptg7481383
Chapter4. InsiderFraud
124
bythesametypeofinsiderfraud.Werecommendthatpartofyourinsider 
incident-managementprocessincludealessonslearnedstepinwhichyou 
examinetheillicitactivitiesusedbytheinsidertoconductthecrime,and 
putintoplaceautomatedscripts,triggers,andapplication-levelcontrolsto 
preventthesamethingfromhappeningagain.
Thesecondcaseexamplealsoinvolvedexploitinganotherissueofcon-
cernillustratedinFigure4-6:inadequateauditingofirregularprocesses. 
Theemployeesinthatcasewereabletocarryouttheirfraudulentactivi-
tiesusingan“Expedite”functioninthesystemthatenabledthemtoget 
aroundallofthenormalcontrolsbuiltintothefoodstampapplication. 
Youshouldcarefullyexamineyourapplicationsthatcouldbeusedfor 
fraud:Arethereany“exceptionhandling”functionsthatallowemployees 
tooverrideseparationofdutiesandothercontrols?Ifso,youshouldcon-
siderhavingthesystemgenerateanautomaticalertanytimethatfunction 
isused,andsomeoneshouldcarefullyauditthatparticulartransaction.
Financial Problems
Financialproblemswerethefourthmostprevalentissueofconcerninthe 
fraudcasesinourdatabase.Thefirststeptopreventthisareaofconcern 
istoperformbackgroundchecksonindividualsbeforehiringthem.Back-
groundchecksshouldinvestigatepreviouscriminalconvictions,include 
acreditcheck,verifycredentialsandpastemployment,andifpossible, 
includediscussionswithprioremployersregardingtheindividual’scom-
petenceandapproachtodealingwithworkplaceissues.Thisinformation 
shouldbeusedaspartofarisk-baseddecisionprocessindetermining 
whetheritisappropriatetogivethenewemployeeaccesstocritical,confi-
dential,orproprietaryinformationorsystems.
Backgroundchecksshouldberequiredforallpotentialemployees, 
includingcontractorsandsubcontractors.InonecaseintheCERTdata-
base,anorganizationemployedacontractor;thecontractor’scompany 
toldtheorganizationthatabackgroundcheckhadbeenperformedonhim. 
Thecontractorlatercompromisedtheorganization’ssystemsandobtained 
confidentialdataonmillionsofitscustomers.Duringtheinvestigation 
itwasdiscoveredthatthecontractorhadacriminalhistoryforillegally 
accessingprotectedcomputers.
Otherinsidersdevelopedfinancialproblemsafterbeinghired.TheCERT 
databaseincludessingleparentswhocouldn’tmakeendsmeet,insiders 
with“significantothers”withdrugproblemsorotherfinancialproblems, 
andsoon.Youmightconsiderofferingsometypeofemployee  assistance 
ptg7481383
OrganizationalIssuesofConcernandPotentialCountermeasures 125
programthatincludesfinancialcounseling,particularlyintimesof 
economicdownturn,ratherthanriskingthatyouremployeesandcontrac-
torswillturntocriminalmethodsforsolvingtheirfinancialproblems.
Excessive Access Privilege
Someinsidersaccumulatedexcessiveprivilegesthatenabledthemtocarry 
outtheircrime.Forexample,afewoftheinsiderstransferredtoadiffer-
entdepartmentinthesameorganization.Whentheytransferred,they 
retainedtheiroldroleswithinanapplication,butalsoobtainednewroles.
Thisgavethemmultipleroleswithinthesameapplication,enablingthem 
tobothenterandapproveofdatamodifications—anoversighttheyusedto 
conductalonefraudscheme.Itisimportantthatyoucarefullycontroland 
auditrolesforsystemsthatuserole-based accesscontrol.10
Other Issues of Concern
OtherissuesofconcernfromFigure4-6andsuggestedmitigationstrate-
giesfollow.
Insufficientseparationofduties
Insomefraudcases,separationofdutieswaspartoftheformalbusi-
nessprocess,butwithnotechnicalenforcement.Ifpossible,buildyour 
businessprocessesintoyouronlinesystemsandenforceseparationof 
dutiesviatechnicalcontrolsinyourapplications.Forexample,require
thatasupervisorapproveofcriticaltransactionselectronicallyusing 
hisorherownaccount,ratherthanbysigningapaperform.
Compromisedpasswords
Insomeofthefraudcaseswefoundthatemployeessharedtheir 
passwordsinordertobemoreefficient.Evensupervisorsshared 
theirpasswordsinafewcasessothattheiremployeescouldlogin 
tothesupervisor’saccountandapproveoftransactions,resultingin 
“increasedproductivity.”Theyassertedthattheywereoverworked, 
andthiswastheonlywaythattheycouldpossiblyhandletheirwork-
load.Itisimportantnotonlythatyoutrainemployeesnottoshare 
theirpasswordswithanyone,butalsothatyouexplainwhatmighthap-
peniftheydo.Stresstothemthatifsomeoneelseusestheircomputer 
accounttocommitacrime,alloftheevidenceisgoingtopointtothem. 
10. Role-based access:accessrequiredbyaperson’sduties.Typically,aperson’saccesstodata/systems
shouldbenogreaterthanwhatisrequiredtheperson’srole.
ptg7481383
Chapter4. InsiderFraud
126
Theywillhaveaverydifficulttimeprovingthattheydidnotcommit 
theillegalactivitywhenalloftheevidencepointsdirectlytothem!
Employeesusceptibilitytosocialengineering
Insomeofthefraudcases,employeesunwittinglyassistedother 
employeesincommittingcrimesbyfallingforsocialengineering.In 
onecase,aninsiderwhoworkedforacreditcardpoint-of-saleterminal 
vendorusedsocialengineeringtoobtainauthenticationinformation 
fromthecreditcardcompanyhelpstaff.Heposedasadistraughtindi-
vidual(withafabricatedidentity)workingforaparticular,authorized 
merchantneedinghelpwithamalfunctioningterminal.Hewasthen 
abletocredithisowncreditcardbyreprogrammingaterminalusing 
theinformationhehadobtained.Itisimportantthatyouremployees 
areeducatedtounderstandpotentialsocialengineeringtechniques, 
notonlyfromoutsiders,butfromotherinsidersaswell.
Mitigation Strategies: Final Thoughts
Mitigationstrategiesforinsiderfraudneedtoincludeprevention,detection, 
andresponseapproachesjustastheydofortheotherinsidercrimes.
Preventivecontrolsforinsiderfraudtakeawaytheinsider’sopportunity
tocommitthecrime;referbacktoFigure4-2.Forexample,screeningand
identificationofat-riskemployeesathiringisanoptionforreducing
thenumberofhigh-riskemployeeswithanopportunityforcommitting
fraud.Certainlyifindividualshaveacriminalhistoryoffraud,theymay
bemorelikelytocommitfraudagainsttheiremployer.Individualswith
chronicfinancialproblemsmayalsobemoreatrisk.Sincefraudcrimes
ofteninvolveddatabasetransactions,eitherviewingormodifyingdata,
somelevelofrole-basedaccesscontrolormultipersontransactionveri-
ficationmayhelppreventsomeinsiderfraudcrimes.Certainlythese
measureswillmakeitmoredifficulttoperpetratethecrime,maydeter
individualsfromgettinginvolved,oratleastmaymakethemthinktwice
aboutit.
However,asevidencedinourcases,motivatedinsiderfraudstersmay 
findtheirwayaroundthesemeasures.Wehadcasesinwhichtheinsider 
recruitedotherinsiderspreciselytogetaroundrole-basedaccesscontrols. 
Sodetectionofongoingfraudactivitiesisgoingtobeessentialformost 
ptg7481383
Summary 127
organizations.Thefactthatinsiderfraudcrimesareoftenlongand  ongoing 
isbadnewsforthevictimorganizations.However,itdoesaffordtheorga-
nizationwithampleopportunitytodiscoverthecrime,andpossiblycurtail 
theactivitytolimitdamage.
Therearetwomeansfordetectinginsiderfraud.Thefirstisexternaldis-
coveryofthecrime,potentiallyasaresultofinvestigationintofinancial
lossesincurredbythefraudvictims.Aswehaveexplainedpreviously,the
actualfraudcrimeisoftenconductedbyanoutsidertothevictimorga-
nization.Detectionoftheseactivitiesislikelytobeapointwherelaw
enforcementisbroughtintoinvestigatethepotentialproblem.Thesecond
isthediscoveryoftheinternalcrime—theinsider’soraccomplice’smali-
ciousactions.Heretheorganizationhastheopportunitytodetecttheillicit
insideractivityatanypointfromplanningtoinsiderrecruitmenttoonline
execution.
Summary
Insiderswhocommitfraudareusuallylow-levelemployeeswhouse 
authorizedaccessduringnormalworkhourstoeitherstealinformationor 
modifyinformationforfinancialgain.StoleninformationisusuallyPIIor 
customerinformationthatisthensoldtooutsiderswhocommittheactual 
fraudagainstthevictims.Informationissometimesmodifiedforthedirect 
financialbenefitoftheinsider,andsometimesisdoneforpaymentby 
outsiders.
AlloftheinsidercrimesintheCERTdatabaseinvolvingorganizedcrimefit 
intothefraudcategory.Mostoftheseinvolveinsiderswhoformtheirown 
criminalenterprise,butsomeinvolveinsidersbeingrecruitedbyexternal 
organizedcrimegroups.Thesecrimeshaveasignificantimpact,withaver-
agelossesofmorethan$4million.
Insiderswhocommitfraudareprimarilymotivatedbyfinancialdifficulty. 
Theystartthecrimeduetomountingfinancialpressures,butthentend 
tocarryouttheirschemeforaslongaspossible.Outsidersplayarolein 
manyofthesecrimes,eitherpayingforstoleninformation,orfinding 
customers”whoarewillingtopaytheinsidertomodifyinformation.
Inthischapterweexploredtechnicalmethodsused,aswellasmitigation 
strategies.
ptg7481383
Chapter4. InsiderFraud
128
ApreliminaryMERITmodelofinsiderfraudispresentedinFigure4-7.
Wehavenowexploredeachofthethreetypesofcrimes,insiderITsabo-
tage,theftofintellectualproperty,andfraud,indetail.Next,wewilldiga 
littledeeperintoonespecificmethodofcommittinginsidercrimes:inthe 
SoftwareDevelopmentLifeCycle.
Figure 4-7 PreliminaryMERITmodelofinsiderfraud
Outsider Pressure
on Insider to Begin
or Continue Fraud
Insider’s Perceived
Risk of Getting
Caught
Social Networking
Pressures
Insider’s
Knowledge of
Organization’s
Fraud Controls
Insider’s
Dissatisfaction with
Compensation
Insider’s Feeling
of Having No
Other Option
Insider’s Intent to
Make Things
Right Eventually
Fraud Prevention
Controls
Implemented
Need to Help
Family/Friends
Insider’s Feeling
that Organization
Owes Him
Insider’s Incentive
(Pressures) to
Commit Fraud
Insider’s Opportunity
to Commit Fraud
Insider’s Rationalization of
(Attitude Toward) Fraud
Insider’s
Financial
Problems
Insider’s Financial
Benefit Due to
Fraud
Outsider
Facilitation
of Fraud
Insider’s
Greed
Outsider’s Financial
Benefit Due to
Fraud
Insider’s
Activities
Related to
Fraud
Insider Recruits
Other Employees
to Conceal Crime
Extent of
Fraud
Committed
ptg7481383
129
Chapter  5
InsiderThreatIssues
intheSoftware
DevelopmentLife 
Cycle
Software Development Life Cycle (SDLC): Synonymous withsoft-
ware process” as well as “software engineering,” it is a structured
methodology used in the development of software products and packages.
This methodology is used from the conception phase through to the deliv-
ery and end of life of a final software product.1
Insider threat issues in the Software Development Life Cycle: those aspects
of an organization’s software development or maintenance policies and
processes that insiders exploited to carry out their attack.
Youmightthinkthatthischapterisgoingtoaddresssoftwareengineers 
whoinjectmaliciouscodeintothesourcecodeastheydevelopanewsys-
tem.Onthecontrary,thischapterstartswiththerequirementsanddesign 
phasesoftheSDLC,andpointsouthowoversightsinthesephasescanlead 
1.  Webopedia.
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
130
toexploitationlaterbyendusersofthesystem.Thenitaddressesmalicious 
softwareengineers.
Onecriticalrequirementofmostsoftwaresystemsshouldbethatthe 
systemensurestheconfidentiality,integrity,andavailabilityofthe 
underlyinginformation.Unfortunately,intoday’stumultuouseconomic 
conditions,timetomarketisoftenthedrivingfactorinproductdevelop-
ment,oftensacrificingimportantstagesoftheSDLCdesignedtoaddress 
securityissues.Softwareengineers,includingbothemployeesandcontrac-
tors,haveintentionallyandunintentionallybypassedcriticalprocessesin 
theSDLC,leavingvulnerabilitiesinsoftwarethatallowedexploitationby 
endusersonceitwasinproduction.
Inaddition,softwareengineersanddataownersoftendospendagoodbit 
oftimeanticipatingandaddressinginformationsecurityissues.  However, 
inmanycasesintheCERTinsiderthreatdatabasewehaveobservedthat 
thesystemdesignersneglectedtoanticipatehowauthorized userscould 
commitillicitactivityusingthesoftware.Finally,oncethesoftwareisin 
production,developerstendtohavefreereigninmanyorganizations, 
releasingchangestosourcecodewithoutanytwo-personcontrol.
Neglectingtoconsiderinsiderthreatsecurityrequirementsinsoftware 
systemshasallowedinsiderstosabotagecriticalsystems,defraudorgani-
zationsoflargesumsofmoney,andmodifydatainsystemstocreatefalse 
identitydocuments.Whiletheimpactinsomeincidentscanbemeasured 
indollars,otherincidentsimpactorganizationaloperationsorthreatenthe 
nationalsecurityoftheUnitedStates.
Thefollowingcasedemonstratesthepotentialofanemployeewith 
softwaredevelopmentskillsandaccesstocausefinancialimpact.
Aforeigncurrencytraderinafinancialinstitutionstartedlosingmoney 
ontrades.Fearingjob-relatedconsequences,heexecutedacomplexfraud 
schemebymodifyingthesourcecodeofthetradingsystemtohidefake 
tradesheenteredtocounterbalancehislosses.Sincehisundergraduate 
degreewasincomputerscience,hehadconvincedthedevelopmentteam 
thatitwouldbeeasieronallofthemifhecouldjustmodifythesourcecode 
himselfwhenneeded.Therefore,hehadbeengivenauthorizedaccessto 
thesourcecode,andwasabletomodifyittohidehisillicitactivity.
Hisschemeendedupcontinuingformorethanfiveyears;makingit 
appearthatthebankwasprofitinginsteadoflosingcloseto$700million. 
Theinsiderwasconvicted,orderedtopayalmost$700millioninrestitu-
tion,andsentencedtomorethansevenyearsofimprisonmentfollowed 
byfiveyearsofprobation.
ptg7481383
RequirementsandSystemDesignOversights 131
Itisimportantforyoutocarefullyconsiderthiscase.Manycontrolsare 
builtintoyoursoftwaresystemssothatyourenduserscannotperform 
illicitactivity.Therefore,itisveryimportantthatyoudonotallowyour 
enduserstohaveaccesstoyoursourcecode.Thisisanewslantonthe 
conceptofseparationofduties!
GiventhatmostorganizationsarereliantonITsystemsforachievingtheir 
mission,itiseasytoseewhytheintegrityofthesoftwareunderlyingthose 
systemsiscritical.Iftheorganizationdoesnotincorporateadequatesecu-
ritycontrolsinitsSDLCprocessesoraninsiderisabletobypassexisting 
securitycontrols,thepotentialforsabotage,fraud,ortheftofinformation 
isincreased.
Twenty-eightofthecasesintheCERTdatabasehadissuesrelatedto 
exploitingavulnerabilityintheSDLC.Themajorityofthosecasesinvolved 
aninsiderwhosabotagedapreviousemployer’scriticalsystem.Inafew 
ofthecasestheinsider’smaliciousactionsresultedinfraudortheftof 
intellectualproperty.
Bylookingatthe28incidents,itbecameapparentthatthevulnerabilities 
exploitedcouldbebrokendownintotwogeneralcategories:
Requirementsdefinitionandsystemdesign
Systemimplementationandmaintenance
Requirements and System Design Oversights
Manysystemsautomatebusinessandworkflowprocesses.Whendefining 
therequirementsforsuchsystems,theprocessestobeautomatedmustbe 
carefullydefined.Inthecasesexamined,manyoftheinsiders,whowere 
partofthedevelopmentteam,wereabletocarryouttheirillicitactivities 
becausetheyrecognizedinstancesinwhichprotectionfrominsiderthreats 
wasnotconsidered.Forexample,insomecases,therewasnorequirement
forseparationofdutiesinautomatedprocesses.Inothers,authentica-
tionandrole-basedaccesscontrolswerenotrequiredforsystemaccess. 
Systemrequirementsshouldalsoincludespecificationofdataintegrity 
andconsistencychecksforallchangesmadetoproductiondatabyend 
users.Automatedchecksshouldalsoberunperiodicallytodetectsuspi-
ciousmodifications,additions,ordeletions.Inotherwords,requirements
shouldconsiderproactivedataintegritymechanisms,aswellasperiodic 
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
132
auditingfunctionsthatcanbeimplementedandrunautomaticallyona 
more  frequentbasisthanmanualsystemaudits.
Exceptionhandling,orauthorizedsystemoverrides,whichweredesigned 
toaccommodateunusual,specialcircumstancesthatcouldnotfollow 
thestandardbusinessprocesses,providedaneasymechanismforsome 
insidersintheCERTdatabasetocommitmaliciousactivity.
Notethatalloftherecommendationsdetailedherefordefiningsystem 
requirementsapplytobothsystemsbuiltbytheorganizationandthose 
theorganizationacquired.Whenevaluatingnewsystemsforacquisition, 
thetypesofrequirementsdetailedhereshouldalsobeconsidered.Once 
requirementshavebeendefinedandpotentialsystemsareevaluated 
forpurchase,theabilityofeachsystemtomeetthoserequirementsisan 
importantpartoftheevaluationprocess.
Authentication and Role-Based Access Control
Insomecases,eventhoughauthenticationwasrequiredtoaccessacritical 
system,users’accessrightswithinthesystemwerenotrestrictedconsis-
tentwithjobresponsibilities.Therefore,insiderswereabletoaccessdata 
outsidetheirneedtoknow,allowingthemtoview,modify,ordeletedata 
forfriends,relatives,high-profilecelebrities,andothers.
Itisimportantthatsoftwaresystemsuseauthenticationtodeterminewho 
auseris.Oncetheuser’sidentityisdetermined,role-basedaccessshould 
ensurethateachuserhastheminimumprivilegesneededtoperformhis 
orherjobduties.Thefollowingcasedetailshowanemployeeatalaw 
enforcementorganizationwasabletoexploitinadequateaccesscontrolsin 
thesuspecttrackingsystem.
Oneresponsibilityofapolicecommunicationsoperatorwastolookup 
andcommunicateinformationregardingdriver’slicensestopoliceoffi-
cersinthefield.Thiscasebeganwhenacommunicationsoperatorwas 
approached byanacquaintanceandaskedifshewouldbewillingtolook 
upinformationinthatsystemforthreepeople,andsheagreed.Over 
time,sheproceededtolookupinformationonpeopleinreturnforpay-
mentbyheracquaintance.Atsomepointshediscoveredthatshenotonly 
NOTE
Neglecting to require authentication and role-based access control
simplified insider attacks.
ptg7481383
RequirementsandSystemDesignOversights 133
couldreadinformationfromthedatabase,butalsocoulduseothersystem 
functions.Atthatpoint,attherequestofheraccomplice,shebegantocre-
ate,inreturnforpayment,illegaldriver’slicensesinthesystemforpeople 
whowereunabletogainlegitimatelicenses.Fortunately,aconfidential 
informantledtoherarrestforfraudulentlycreatingapproximately195 
illegaldriver’slicenses.
Thiscaseisa“low-tech”incidentthatwasenabledbyoversightsin  defining 
andimplementingaccesscontrolswithinacriticalapplication. Allsystem 
usershadthesamelevelofaccess,eventoperformacriticalfunctionsuch 
asaddingadriver’slicensetothedatabase.
Separation of Duties
Mostorganizationsimplementseparationofdutiesinbusinessprocesses 
toreducetheriskoffraud.Separationofdutiesshouldrequirethatmore 
thanonepersonbeinvolvedinacriticalbusinessprocess.Forexample,one 
employeeisgivenauthorizedaccesstogenerateapayment,butasecond 
employeeisrequiredtoapproveandfinalizethepayment.Failuretoiden-
tifyrequirementsforseparationofdutiesenabledsomeinsiderstocommit 
crimesagainsttheirorganization.
Theofficemanagerforalargetruckingfirmfraudulentlyaddedherhus-
bandtothepayrolleachweekforweeklypayouts,andthendeletedhim 
fromthesystemanderasedallrecordsofthepayments.Thisschemewent 
onformorethanayearandresultedinmorethan$100,000inlossesto 
thefirm.
Inthiscase,theofficemanagerhadtheabilitytoaddemployeestothepay-
roll,generatepaychecks,anddeleterecordsofpaymentsfromthedatabase. 
Onemightexpectthistypeofsituationinasmallorganization,butthis 
caseexampledescribedalargetruckingorganization.Nonetheless,wereal-
izethatsomeorganizations,especiallysmallerones,can’taffordtohave 
multiplepeopleinvolvedinfunctionssuchaspayroll.However,itisstill 
important to use security controls to protect the records, payroll records in 
thiscase,frombeingmodifiedbythatsingleuser,andtoperiodicallyaudit 
thoserecordsforfraudulentactivity.
NOTE
Neglecting to define security requirements/separation of duties
requirements for automated business processes provided an easy
method for insider attack.
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
134
Automated Data Integrity Checks
Automateddataintegritychecksareessentialtoensuringtheintegrityof 
thedatacollectedinorganizations’systems.Definingtheappropriatedata 
integrityrulesisthefoundationforthesoftwaredevelopmentteamprior 
toanycodebeingwritten.Ifthesoftwaresystemssupportingtheorganiza-
tiondonotenforcethebusinessrulesoftheorganization,theywillallow 
maliciousinsiderstoproceedundetected.Thefollowingcaseillustratesthe 
needtoenforcedataintegritychecks.
Asoftwareadministratorforafinancialorganizationhadfullaccesstothe 
organization’ssourcecode.Hemodifiedthesourcecodetomakechanges 
tocertainaccountsandforwardfundstohisownprivateloanaccounts, 
whichhethenusedtomovemoneyintohischeckingaccount.Theinci-
dentwasdetectedwhenafellowstaffmemberwasconductingaroutine
systemauditandnoticedaten-yearcarloanintheinsider’sname.This 
wasalarmingbecausetheorganizationdidnotissuecarloansforthat 
longofatimeframe.Managementconfrontedtheinsiderafterconduct-
ingafurtherinvestigation,andheadmittedtostealing$90,000.Hethen 
turnedhimselfintolawenforcement.
Inthiscase,theorganizationfailedtoimplementautomateddataintegrity 
checksthatcouldhaveeitherpreventedordetectedthisfraudulentactivity. 
Forexample,carloanswerenotissuedforten-yearterms—anautomated 
dataintegritycheckcouldhavecaughtthatdiscrepancy.Inaddition,data-
basetriggerscouldhavedetectedthesuspicioustransferoffundsintoan 
employeeaccount.
Inshort,anyfraudulentactivitythathappensonceshouldbeanalyzedto 
seehowitcanbepreventedfromeverhappeningagain.Anythingdetected 
inamanualauditshouldbeimplementedasanautomatedscriptwhen-
everpossible.
Also,insomecases,althoughseparationofdutieswasimplemented,there 
wasnodesignto“checkthechecker.”Duetothehighdegreeofcollusion 
NOTE
Neglecting to define requirements for automated data integrity checks
made it difficult to detect malicious insider actions.
ptg7481383
RequirementsandSystemDesignOversights 135
observedinfraudcases,itisrecommendedthatsystemdesignersconsider 
howtheymightimplementyetanotherlayerofdefenseontopofsepara-
tionofduties,todiscoverincidentsinwhichtwoemployeesareworking 
togethertocommitacrime.Mostofthesetypesofcrimescontinueovera 
prolongedperiod,soalthoughdetectionmightnotbeimmediate,patterns 
ofsuspiciousactivitycanbediscoveredtocatchtheactivitysoonerrather 
thanlater.
Exception Handling
Severalinsidersusedspecialsystemfunctionscreatedforexceptionhan-
dlingtocarryouttheircrimes.Theyrealizedthatthesefunctionswere 
createdforexceptionalsituationsinwhichchangeshadtobemadequickly, 
thusbypassingtheusualmandatedsecuritychecks.Thistypeoffunc-
tionalityprovidedaneasywayforinsiderstogetaroundtherules.The 
following case describes how insiders were able to bypass automated data 
integritychecksbyusingthesystem’s“Expedite”function.Thissamecase 
examplewasusedinthepreviouschapter,aswebelievethatthisissueis 
importantenoughtobeincludedinbothchapters,andthisisthebestcase 
toillustratetheconcept.
Sixcontractorswerecaseworkersforanorganizationthatdistributed 
childcarevouchers.Theinsidersissuedfoodstampstopeoplewhodid 
notqualifyfortheassistanceandincreasedmonthlyallotmentsonexist-
ingcasesforpayment.Overasix-monthperiod,theypocketed$32,000in 
kickbacksforissuingfoodstampsto53unauthorizedbeneficiaries.They 
wereabletoevadethebusinessprocessesenforcedinthesystemwithout 
asupervisor’sauthorizationbyopeningthecasesas“Expedited.”They 
wereonlycaughtwhensomeonethattheinsidersattemptedtosolicit 
reportedtheiractivitytolocallawenforcement.Thevictimorganization’s 
incident-relatedlosswas$75,000.
Itisimportanttodesignspecialdataintegritychecksforanydatamodi-
fied,added,ordeletedusingtheseexception-handlingfunctions.
NOTE
Neglecting to consider security vulnerabilities posed by “authorized
system overrides” resulted in an easy method for insiders “to get around
the rules.
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
136
System Implementation, Deployment, and Maintenance
Issues
Veryfewinsidersactuallyintroducedintentionalvulnerabilitiesor 
maliciouscodeintosourcecodeduringtheinitialdevelopmentprocess; 
thattypeofactivitywasmoreoftencarriedoutduringthemaintenance 
phaseoftheSDLC.Itisnotuncommonfororganizationstofollowstrin-
gentdevelopmentpracticesduringinitialdevelopmentbutallowthe 
practicestoerodeoncethesystemmovesintooperation.
Code Reviews2
ThereisonlyonecaseintheCERTdatabaseinwhichtheinsidercommit-
tedmaliciousactivityduringtheinitialdevelopmentphaseofaproject,but 
itisstillariskthatwecannotoverlook.An18-year-oldWebdeveloperused 
abackdoorhehadinsertedintohissourcecodeduringsoftwaredevelop-
menttoaccesshisformercompany’snetwork,spamitscustomers,alterits 
applications,andultimatelyputitoutofbusiness.Codereviewsandstrict 
changecontrol,apartofanysolidsoftwaredevelopmentprocess,could 
havedetectedthebackdoorandperhapssavedthecompany.
Moreinsiderincidentsoccurredduringthemaintenancephaseofthe 
SDLCthanduringinitialsystemimplementation.Itappearsthatorga-
nizationsimposemorestringentcontrolsduringtheinitialdevelopment 
process,butonceasystemhasbeeninproductionandstabilizedfollowing 
initialrelease,thosecontrolstendtobecomemorelax.Insidersinthecases 
intheCERTdatabasetookadvantageofthoserelaxedcontrolsinavariety 
ofways.
Ahardwareengineerwasunhappywithhisnewbossbecausehehadmod-
ifiedtheorganization’sbonussystem.Toexactrevenge,hedownloaded 
avirusfromtheInternetandembeddeditinsidethecompany’sproduc-
tionexecutable.Thatnight,hereleasedthenewexecutableto  customers’ 
systems.Thenextday,onebyone,theorganization’s  customersexecuted 
2.  Code review:aprocesstoexaminesourcecode,typicallybysomeoneotherthantheoriginalcoder, 
withthepurposeofidentifyingandaddressingmistakes.
NOTE
Lack of code reviews allowed insiders to insert backdoors into source
code, especially for stable, production systems.
ptg7481383
SystemImplementation,Deployment,andMaintenanceIssues 137
theinfectedsoftware,requiringthatsomeonebeflownon-sitetoeach 
customerlocationaroundthecountrytorepairthedamage.
Whilemanyorganizationsinstitutemandatorycodereviewsfordevelop-
mentofnewsystemsorforsignificantnewmodulesinexistingsystems, 
severalinsiderswereabletoinjectmaliciouscodeintostableproduction 
systemswithoutdetection.Ineffectiveconfigurationorchangecontrolpro-
cessescontributedtotheirabilitytodoso.Afeworganizationsinthecases 
examinedimplementedconfiguration-managementsystemsthatrecorded
adetailedlogofthemaliciousinsideractivity.However,therewasnopro-
activeprocessforactuallycontrollingsystemreleasesusingthosesystems 
orreviewingthelogstodetectmaliciousactivityafterthefact.
Attribution
Duringthesoftwaredevelopmentprocess,organizationsarevulnerableto 
thesametypesofinsiderattacksthatcanoccuronproductionsystems.One 
softwaredevelopmentprojectmanager,recognizingtherewasnowayto 
attributeactionstoasingleuserinthedevelopmentenvironment,repeat-
edlysabotagedhisteam’sproject.Themotivationinthiscaseisunique:His 
teamwasfallingbehindintheprojectschedule,andheusedtherepeated
sabotageasaconvenientexcuseformisseddeadlines.Itisimportantthat 
organizationsconsidersecurityduringthedevelopmentprocessjustason 
productionsystems.
System Deployment
Avarietyofoversightsintheprocessofmovingasystemfromdevelop-
menttoproductionprovidedavenuesforattackbyinsiders.Examples 
fromseveraldifferentcasesfollow.
NOTE
Inability to attribute actions to a single user enabled insiders to sabotage
projects.
NOTE
Oversights in moving a system from development to production provided
avenues for attack by insiders.
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
138
Theleaddeveloperforanewsafety-relatedsystembeingdevelopedata 
governmentagencyrefusedtoadheretotheproceduresfordocumenta-
tionandbackups.Managementwasawareofhisnegligence,repeatedly
requestingthatherectifythesituation,butheignoredthemwithnoconse-
quences.Thesystemwasputintoproduction,andafterafewmonthswas 
instable,productionmode.Atthattimetheteamwastobedisbanded, 
astheyhadbeenbroughttogetherasatemporaryteamforthesolepur-
poseofdevelopingthesystem.Theleaddeveloper,whowasdisgruntled 
withthesituation,wipedallofthefilesfromhislaptop—theonlycopy 
ofthesourcecodethatexisted.Fortunately,lawenforcementdiscovered 
anencrypteddiskathishomecontainingthesourcecode,butforseveral 
monthsherefusedtodecryptthefilesandtheagencywasonlyabletorun
theexecutableversionofthesoftware.Inthemeantime,withoutaccess 
tothesourcecode,theyhadnoabilitytomakemodificationsorenhance-
mentstotherunningversionofthemission-criticalsafetysystem.
Intheprecedingcase,theorganizationmovedasystemintoproduction 
eventhoughitwasfullyawarethattheleaddeveloperhadnotfollowed 
itsprocessfordocumentingandbackingupthesourcecode.ThisSDLC 
oversightlefttheorganizationinavulnerablepositionwhenthedeveloper 
usedthatsituationto“holdithostage”fortheonlycopyofthesourcecode.
Agovernmentagencyhiredateamofcontractorstodevelopanewsystem 
forthem.Thesystemwastoprocesssensitiveinformation,andtherefore 
thedeveloperswereonlysupposedtohaveaccesstothedevelopmentsys-
temandtestdata.Thesystemwasmovedintoproduction,however,and 
thesamepasswordfilewasusedfortheproductionsystemasinthedevel-
opmentenvironment,enablingoneofthedeveloperstoaccessandsteal 
sensitivedataafterithadbeenenteredintotheproductionsystem.
Inthiscase,theorganizationputsensitiveinformationatriskwhenit 
movedthesystemintoproduction.Securityrequirementsneedtoberevis-
itedduringdeploymenttoensurethatoversightssuchasthiswillnot 
provideavulnerabilitythatcouldbeexploitedbyinsidersintheproduc-
tionenvironment.
AgovernmentagencyusedaWebcontentmanagementsystemtomanage 
andcontrolallchangestoitspublic-facingWebsite.Noonecouldchange 
theagency’sWebcontentwithoutgoingthroughthatsystem.Although 
theagencyusedachangecontrolsystemtotrackcontentchanges,ithad 
noprocessforapprovalofchangesbeforetheywerereleasedtotheWeb
site.Asaresult,acollegeintern,beforeleavingattheendofthesummer, 
publishedmaterialintendedtobeajokeontheagency’sWebsite,causing 
quiteascandalanddamagetotheagency’sreputation.
ThiscaseisSDLC-relatedinthedeploymentoftheWebcontent-
managementsoftware.Wechosethiscasebecausewewantyoutoconsider 
ptg7481383
ProgrammingTechniquesUsedAsanInsiderAttackTool 139
thesetypesofissuesforanyinfrastructuretechnologiesyouhaveacquired. 
Itisimportantthatyoucarefullyconsiderthesetypesofissuesasyoumove 
systemsfromdevelopmenttoproductionbecauseemployeesusingthose 
systemsonadailybasiswilllikelynoticethevulnerabilities.
Backups
Insiderswereabletosabotagebackupsystemsthatwereleftunprotectedto 
amplifytheirattack.Riskmanagementofcriticalsystemsneedstoextend 
beyondthesystemitselftosurroundingsupportsystems,suchasbackups.
Programming Techniques Used As an Insider
Attack Tool
Inthissectionwedoadeepdiveintoinsiderswhousedprogramming 
techniquesasanattacktool.3Wefindthesecasestobeveryinteresting, 
andthinkthattheymightopenyoureyestonewattackvectors.Most 
oftheseattackswereconductedbysystemadministratorsorprogram-
mers,althoughafewwereconductedbymanagersandothertechnical 
staffmembers.Mostwerecurrentemployeeswhentheycommittedtheir 
crimes,althoughinsomecasestheimpactwasnotrealizeduntilafterthe 
insiderlefttheorganization.Themajorityoftheemployeesstruckatthe 
workplace,butmanylaunchedtheirattackremotely.
Themajorityoftheinsidersweremotivatedbyrevengeagainsttheir 
employers,butmorethanone-thirdweremotivatedbyfinancialgain. 
Othermotivesincluderecognitionandideology.
Thefollowingcasesummariesdescribehowsomeoftheinsidersmodified
productionsourcecodeorscriptstoperpetratetheirattacks.Themethods
usedtoachievetheseobjectivessuggestcountermeasuresthatshouldbecon-
sideredtohelpmitigaterisksassociatedwiththesetypesofinsiderattacks.
3.  MaterialfromthissectionincludesportionsfromthejointCyLabandCERTProgramarticle 
“SpotlightOn:ProgrammingTechniquesUsedasanInsiderAttackTool,authoredbyDawnCappelli, 
ThomasCaron,RandyTrzeciak,andAndrewMoore[Cappelli2008a].
NOTE
Ineffective or lack of backup processes amplified the impact of insiders’
mass deletion of data.
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
140
Modification of Production Source Code or Scripts
Hereareseveralcasesofmodificationofproductionsourcecodeorscripts.
Case1:Aconsultantmodifiedsourcecodeusedbyhisformeremployer, 
anInternetserviceprovider(ISP),anddisableditscommunicationscapa-
bilityforthreeweeks.HegainedremoteaccesstotheISP’sradio-tower 
computer,andthenusedadministratorpasswordstoreprogramthewire-
lessaccesspointsof110ofitscustomers,cuttingofftheirInternetservice. 
Hereprogrammedtheaccesspointstocomplicaterepairefforts,requiring
thattheserviceproviderdispatchtechnicianstothepremisesofthesub-
scriberswholostInternetaccess,aneffortthatextendedoverathree-week 
period.HisactionsalsodisruptedthecommunicationsofotherISPsout-
sidethevictim’snetwork.
Case2:Asystemadministrator,fearingcompanylayoffs,embeddedmali-
ciouscodewithinscriptsontheorganization’sservers.Thecodewassetto 
executeonhisnextbirthday,approximatelysixmonthsinthefuture.Had 
hebeensuccessful,thecodewouldhavewipedoutcriticaldataonmore 
than70serversandcausedwidespreadfinancialdamage.Italsowould 
havecausedpotentialhealthriskstotheorganization’scustomers.Even 
aftersurvivingthelayoffsafewdayslater,theinsiderdidnotremovethe 
maliciouscode;infact,hemodifieditonemonthlater.Themaliciouscode 
containedaprogrammingerrorandfailedtoexecuteonhisbirthdayas 
scheduled.However,theinsiderallegedlycorrectedtheprogramming 
errorsixmonthslater,settingthecodetoexecuteonhisnextbirthday. 
Fortunately,afewmonthsbeforetheintendedexecutiondate,anothersys-
temadministratorinvestigatingasystemerrordiscoveredthe  malicious 
codeanddisabledit.
Case3:Acontractorhiredasasystemadministratorwrotealogicbombto 
deletealloftheorganization’sfiles.Heplacedthelogicbombintwodif-
ferentscripts.Thefirstwasinanoperatingsystemscriptthatrotatedlog 
fileswhenavolumereachedacertainpoint;ratherthanrotatinglogfiles 
itwouldexecutehislogicbomb.Heplacedthesecondlogicbombinhis 
supervisor’slog-inscript.Thelogicbombwassetuptodisplayathreaten-
ingandinsultingmessagetohissupervisorduringlogin,executethelogic 
bomb,andremovealltracesofthelogicbombfromthesystem,including 
logfiles.
Case4:Followingtermination,aformerapplicationdeveloperatacon-
sumerdatamarketingfirmremotelyloggedintotheorganization’s 
systemsandmodifieditsWebsitebyinsertingpornographicimages. 
Whilethisattackdidnotdefinitivelyuseprogrammingtechniques,we 
chosetoincludeitinthischapterduetotheseriousconsequences.
ptg7481383
ProgrammingTechniquesUsedAsanInsiderAttackTool 141
Obtaining Unauthorized Authentication Credentials
Herearetwocasesofobtainingunauthorizedauthenticationcredentials.
Case1:AnITmanagermodifiedthepasswordsynchprogramthat 
propagatedpasswordchangesbetweentheproductionanddevelopment 
systems.Theinsiderwastheonlypersononstaffwhoknewthisprogram 
existed.Byremovingasinglelineofcode,healteredtheprogramtostore 
allpasswordchanges(account,oldpassword,andnewpassword)inafile 
ascleartext,therebygainingaccesstoallaccountpasswordsthathadbeen 
changedusingtheprogram.
Case2:Astudentemployedmultiplemethodsforgainingaccesstounau-
thorizedcredentials;themostdeviousinvolvedprogrammingmethods.
First,hedecryptedthepasswordfileonadepartmentalcomputersystem
andobtainedthepasswordforhisprofessor’saccount.Usingoneofthe
passwordsheobtained,hewasabletogainaccesstotheprofessor’sper-
sonalaccountonYahoo.com.Thestudentwroteandinstalledaprogram
intheprofessor’scomputeraccountthatwouldrunwhentheprofessor
loggedin,requestingtheprofessortoenterhisuserIDandpasswordfor
theuniversity’sadministrativecomputersystem,aseparatenetworkand
computersystem.Thatprogramenabledhimtosurreptitiouslycapturethe
professor’suserIDandpasswordforthatnetworkandcomputersystem.
Disruption of Service and/or Theft of Information
Hereareseveralcasesofdisruptionsofserviceand/ortheftofinformation.
Case1:Acomputersciencemajorwroteamaliciousprogramthat,on 
severaloccasions,shutdowntheuniversityserverthatwasusedasapor-
talforenrollmentservices.Hisrealintentionwastheft:Overatwo-year 
period,heaccessedadatabaseontheserverandstole8,000namesand 
SocialSecuritynumbersalongwith37,000personalrecords.
Case2:Acontractorworkingasasystemadministratorplantedseveral 
logicbombsontheorganization’snetworkaftertheorganizationrejected
hisproposaltoreplaceoneofhisfellowsystemadministrators.When 
theorganizationdecidedtoawardtheworktoanotherfirm,heplanted 
logicbombsonfiveserversscheduledtodetonateafterheleft.Threeof 
theserverswentofflinewhentheyexecuted,butthesystemadministrator 
locatedthemaliciouscodeandpreventeditfromexecutingontheother 
twotargetedcomputers.
Case3:Aconsultanthiredasasoftwaredeveloperaccessedhisclient’s 
serversremotelyandremovedsomecodeneededtorunthesystem, 
ptg7481383
Chapter5. InsiderThreatIssuesintheSoftware  DevelopmentLifeCycle
142
renderingtheorganization’ssystemsinaccessible.Thisactionfollowed 
ayearofunmetdemandsandthreatsbytheconsultant.Theinsider 
intendedtoreturnthecodeoncehisdemandsweremet.
Case4:Asystemadministrator,disgruntledbecausehisyearlybonuswas 
notaslargeasheexpected,builtanddeployedalogicbombthatdeleted 
10billionfilesandtookdownmorethan2,000serversaroundthecountry. 
Hewasabletodistributethemaliciouscodebyusingthestandardsoft-
waredistributionmethods.
Mitigation Strategies
MitigationstrategiesforinsiderswhoexploitvulnerabilitiesintheSDLCto 
sabotagecriticalsystemsincludethefollowing.
Resilientsystemarchitecturethatallowsforefficientrecoveryorsus-
tainstheorganizationduringdisasters.Therequirementsforthe 
architectureshouldbedefinedatthebeginningofeachprojectsoasto 
setexpectationsforrecoveryintheeventanincidentoccursthatdis-
ruptsoperations.
Configurationandaccesscontrolofsourcecode.Allattemptstoaccess 
sourcecodeindevelopmentandproductionshouldbetrackedandreg-
ularauditsofaccesstosourcecodeshouldbeperformed.
Formalcodereview/inspectiontopreventmaliciouscodefrombeing 
insertedintoproductionsystems.
ThemitigationstrategyforinsiderswhoexploitvulnerabilitiesintheSDLC 
tocommitfraudinvolvesautomatedworkflowprocesses.Theseprocesses 
shouldenforceproperauthorizations,approvals,andseparationofduties 
forcriticalbusinessfunctions.
MitigationstrategiesforinsiderswhoexploitvulnerabilitiesintheSDLCto 
stealsourcecodefocusonconfigurationandaccesscontrolofsourcecode. 
Sourcecodeindevelopmentandproductionshouldbemonitoredclosely 
toensureitisnotbeingmovedofftheorganization’snetworkwithout 
knowledgeandapprovaloftheorganization.
ptg7481383
Summary 143
Summary
Inthischapterwepresentedonespecifictypeofinsiderthreat:thosethat 
exploitedtheSoftwareDevelopmentLifeCycle.Someinsiderstookadvan-
tageofoversightsintherequirementsanddesignphasesoftheSDLCto 
carryouttheirattacks.Othersweresoftwareengineersorsystemadminis-
tratorswhoactuallyinjectedmaliciouscodeintothesourcecodeinorder 
tocommitITsabotageorfraud.
Thischapterwasintendedtoraiseawarenessofthistypeofinsiderthreat 
sothatyourealizethatyouneedtoinvolveyoursoftwareengineering 
teamsinyourmitigationstrategies.
Inthenextchapter,BestPracticesforthePreventionandDetectionof
InsiderThreats,wepresentanentirecollectionofbestpracticesthatwe
haveaccumulatedbasedontheactualcrimesintheCERTdatabase.That
chapterincludesbestpracticesthatareapplicabletotheSDLC-related
crimesdescribedinthischapter,aswellasallinsiderthreatscoveredin
thisbook.
ptg7481383
This page intentionally left blank
ptg7481383
145
Chapter  6
BestPractices 
forthePrevention 
andDetectionof 
InsiderThreats
Thischapterdescribes16practices,basedonexistingindustry-accepted 
bestpractices,providingyouwithdefensivemeasuresthatcouldprevent 
orfacilitateearlydetectionofmanyoftheinsiderincidentsotherorgani-
zationsexperiencedinthehundredsofcasesintheCERTinsiderthreat 
database.1
Thischapterwaswrittenforadiverseaudience.Decisionmakersacross
yourorganizationwillbenefitfromreadingit.Insiderthreatsareinfluenced
byacombinationoftechnical,behavioral,andorganizationalissues,and
mustbeaddressedbypolicies,procedures,andtechnologies.Therefore,
itisimportantthatpersonnelfromyourmanagement,humanresources,
informationtechnology,softwareengineering,legal,andsecurityteams,
1.  Thischapterincludesportionsfrom“CommonSenseGuidetoPreventionandDetectionofInsider 
Threats3rdEdition–Version3.1,byDawnCappelli,AndrewMoore,RandallTrzeciak,andTimothy
J.Shimeall.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
146
alongwithyourdataowners,understandtheoverallscopeoftheproblem
andcommunicateittoallemployeesinyourorganization.
Webrieflydescribeeachpractice,explainwhatyoushoulddo,andprovide 
afewactualcaseexamplesillustratingwhatcouldhappeniftheprac-
ticeisnotimplemented.Finally,wedescribehowthepracticecouldhave 
preventedanattackorfacilitatedearlydetection.
Whileyouread,pleaseremembereverythingelseyouhavereadsofarin 
thisbookregardingcontractorsandtrustedbusinesspartners.Although 
weusuallyusethetermemployeeinthischapter,muchofthischapteralso 
appliestocontractorsandtrustedbusinesspartners.Pleasekeepthisin 
mind,anddonotoverlookthoseinsiders!
Summary of Practices
Eachofthe16practicesissummarizedhereandthenexpandedoninthe 
followingsections.
Practice 1: Consider threats from insiders and business partners in
enterprise-wide risk assessments.
Itisdifficultforyoutobalancetrustingyouremployees,providing 
themaccesstoachieveyourmission,andprotectingyourassetsfrom 
potentialcompromisebythosesameemployees.Insiders’access, 
combinedwiththeirknowledgeofyourtechnicalvulnerabilitiesand 
vulnerabilitiesintroducedbygapsinbusinessprocesses,givesthem 
theabilityandopportunitytocarryoutmaliciousactivityagainstyou 
ifproperlymotivated.Theproblemisbecomingevenmoredifficultas 
thescopeofinsiderthreatsexpandsduetoorganizations’growingreli-
anceonbusinesspartnerswithwhomtheycontractandcollaborate. 
Itisimportantforyoutotakeanenterprise-wideviewofinformation 
security,firstdeterminingyourcriticalassets,andthendefiningarisk 
managementstrategyforprotectingthoseassetsfrombothinsiders 
andoutsiders.
Practice 2: Clearly document and consistently enforce policies and
controls.
Cleardocumentationandcommunicationoftechnicalandorganiza-
tionalpoliciesandcontrolscouldhavemitigatedsomeoftheinsider 
incidents,theft,fraud,andITsabotage,intheCERTdatabase.Specific 
ptg7481383
SummaryofPractices 147
policiesarediscussedinthispractice.Inaddition,consistentpolicy 
enforcementisimportant.Someemployeesinourcasesfelttheywere 
beingtreateddifferentlythanotheremployees,andretaliatedagainst 
thisperceivedunfairnessbyattackingtheiremployer’sITsystems. 
Otherinsiderswereabletostealormodifyinformationduetoinconsis-
tentorunenforcedpolicies.
Practice 3: Institute periodic security awareness training for all
employees.
Acultureofsecurityawarenessmustbeinstilledinyourorganization
sothatallemployeesunderstandtheneedforpolicies,procedures,and
technicalcontrols.Allemployeesinyourorganizationmustbeaware
thatsecuritypoliciesandproceduresexist,thatthereisagoodreason
whytheyexist,thattheymustbeenforced,andthattherecanbeserious
consequencesforinfractions.Theyalsoneedtobeawarethatindividu-
als,eitherinsideoroutsidetheorganization,maytrytoco-opttheminto
activitiescountertoyourmission.Eachemployeeneedstounderstand
yoursecuritypoliciesandtheprocessforreportingpolicyviolations.
Practice 4: Monitor and respond to suspicious or disruptive behavior,
beginning with the hiring process.
Youshouldattempttoidentifysuspiciousordisruptivebehaviorby 
individualsbeforetheyarehired,andcloselymonitoremployeebehav-
iorintheworkplace,includingrepeatedpolicyviolationsthatmay 
indicateorescalateintomoreseriouscriminalactivity.Theeffectof 
personalandprofessionalstressorsshouldalsobeconsidered.
Practice 5: Anticipate and manage negative workplace issues.
Thispracticedescribessuggestionsbeginningwithpreemployment 
issues,continuingthroughemployment,andincludingtermination 
issues.Forexample,youneedtoclearlyformulateemploymentagree-
mentsandconditionsofemployment.Responsibilitiesandconstraints 
oftheemployeeandconsequencesforviolationsneedtobeclearly 
communicatedandconsistentlyenforced.Inaddition,workplacedis-
putesorinappropriaterelationshipsbetweencoworkerscanserveto 
undermineahealthyandproductiveworkingenvironment.Employees 
shouldfeelencouragedtodiscusswork-relatedissueswithamember 
ofmanagementorhumanresourceswithoutfearofreprisalornegative 
consequences.Managersneedtoaddresstheseissueswhendiscovered 
orreported,beforetheyescalateoutofcontrol.Finally,  contentious 
employeeterminationsmustbehandledwithutmostcare,asmost 
insiderITsabotageattacksoccurfollowingtermination.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
148
Practice 6: Track and secure the physical environment.
Whileemployeesandcontractorsobviouslymusthaveaccesstoyour 
facilitiesandequipment,mostdonotneedaccesstoallareasofthe 
workplace.Controllingphysicalaccessforeachemployeeisfunda-
mentaltoinsiderthreatriskmanagement.Accessattemptsshouldbe 
logged and regularly audited to identify violations orattempted viola-
tionsofthephysicalspaceandequipmentaccesspolicies.Ofcourse, 
terminatedemployees,contractors,andtrustedbusinesspartners 
shouldnothavephysicalaccesstononpublicareasofyourfacilities. 
ThispracticedetailslessonslearnedfromcasesintheCERTdatabasein 
whichphysicalaccessvulnerabilitiesallowedaninsidertoattack.
Practice 7: Implement strict password and account management
policies and practices.
Nomatterhowvigilantyouareintryingtopreventinsiderattacks, 
ifyourcomputeraccountscanbecompromised,insidershavean 
opportunitytocircumventbothmanualandautomatedcontrols. 
Password-andaccount-managementpoliciesandpracticesshould 
applytoemployees,contractors,andbusinesspartners.Theyshould 
ensurethatallactivityfromanyaccountisattributabletotheperson 
whoperformedit.Ananonymousreportingmechanismshouldbe 
availableandusedbyemployeestoreportattemptsatunauthorized 
accountaccess,includingpotentialattemptsatsocialengineering. 
Auditsshouldbeperformedregularlytoidentifyanddisableunneces-
saryorexpiredaccounts.
Practice 8: Enforce separation of duties and least privilege.
Ifemployeesareadequatelytrainedinsecurityawareness,and 
responsibilityforcriticalfunctionsisdividedamongemployees,the 
possibilitythatoneindividualcouldcommitfraudorsabotagewith-
outthecooperationofanotherindividualwithintheorganizationis 
reduced.Effectiveseparationofdutiesrequirestheimplementationof 
least privilege;thatis,authorizinginsidersonlyfortheresourcesthey 
needtodotheirjobs,particularlywhentheytakeondifferentpositions 
orresponsibilitieswithintheorganization.
Practice 9: Consider insider threats in the Software Development Life
Cycle.
Manyinsiderincidentscanbetiedeitherdirectlyorindirectlytodefects 
introducedduringtheSoftwareDevelopmentLifeCycle(SDLC).Some 
cases,suchasthoseinvolvingmaliciouscodeinsertedintosource 
code,haveanobvioustietotheSDLC.Others,suchasthoseinvolving 
ptg7481383
SummaryofPractices 149
insiderswhotookadvantageofinadequateseparationofduties,have 
anindirecttie.Thispracticedetailsthetypesofoversightsthroughout 
theSDLCthatenabledinsiderstocarryouttheirattacks.
Practice 10: Use extra caution with system administrators and
technical or privileged users.
Systemadministratorsandprivilegeduserssuchasdatabase 
administrators(DBAs)havethetechnicalabilityandaccesstocom-
mitandconcealmaliciousactivity.Technicallyadeptindividualsare 
morelikelytoresorttotechnicalmeanstoexactrevengeforperceived 
wrongs.Techniquessuchasseparationofdutiesorthetwo-person 
ruleforcriticalsystemadministratorfunctions,nonrepudiationof 
technicalactions,encryption,anddisablingaccountsupontermination 
canlimitthedamageandpromotethedetectionofmalicioussystem 
administratorandprivilegeduseractions.
Practice 11: Implement system change controls.
Awidevarietyofinsidercompromisesreliedonunauthorized 
modificationstotheorganization’ssystems,whicharguesforstronger 
changecontrolsasamitigationstrategy.Systemadministratorsorpriv-
ilegeduserscandeploybackdooraccounts,unauthorizedhardware, 
logicbombs,orothermaliciousprogramsonthesystemornetwork. 
Thesetypesofattacksarestealthyandthereforedifficulttodetect, 
buttechnicalcontrolscanbeimplementedforearlydetection.Once 
baselinesoftwareandhardwareconfigurationsarecharacterized,com-
parisontothecurrentconfigurationcandetectdiscrepanciesandalert 
managersforaction.
Practice 12: Log, monitor, and audit employee online actions.
Ifaccountandpasswordpoliciesandproceduresareenforced,you 
canassociateonlineactionswiththeemployeewhoperformedthem. 
Logging,periodicmonitoring,andauditingprovideanorganization 
theopportunitytodiscoverandinvestigatesuspiciousinsideractions 
beforemoreseriousconsequencesensue.Inadditiontounauthor-
izedchangestothesystems,downloadofconfidentialorsensitive 
informationsuchasintellectualproperty(IP),customerorclientinfor-
mation,andPersonallyIdentifiableInformation(PII)canbedetected 
viadata-leakagetools.
Practice 13: Use layered defense against remote attacks.
Ifemployeesaretrainedandvigilant,accountsareprotectedfrom 
compromise,andemployeesknowthattheiractionsarebeinglogged 
andmonitored,disgruntledinsiderswillthinktwiceabout  attacking 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
150
systemsornetworksatwork.Insiderstendtofeelmoreconfident 
andlessinhibitedwhentheyhavelittlefearofscrutinybycoworkers; 
therefore,remoteaccesspoliciesandproceduresmustbedesignedand 
implementedverycarefully.Whenremoteaccesstocriticalsystemsis 
deemednecessary,youshouldconsideroffsettingtheaddedriskwith 
requiringconnectionsonlyviaorganization-ownedmachinesand 
closerloggingandfrequentauditingofremotetransactions.  Disabling 
remoteaccessandcollectionofyourequipmentis  particularly 
importantfor  terminatedemployees.
Practice 14: Deactivate computer access following termination.
Whenanemployeeorcontractorterminatesemployment,whether 
thecircumstanceswerefavorableornot,itisimportantthatyou 
haveinplacearigorousterminationprocedurethatdisablesallofthe 
employee’saccesspointstoyourphysicallocations,networks,systems, 
applications,anddata.Fastactiontodisableallaccesspathsavail-
abletoaterminatedemployeerequiresongoingandstricttracking 
andmanagementpracticesforallemployeeavenuesofaccessinclud-
ingcomputersystemaccounts,sharedpasswords,andcard-control 
systems.
Practice 15: Implement secure backup and recovery processes.
Noorganizationcancompletelyeliminateitsriskofinsiderattack;risk 
isinherentintheoperationofallorganizations.However,withagoalof 
organizationalresiliency,risksmustbeacceptabletothestakeholders, 
andassuch,impactsofpotentialinsiderattacksmustbeminimized. 
Therefore,itisimportantforyoutoprepareforthepossibilityofinsider 
attackandminimizeresponsetimebyimplementingsecurebackup 
andrecoveryprocessesthatavoidsinglepointsoffailureandaretested 
periodically.Thispracticecontainsdescriptionsofinsiderthreatcases 
inwhichtheorganization’slackofattentiontoincidentresponseand 
organizationalresiliencyresultedinseriousdisruptionofservicetoits 
customers.
Practice 16: Develop an insider incident response plan.
Youneedtodevelopaninsiderincidentresponseplantocontrolthe
damageduetomaliciousinsiders.Thisischallengingbecausethe
samepeopleassignedtoaresponseteammaybetheinsiderswho
canusetheirtechnicalskillsagainstyou.Onlythoseresponsiblefor
carryingouttheplanneedtounderstandandbetrainedonitsexecu-
tion.Shouldaninsiderattack,itisimportantthatyouhaveevidence
inhandto  identifytheinsiderandfollowupappropriately.Lessons
learnedshouldbeusedtocontinuallyimprovetheplan.
ptg7481383
151Practice1:ConsiderThreatsfromInsidersandBusinessPartners
Practice 1: Consider Threats from Insiders and Business
Partners in Enterprise-Wide Risk Assessments
Youneedtodevelopacomprehensiverisk-basedsecuritystrategyto 
protectyourcriticalassetsagainstthreatsfrominsideandoutside,aswell 
astrustedbusinesspartnerswhoaregivenauthorizedinsideraccess.
What Can You Do?
Itisnotpracticalformostorganizationstoimplement100%protection 
againsteverythreattoeveryorganizationalresource.Therefore,itisimpor-
tanttofocusonprotectingyourcriticalinformationandresourcesandnot 
directsignificantefforttowardprotectingrelativelyunimportantdataand 
resources.Arealisticandachievablesecuritygoalistoprotectthoseassets 
deemedcriticaltoyourmissionfrombothexternalandinternalthreats.
Riskisthecombinationofthreat,vulnerability,andmissionimpact. 
Enterprise-wideriskassessmentshelpidentifycriticalassets,potential 
threatstothoseassets,andmissionimpactiftheassetsarecompromised. 
Youshouldusetheresultsoftheassessmenttodeveloporrefineyourover-
allstrategyforsecuringyoursystems,strikingtheproperbalancebetween 
counteringthethreatandaccomplishingyourmission.2
Youneedtounderstandthethreatenvironmentunderwhichyour  systems 
operateinordertoaccuratelyassessenterpriserisk.Characterizationof 
thethreatenvironmentcanproceedinparallelwithevaluationofthevul-
nerabilityanditsimpact.However,thesoonerthethreatenvironmentcan 
becharacterized,thebetter.Thepurposeofthispracticeistoassistyou 
incorrectlyassessingtheinsiderthreatenvironment,yourvulnerabilities 
thatenablethatthreat,andpotentialimpactsthatcould result frominsider 
incidents,includingfinancial,operational,andreputational.
Unfortunately,manyorganizationsfocusonprotectinginformationfrom 
accessorsabotagebythoseexternaltotheorganizationandoverlookinsid-
ers.Moreover,aninformationtechnologyandsecuritysolutiondesigned 
withoutconsciouslyacknowledgingandaccountingforpotentialinsider 
threatsoftenleavestheroleofprotectioninthehandsofsomeofthe 
potentialthreats—theinsidersthemselves.Itisimperativethatyourec-
ognizethepotentialdangerposedbytheknowledgeandaccessofyour 
employees,contractors,andbusinesspartners,andspecificallyaddress 
thatthreataspartofanenterpriseriskassessment.
2.  Seewww.cert.org/resilience/.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
152
Understandingyourvulnerabilitytoathreatisalsoimportant,but 
organizationsoftenfocusonlow-leveltechnicalvulnerabilities,for 
example,byrelyingonautomatedcomputerandnetworkvulnerability 
scanners.Whilesuchtechniquesareimportant,ourstudiesofinsiderthreat 
haveindicatedthatvulnerabilitiesinanorganization’sbusinessprocesses 
areatleastasimportantastechnicalvulnerabilities.Youneedtomanage 
theimpactofthreatsratherthanchaseindividualtechnicalvulnerabilities.
Inaddition,newareasofconcernhavebecomeapparentinrecentcases, 
includinglegalandcontractingissues.Organizationsareincreasinglyout-
sourcingcriticalbusinessfunctions.Asaresult,peopleexternaltoyour 
organizationsometimeshavefullaccesstoyourpolicies,processes,infor-
mation,andsystems;accessandknowledgepreviouslyonlyprovidedto 
youremployees. Youneedtorecognizetheincreasedrisk;yourenterprise 
boundaryincludesallpeoplewhohaveanunderstandingofandprivi-
legedaccesstoyourorganization,information,andinformationsystems.
Insiderthreatsmayimpacttheintegrity,availability,orconfidentiality 
of  informationcriticaltoyourmission.Insidershaveaffectedtheinteg-
rityoftheirorganizations’informationinvariousways;forexample,by 
manipulatingcustomerfinancialinformationordefacingtheiremploy-
ers’Websites.Theyhavealsoviolatedconfidentialityofinformationby 
stealingtradesecretsorcustomerinformation.Stillothershaveinap-
propriatelydisseminatedconfidentialinformation,includingprivate 
customerinformationaswellassensitiveemailmessagesbetweenthe 
organization’smanagement.Finally,insidershaveaffectedtheavailabil-
ityoftheirorganization’sinformationbydeletingdata,sabotagingentire 
systemsandnetworks,destroyingbackups,andcommittingothertypesof 
denial-of-serviceattacks.
Inthosetypesofinsiderincidents,currentorformeremployees,  contractors, 
orbusinesspartnerswereabletocompromisetheirorganizations’critical 
assets.Itisimportantthatprotectionstrategiesaredesignedfocusingon 
thoseassets:financialdata,confidentialorproprietaryinformation,and 
othermission-criticalsystemsanddata.
Case Studies: What Could Happen if I Don’t Do It?
Aninsiderwasthesolesystemadministratorforhisorganization.One 
day,hequitwithnopriornotice.Hisorganizationrefusedtopayhim 
forhislasttwodaysofwork,andhesubsequentlyrefusedtogivethe 
organizationthepasswordsforitssystemadministratoraccounts.Overa 
periodofthreedays,theinsidermodifiedthesystemssothatemployees 
couldnotaccessthem,defacedthecompanyWebsite,anddeletedfiles.
ptg7481383
153Practice1:ConsiderThreatsfromInsidersandBusinessPartners
Itiscriticalthatyouconsidertheriskyouassumewhenyouplaceall
systemadministrationpowerintothehandsofasingleemployee.Evenif
youarepartofalargeorganization,donotoverlooksmalldevelopment
teams,stand-alonemachines,andotherindependentlymaintainedsystems
inyourorganizationthatarenotapartofyourenterpriseinfrastructure.We
knowfromdoinginsiderthreatassessmentsthateventhelargestorganiza-
tionshavethesetypesofsystems,whichcanbeapartofcriticalprojectsand
developmentorevenproductionsystems.Worstofall,therelikelyhasbeen
noformalrisk  assessmentperformedthataccountsforpotentialinsider
threats.
Onecaseinvolvedanemployeeofacompanythatobtainedacontract 
tosetupanewwirelessnetworkforamajormanufacturer.Theinsider 
wasontheinstallationteamandthereforehaddetailedknowledgeofthe 
manufacturer’ssystems.Hewasremovedfromtheteambyhisemployer, 
apparentlyundernegativecircumstances.However,hewasabletoenter 
themanufacturingplantandaccessacomputerkioskinthevisitors’lobby. 
Basedonhisfamiliaritywiththemanufacturer’scomputersystemand 
security,hewasabletousethekiosktodeletefilesandpasswordsfrom 
wirelessdevicesusedbythemanufactureracrossthecountry.Themanu-
facturerwasforcedtoremoveandrepairthedevices,causingwide-scale 
shutdownoffacilitiesanddisruptionofitsprocesses.
Thiscasehighlightsseveralnewinsiderthreatissues.First,an 
enterprise-wideriskassessmentshouldhaveidentifiedtheabilitytoover-
ridesecurityandobtainprivilegedaccesstothemanufacturer’snetwork 
fromapubliclyaccessiblekiosk.Second,themanufacturer’scontract 
withtheinsider’sorganizationshouldhaveinstitutedstrictcontrolsover 
employeesaddedtoorremovedfromtheproject.Specifically,youshould 
considerprovisionsinyourcontractsthatrequireadvancenotificationby 
thecontractedorganizationofanynegativeemploymentactionsbeing 
plannedagainstanyemployeeswhohavephysicaland/orelectronic 
accesstoyourfacilitiesorsystems.Youcouldrequirenotificationaspec-
ifiedamountoftimebeforetheactionistakenagainstthecontractor,in 
ordertoperformyourownriskassessmentforthepotentialthreatposedto 
yournetwork,systems,orinformation.
Acomputerhelpdeskattendantemployedbyagovernmentcontractor 
createdfakegovernmentemailaddressesonthegovernmentsystemsfor 
whichhewasresponsible.Hethenusedthoseemailaddressestorequest
replacementpartsforequipmentrecalledbyamajorsupplier.Thesupplier 
sentthereplacementpartstotheaddressspecifiedintheemails,withthe 
expectationthattheoriginalrecalledproductswouldbereturnedafterthe 
replacementshadbeenreceived.Theinsiderprovidedhishomeaddress 
fortheshipments,andneverintendedtoreturntheoriginalequipment. 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
154
Hereceivedalmost100shipmentswitharetailvalueofalmost$5million 
andsoldtheequipmentontheInternet.
Thisincidentindicatestheneedtohavetransactionverificationbuiltinto 
supplieragreements.Eventhoughoperationsmightbeoutsourced,you 
stillneedtoincludethoseoperationsinyourenterpriseriskassessment 
sothatyoucanensurethatyourtrustedbusinesspartnersimplement 
adequatecontrolsagainstinsiderthreatintheirorganizations.
Asystemadministratorhadauthorizedaccesstosanitizeddatabasesof
customerinformationonanFTPserverhostedbyoneofhisorganiza-
tion’sbusinesspartners.Thebusinesspartnerwascontractedbyfinancial
institutionsandphonecompaniestoperformservicesusingcustomer
data.Helocatedanunsanitizedversionofthesecustomerdatabases
whenlookingaroundontheFTPserver.Thedatabaseswereprotected
withpasswordsandencryption.Theinsiderranapasswordcracking
utilityandobtainedmorethan300passwordshecouldusetoaccessthe
protectedinformation.Hefoundoriginalandcompletephonerecords,
billinginformation,andotherPIIformillionsofAmericans.Heproceeded
todownloadmillionsofcustomerrecordsfromthedatabases,including
SocialSecuritynumbers,birthdates,andotherpersonalinformation.The
insiderbraggedinonlineIRCchannelsabouthisaccesstoconfidential
andpersonaldata,andwasaskedatonepointbyanotherindividualin
thechatroomtoprovidedataonanFBIagentwhowasactivelyinves-
tigatinghim.Theinsiderprovidedtheinformationwithinminutes.The
ongoingFBIinvestigationofthatindividualledbacktotheinsider,who
wasfoundwithdozensofCDsandothermediacontainingmillionsof
customerrecordsinhisapartment.
Inthiscase,proprietaryinformationfromtheoriginalorganizations’ 
customerswasinadequatelyprotectedfromaccessbyathirdorgani-
zationthatwassubcontractedbyasecondorganization,thetrusted 
businesspartner.Legalcontrolstoensurecontractorcompliancewithyour 
data-handlingpoliciescouldbeemployedtoprotectagainsttheextended 
poolofinsiderscreatedbyworkingwithvendorsandotherexternalpart-
ners.Thesemeasureswouldallowcontractorstoperformtheirwork,while 
protectingyoursensitiveinformation.
ptg7481383
Practice2:ClearlyDocumentandConsistentlyEnforcePoliciesandControls 155
Practice 2: Clearly Document and Consistently Enforce
Policies and Controls
Aconsistent,clearmessageonorganizationalpoliciesandcontrolswill 
helpreducethechancethatemployeeswillcommitacrimeorlashoutat 
theorganizationforaperceivedinjustice.
What Can You Do?
Policiesorcontrolsthataremisunderstood,notcommunicated,or 
inconsistentlyenforcedcanbreedresentmentamongemployeesandcan 
potentiallyresultinharmfulinsideractions.Forexample,multipleinsiders 
incasesintheCERTdatabasetookintellectualpropertytheyhadcreated 
toanewjob,notrealizingthattheydidnotownit.Theywerequitesur-
prisedwhentheywerearrestedforacrimetheydidnotrealizetheyhad 
committed.
Youshouldensurethefollowingwithregardtoyourpoliciesandcontrols:
Conciseandcoherentdocumentation,includingreasoningbehindthe 
policy,whereapplicable
Fairnessforallemployees
Consistentenforcement
Periodicemployeetrainingonthepolicies,justification,implementa-
tion,andenforcement
Youshouldbeparticularlyclearonpoliciesregarding
Acceptableuseofyoursystems,information,andresources
Ownershipofinformationcreatedasapaidemployeeorcontractor
Evaluationofemployeeperformance,includingrequirementsfor 
promotionandfinancialbonuses
Processesandproceduresforaddressingemployeegrievances
Asindividualsjoinyourorganization,theyshouldreceiveacopyofyour 
policiesthatclearlylaysoutwhatisexpectedofthem,togetherwiththe 
consequencesofviolations.Youshouldretainevidencethateach  individual 
hasreadandagreedtoyourpolicies.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
156
Employeedisgruntlementwasarecurringfactorininsiderincidents; 
particularlyininsiderITsabotagecases.AsexplainedinChapter2,Insider 
ITSabotage,disgruntlementisusuallycausedbysomeunmet  expectation 
onthepartoftheinsider.Examplesofunmetexpectationsobservedin 
casesinclude
Insufficientsalaryincreaseorbonus
Limitationsonuseofcompanyresources
Diminishedauthorityorresponsibilities
Perceptionofunfairworkrequirements
Poorcoworkerrelations
Cleardocumentationofpoliciesandcontrolscanhelppreventemployee 
misunderstandingsthatcanleadtounmetexpectations.Consistent 
enforcementcanensurethatemployeesdon’tfeeltheyarebeingtreated 
differentlyfromorworsethanotheremployees.Inonecase,employees 
hadbecomeaccustomedtolaxpolicyenforcementoveralongperiodof 
time.Newmanagementdictatedimmediatestrictpolicyenforcement, 
whichcausedoneemployeetobecomeembitteredandstrikeoutagainst 
theorganization.Inotherwords,policiesshouldbeenforcedconsistently 
acrossallemployees,aswellasconsistentlyenforcedovertime.
Ofcourse,organizationsarenotstaticentities;changeinorganizational 
policiesandcontrolsisinevitable.Employeeconstraints,privileges,and 
responsibilitieschangeaswell.Youneedtorecognizetimesofchange 
asparticularlystressfultimesforemployees,recognizetheincreased 
riskthatcomesalongwiththesestresspoints,andmitigateitwithclear 
communicationregardingwhatemployeescanexpectinthefuture.
Case Studies: What Could Happen if I Don’t Do It?
Twocontractorswereformerlyemployedassoftwaredevelopersfora 
companythatprovidednewsfilteringanddistributionservicestoWeb
sites.Inresponsetotheirtermination,theirlegalcounselfaxedaletter 
tothecompany.Theletterinsistedthattheinsidersownedthesoftware 
theyhadcreatedduringtheiremployment,anddemandedthatthecom-
panystopusingthesoftwareandreturnallcopiestothem.Ontheevening 
beforeaholiday,theinsidersusedahomecomputerandtheirowncreden-
tials,whichwerestillactive,toremotelyaccessthecompany’snetwork 
anddownloadtheproprietarysoftwareandbusinessplans.Theinsiders 
werearrestedafterthecompanydiscoveredtheunauthorizedaccess,and 
connectedthemtothetheftusingtheirusernamesandsystemlogs.
ptg7481383
Practice2:ClearlyDocumentandConsistentlyEnforcePoliciesandControls 157
Inthiscase,itisclearthattherewasconfusionregardingwhoownedthe 
softwarethecontractorshadcreatedforthecompany.Intellectualproperty 
ownershipshouldbedocumentedinformalpoliciesthatareclearlycom-
municatedtoallemployeesandcontractuallyenforcedforallcontractors 
andtrustedbusinesspartners.Inaddition,youshouldhaveyouremploy-
eesre-signtheagreementsperiodically.Wehavediscussedthiswith 
severalorganizationswhoinstitutedIPagreementsforallemployeesmore 
than20yearsago.Allemployeessignedthematthattime,andallnew 
employeesnowsignthem.However,someemployeeshavenotsigned 
againsincetheyoriginallysignedmorethan20yearsago!Itisdebatable 
whetherthoseagedagreementswouldstandupinacourtoflaw!
YoumightalsoconsiderincorporatinganewangleintoyourIP  agreements 
toprotectyourselffrombeingtheunknowingrecipientofstolenIPfrom 
anotherorganization.AspartofyourIPagreementthatyoumakenew 
employeessign,youmightwanttoincludeastatementattestingtothefact 
thattheyhavenotbroughtanyIPfromanypreviousemployerwiththem 
toyourorganization.
Aninsideracceptedapromotion,leavingasystemadministratorposition 
inonedepartmentforapositionasasystemsanalystinanotherdepart-
mentofthesameorganization.Inhisnewposition,hewasresponsiblefor 
informationsharingandcollaborationbetweenhisolddepartmentand 
thenewone.Thefollowingeventsensued.
Theoriginaldepartmentterminatedhissystemadministratoraccount 
andissuedhimanordinaryuseraccounttosupporttheaccessrequired
inhisnewposition.
Shortlythereafter,thesystemsecuritymanagerattheoriginal 
departmentnoticedthattheformeremployee’snewaccounthadbeen 
grantedunauthorizedsystemadministrationrights.
Thesecuritymanagerresettheaccountbacktoordinaryaccessrights, 
butadaylaterfoundthatadministrativerightshadbeengrantedtoit 
onceagain.
Thesecuritymanagerclosedtheaccount,butoverthenextfewweeks 
otheraccountsexhibitedunauthorizedaccessandusagepatterns.
Aninvestigationoftheseeventsledtochargesagainsttheanalystfor 
misuseoftheorganization’scomputingsystems.Thesechargeswere 
eventuallydropped,inpartbecausetherewasnoclearpolicyregard-
ingaccountsharingorexploitationofvulnerabilitiestoelevateaccount 
privileges.
Thiscaseillustratestheimportanceofclearlyestablishedpoliciesthatare 
consistentacrossdepartments,groups,andsubsidiariesofthe  organization.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
158
TherearemanycasesintheCERTdatabasewhereanemployee 
compromisedanorganization’sinformationorsysteminordertoaddress 
someperceivedinjustice.
Aninsiderplantedalogicbombinanorganization’ssystembecause 
hefeltthathewasrequiredtofollowstricterworkstandardsthanhis 
fellowemployees.
Inreactiontoalowerbonusthanexpected,aninsiderplantedalogic 
bombthatwould,heexpected,causetheorganization’sstockvalueto 
godown,thuscausingstockoptionsheownedtoincreaseinvalue.
Anetworkadministratorwhodesignedandcontrolledanorgani-
zation’smanufacturingsupportsystemsdetonatedalogicbombto 
destroyhiscreationbecauseofhisperceivedlossofstatusandcontrol.
Aquality-controlinspector,whobelievedhisemployerinsufficiently 
addressedthequalityrequirementsofitsproduct,suppliedconfiden-
tialcompanyinformationtothemediatoforcethecompanytodeal 
withtheproblem.
Aninsider,whowasupsetabouthiscompany’spracticeofcanceling 
insurancepoliciesforpolicyholderswhopaidlate,providedsensitive 
companyinformationtotheopposinglawyersengagedinalawsuit 
againstthecompany.
Whattheseinsidersdidiswrongandagainstthelaw.Nevertheless,more 
clearlydefinedpoliciesandgrievanceproceduresforperceivedpolicyvio-
lationsmighthaveavoidedtheseriousinsiderattacksexperiencedbythese 
organizations.
ptg7481383
Practice3:InstitutePeriodicSecurityAwarenessTrainingforAllEmployees 159
Practice 3: Institute Periodic Security Awareness
Tra in ing fo r Al l Em pl oyees
Withoutbroadunderstandingandbuy-infromtheorganization,technical 
ormanagerialcontrolswillbeshort-lived.
What Can You Do?
Allemployeesneedtounderstandthatinsidercrimesdooccur,andthere 
aresevereconsequences.Inaddition,itisimportantforthemtounder-
standthatmaliciousinsiderscanbehighlytechnicalpeopleorthosewith 
minimaltechnicalability.AgesofperpetratorsintheCERTdatabaserange 
fromlateteenstoretirement.Bothmenandwomenhavebeenmalicious 
insiders,includingintroverted“loners,”aggressive“getitdone”people, 
andextroverted“starplayers.”Positionshaveincludedlow-wagedata 
entryclerks,cashiers,programmers,artists,systemandnetworkadminis-
trators,salespersons,managers,andexecutives.Theyhavebeennewhires, 
long-termemployees,currentlyemployed,recentlyterminated,contrac-
tors,temporaryemployees,andemployeesoftrustedbusinesspartners. 
Thereisnotonedemographicprofileforamaliciousinsider.
Securityawarenesstrainingshouldencourageobservationofbehaviorin
theworkplacetoidentifyemployeeswhomaybeathigherriskofmalicious
activity,notbystereotypicalcharacteristics.Behaviorsofconcerninclude
Threatsagainsttheorganizationorbraggingaboutthedamageone 
coulddototheorganization
Associationwithknowncriminalsorsuspiciouspeopleoutsidethe 
workplace
Largedownloadsclosetoresignation
Useoforganizationresourcesforasidebusiness,ordiscussions 
regardingstartingacompetingbusinesswithcoworkers
Attemptstogainemployees’passwordsortoobtainaccessthrough 
trickeryorexploitationofatrustedrelationship(oftencalledsocial 
engineering)
Yourmanagersandemployeesneedtobetrainedtorecognizerecruitment
inwhichaninsiderengagesotheremployeestojoinhisschemes,particu-
larlytostealormodifyinformationforfinancialgain.Warningemployees 
ofthispossibilityandtheconsequencesmayhelptokeepthemonthe 
watchforsuchmanipulationandtoreportittomanagement.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
160
Socialengineeringisoftenassociatedwithattemptstogaineitherphysical 
accessorelectronicaccessviaaccountsandpasswords.SomeoftheCERT 
databasecasesrevealsocialengineeringofadifferenttype,however.Inone 
case,adisgruntledemployeeplacedahardwarekeystrokeloggeronacom-
puteratworktocaptureconfidentialcompanyinformation.Afterbeing 
firedunexpectedly,thenow-formeremployeetriedtoco-optanontechni-
calemployeestillatthecompanytorecoverthedeviceforhim.Although 
theemployeehadnoideathedevicewasakeystrokelogger,shewassmart 
enoughtorecognizetheriskofprovidingittohimandnotifiedmanage-
mentinstead.Forensicsrevealedthathehadtransferredthekeystrokesfile 
tohiscomputeratworkatleastoncebeforebeingfired.
Trainingprogramsshouldcreateacultureofsecurityappropriateforyour 
organizationandincludeallpersonnel.Foreffectivenessandlongevity,the 
measuresusedtosecureyourorganizationagainstinsiderthreatneedtobe 
tiedtotheorganization’smission,values,andcriticalassets,asdetermined 
byanenterprise-wideriskassessment.Forexample,ifyourorganization 
placesahighvalueoncustomerservicequality,youmayviewcustomer 
informationasitsmostcriticalassetandfocussecurityonprotectionof 
yourdata.Yourorganizationcouldtrainyouremployeestobevigilant 
againstmaliciousemployeeactions,focusingonanumberofkeyissues, 
including
Detectingandreportingdisruptivebehaviorbyemployees(see 
Practice4)
Monitoringadherencetoorganizationalpoliciesandcontrols(see 
Practices2and11)
Monitoringandcontrollingchangestoorganizational  systems—
forexample,topreventtheinstallationofmaliciouscode(see 
Practices9and11)
Requiringseparationofdutiesbetweenemployeeswhomodify 
customeraccountsandthosewhoapprovemodificationsorissue 
payments(seePractice8)
Detectingandreportingviolationsofthesecurityoftheorganization’s 
facilitiesandphysicalassets(seePractice6)
Planningforpotentialincidentresponseproactively(seePractice16)
Trainingonreducingriskstocustomerserviceprocesseswouldfocuson
Protectingcomputeraccountsusedintheseprocesses(seePractice7)
Auditingaccesstocustomerrecords(seePractice12)
ptg7481383
Practice3:InstitutePeriodicSecurityAwarenessTrainingforAllEmployees 161
Ensuringconsistentenforcementofdefinedsecuritypoliciesand 
controls(seePractice2)
Implementingpropersystemadministrationsafeguardsforcritical 
servers(seePractices10,11,12,and13)
Usingsecurebackupandrecoverymethodstoensureavailabilityof 
customerservicedata(seePractice15)
Trainingcontentshouldbebasedondocumentedpolicies,andinclude 
aconfidentialmeansofreportingsecurityissues.Confidentialreport-
ingallowsreportingofsuspiciouseventswithoutfearofrepercussions,
therebyovercomingtheculturalbarrierofwhistle-blowing.Youremploy-
eesneedtounderstandyourorganization’spoliciesandprocedures,and 
beawarethatyourmanagerswillrespondtosecurityissuesinafairand 
promptmanner.
Youremployeesshouldbenotifiedthatsystemactivityismonitored, 
especiallysystemadministrationandprivilegedactivity.Allemploy-
eesshouldbetrainedintheirpersonalresponsibility,suchasprotection 
oftheirownpasswordsandworkproducts.Finally,thetrainingshould 
communicateITacceptableusepolicies.
AsdescribedinChapter4,InsiderFraud,inmanyoftheinsiderfraud 
incidents the insider was recruited to steal by someoneoutside the organi-
zation.Inmanyofthesecases,theinsiderwastakingmostoftheriskwhile 
receivingrelativelysmallfinancialcompensation.Theoutsiderwasoftena 
relativeoftheinsideroranacquaintancewhorealizedthevalueofexploit-
ingtheinsider’saccesstoinformation.Onemanagerofahospital’sbilling 
recordsgavepatients’creditcardinformationtoherbrother,whousedit 
foronlinepurchasesshippedtohishomeaddress.Anotherinsiderinthe 
humanresourcesdepartmentforafederalgovernmentorganizationgave 
employeePIItoherboyfriend,whousedittoopenandmakepurchaseson 
fraudulentcreditcardaccounts.
Youshouldeducateyouremployeesontheirresponsibilitiesfor  protecting 
theinformationwithwhichtheyareentrusted,andthepossibilitythat 
unscrupulousindividualscouldtrytotakeadvantageoftheiraccessto 
thatinformation.Suchindividualsmaybeinsideoroutsidetheorgani-
zation.Inmanyofthefraudcaseswhereinsidersmodifiedinformation 
forfinancialgain,theinsiderrecruitedatleastoneotheremployeeinthe 
organizationtoparticipateinthescheme,possiblyasameanstobypass 
separationofdutyrestrictions,ortoensurethatcoworkerswouldn’treport
suspiciousbehavior.Inonecase,severalbankjanitorialemployeesstole 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
162
customerinformationwhileworking,changedthecustomeraddresses 
online,openedcreditcardsintheirnames,purchasedexpensiveitems 
usingthecards,anddrainedtheirbankaccounts.Youremployeesshould 
beregularlyremindedaboutproceduresthecompanyhasinplacefor 
anonymouslyreportingsuspiciouscoworkerbehavior,orattemptsof 
recruitmentbyindividualsinsideoroutsidetheorganization.
InChapter3,InsiderTheftofIntellectualProperty,weindicatedthatmany 
casesinvolvetechnicalemployeeswhostoletheirorganization’sintellec-
tualpropertybecauseofdissatisfaction.Signsofdisgruntlementincases 
likethoseoftenappearwellbeforetheactualcompromise.Suchattackscan 
bepreventedifmanagersandcoworkersareeducatedtorecognizeand 
reportbehavioralprecursorsindicatingpotentialattacks.
Finally,youremployeesneedtobeeducatedabouttheconfidentiality 
andintegrityofyourcompany’sinformation,andthatcompromiseswill 
bedealtwithimmediately.SomeinsidersintheCERTdatabasedidnot 
understandthis,viewinginformationasbeingtheirownpropertyrather 
thantheorganization’s;forexample,customerinformationdevelopedbya 
salespersonorsoftwaredevelopedbyaprogrammer.
Case Studies: What Could Happen if I Don’t Do It?
Acontractorwasemployedasaprogrammerbyahigh-technology 
company.Herequestedtoworkremotelyfromhome,hisrequestwas 
denied,andheinformedtheorganizationthathewouldberesigning.
Heactuallyhadobtainedemploymentwithacompetitor.Ontheevening 
beforehislastdayofwork,hereturnedtothefacility,outsideofnormal 
workhours.Heenteredabuildingwhichwasnothisnormalworkloca-
tionandremovedthenameplatefromanengineer’soffice.Hethenasked 
ajanitortolethimin,claimingitwashisofficeandhe’dbeenaccidentally 
lockedout.Thejanitorcompliedwiththerequest;theinsidernowhad 
physicalaccesstoallofthecomputersintheengineer’soffice.
Youprobablythinkyouknowtheendingtothiscase,right?Hestolethe 
informationandlefttheoffice.Notquite;readon…
Theengineerwhooccupiedthatofficehappenedtowalkin—andcaught 
theinsiderintheactofstealinghisproprietarysourcecodefromhis 
computer.Theinsiderquicklymadeupafalseexplanationastowhyhe 
wasthere,andpromptlyleft.Thefollowingday,theinsiderreportedfor 
hislastdayofwork,andwasobservedleavingwithaCD.Theorgani-
zationreportedhimtolawenforcement,thinkinghemighthavestolen 
ptg7481383
Practice3:InstitutePeriodicSecurityAwarenessTrainingforAllEmployees 163
itsintellectualpropertyontheCD.Aninvestigationconfirmedthetheft, 
specificallyofproprietarysourcecode.Thecontractorwasarrested, 
convicted,andsentencedtooneyearofworkfurlough.
Thiscasedemonstratesmanyinterestingsecurityawarenessissues.First, 
wouldyourcustodialstafforsecurityguardsfallforthatscheme?Don’t 
forgetthemwhenpreparinganddeliveringyoursecurityawarenesstrain-
ing!Second,doyoueducateyouremployeestoreportsuspiciousactivity 
intheiroffices?Wouldtheyfallforthisploy?Whatwouldyouremploy-
eesdoiftheycaughtsomeoneintheirofficeafterhours?Finally,thereis 
goodnewsattheendofthiscase:Theorganizationwassuspiciousenough 
tonotifylawenforcementofthedepartingcontractorcarryingaCDout 
withhim.
Theleaddeveloperofamission-criticalsafety-relatedapplicationhad 
extensivecontrolovertheapplicationsourcecode.Theonlycopyofthe 
sourcecodewasonhislaptop,therewerenobackupsperformed,and 
verylittledocumentationexisted,eventhoughmanagementhadrepeat-
edlyrequestedit.Theinsidertoldcoworkershehadnointentionof 
documentingthesourcecodeandanydocumentationhedidwritewould 
beobscure.
Amonthafterlearningofapendingdemotion,heerasedtheharddrive 
ofhislaptop,deletingtheonlycopyofthesourcecodetheorganization 
possessed,andquithisjob.Ittookmorethantwomonthstorecoverthe 
sourcecodeafteritwaslocatedbylawenforcementinencryptedform 
attheinsider’shome.Anotherfourmonthselapsedbeforetheinsider 
providedthepasswordtodecryptthesourcecode.Duringthistimethe 
organizationhadtorelyontheexecutableversionoftheapplication,with 
noabilitytomakeanymodifications.
Thiscasecouldhavehaddireconsequencesduetothecriticalnatureof 
theapplication.Howcouldtheproblemhavebeenavoided?Wecouldsay 
thatmanagementshouldhavehadmoredirectoversightofthedevelop-
mentprocess,butthemaliciousinsiderwastheleaddeveloper,soyou 
can’tnecessarilyblamemanagementcompletely.However,theinsider’s 
teammemberswereawareoftheinsider’sdeliberateinaction;theycould 
haveinformedmanagementofhisstatementsandactionsintimetopre-
venttheattack.Thiscasedemonstratestheimportanceofeducatingallof 
youremployeesthatthesecurityandsurvivabilityofthesystemisevery-
one’sresponsibility,aswellasclearproceduresforreportingconcerning 
behavior.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
164
Practice 4: Monitor and Respond to Suspicious or
Disruptive Behavior, Beginning with the Hiring Process
Onemethodofreducingthethreatofmaliciousinsidersistoproactively 
dealwithsuspiciousordisruptiveemployees.
What Can You Do?
Yourapproachtoreducingtheinsiderthreatshouldstartinthehiring 
processbyperformingbackgroundchecksandevaluatingprospective 
employeesbasedontheinformationreceived.Backgroundchecksshould 
investigatepreviouscriminalconvictions,includeacreditcheck,verify 
credentialsandpastemployment,andincludediscussionswithprior 
employersregardingtheindividual’scompetenceandapproachtodealing 
withworkplaceissues.Whencreatingapreemploymentscreeningpolicy 
orotherpoliciesrecommendedinthispractice,itisimportanttokeepin 
mindprivacyandlegalrequirements(e.g.,notificationofthecandidate).
RecallfromChapter2that30%oftheinsiderswhocommittedITsabotage 
inouroriginalstudywiththeSecretServicehadapreviousarresthis-
tory,includingarrestsforviolentoffenses(18%),alcohol-ordrug-related 
offenses(11%),andnonfinancial/fraud-relatedtheftoffenses(11%).3In 
fact,someofthoseinsidershadbeenarrestedformultipleoffenses.The 
relativelyhighfrequencyofpreviouscriminalarrestsunderscorestheneed 
forbackgroundchecks.Theseproactivemeasuresshouldnotbepunitive 
innature;rather,theindividualshouldbeindoctrinatedintotheorganiza-
tionwithappropriatecare.Inaddition,thisinformationshouldbeusedas 
partofarisk-baseddecisionprocessindeterminingwhetheritisappropri-
atetogivethenewemployeeaccesstocritical,confidential,orproprietary 
informationorsystems.
Inadditiontoscreeningforpotentialredflagsduringthehiringprocess,
youalsoshouldinvesttimeandresourcesintrainingyoursupervisorsto
recognizeandrespondtoinappropriateorconcerningbehaviorinemploy-
ees.Insomecases,lessseriousbutinappropriatebehaviorwasnoticedin
theworkplacebutnotactedonbecauseitdidnotrisetothelevelofapolicy
violation.However,failuretodefineorenforcesecuritypoliciesinsome
casesemboldenedtheemployeestocommitrepeatedviolationsthatesca-
latedinseverity,withincreasingriskofsignificantharmtothe  organization.
3.  See[Keeney2005].
ptg7481383
165Practice4:MonitorandRespondtoSuspiciousorDisruptiveBehavior 
Itisimportantthatyouconsistentlyinvestigateandrespondtoallrule
violationscommittedbyyouremployeesandcontractors.
Giventhatfinancialgainisaprimarymotiveformuchinsiderfraud,you 
shouldmonitorindicationsbyemployeesofpossiblefinancialproblems 
orunexplainedfinancialgain.Suddenchangesinanemployee’sfinancial 
situation,includingincreasingdebtorexpensivepurchases,maybeindi-
catorsofpotentialfinancialneed.Inaddition,recallfromChapter4that 
fraudmayinvolvetheftormodificationofsmallamountsofdata(e.g., 
SocialSecuritynumbers)repeatedlyoverlongperiodsoftime.Thissug-
geststhatforfraudcrimesthereisampletimetocatchtheinsiderintheact 
whilestillemployedbyyou.Inaddition,someoftheinsidershadpersonal 
stressorsthatmayhaveinfluencedtheiractions,includingfamilymedical 
problems,substanceabuse,financialdifficulties,andphysicalthreatsby 
outsiders.Thesecrimesalsohadahighrateofcollusionwithbothinsiders 
andoutsiders.Secretivemeetingsamongemployeesandobviousattempts 
todeceivetheorganizationaboutoutsiderelationshipsareofconcern.
InChapter3,InsiderTheftofIntellectualProperty,wedescribedthatthese 
crimestendtoinvolvelargeramountsofdata(e.g.,proprietarysourcecode) 
andoftenoccurwithinonemonthoftheinsider’sresignation.However, 
manyoftheincidentsinvolvesignificantplanningwellbeforethetheft 
inwhichtheinsiderbecomesmorecuriousaboutaspectsoftheinforma-
tion(e.g.,softwaremodules)outsideofhisareaofresponsibility.Insome 
ofthoseincidents,theinsiderhadalreadycreatedorwasplanningtostart 
hisownbusinesswhilestillworkingforthevictimorganization.Many 
weredeceptiveabouttheirreasonsforleavingtheorganization,evenwhile 
workingoutthedetailswithcompetingorganizationsforthetransferof 
stoleninformation.Aswithinsiderfraud,suspiciousinteractionsamong 
employeesandobviousattemptstodeceivetheorganizationaboutoutside 
businessrelationshipsareofconcern.
AswedescribedinChapter2,InsiderITSabotage,insidershavealso
becomedisgruntledduetoprofessionalstressors,includingfinancial
compensationissues,problemswithasupervisor,hostileworkingenviron-
ments,andlayoffs.Often,thefirstsignofdisgruntlementistheonsetof
concerningbehaviorsintheworkplace.Unfortunatelyinmanyofourcases,
theconcerningbehaviorswerenotrecognizedbymanagementpriortothe
incidents,orthe  organizationfailedtotakeactiontoaddressthebehaviors.
Policiesandproceduresshouldexistforyouremployeestoreport
concerningordisruptivebehaviorbycoworkers.Whilefrivolousreports
needtobescreened,allreportsshouldbeinvestigated.Ifoneofyour
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
166
employeesexhibitssuspiciousbehavior,youshouldrespondwithduecare.
Disruptiveemployeesshouldnotbeallowedtomigratefromonepositionto
anotherwithinyourorganization,evadingdocumentationofdisruptiveor
concerningactivity.Threats,boastingaboutmaliciousactsorabilities(“You
wouldn’tbelievehoweasilyIcouldtrashthisnet!”),andothernegative
sentimentsshouldalsobetreatedasconcerningbehaviors.Manyemploy-
eeswillhaveconcernsandgrievancesfromtimetotime,andaformaland
accountableprocessforaddressingthosegrievancesmaysatisfythosewho
mightotherwiseresorttomaliciousactivity.Ingeneral,anyemployeeexpe-
riencingdifficultiesintheworkplaceshouldbeaidedintheresolutionof
thosedifficulties.
Onceconcerningbehaviorisidentified,severalstepsmayassistyouin 
managingrisksofmaliciousactivity.First,theemployee’saccesstocritical 
informationassetsshouldbeevaluated.Hisorherlevelofnetworkaccess 
shouldalsobeconsidered.Logsshouldbereviewedtocarefullyexamine 
recentonlineactivitybytheemployeeorcontractor.Whilethisisdone, 
youshouldprovideoptionstotheindividualforcopingwiththebehavior, 
perhapsincludingaccesstoaconfidentialemployee-assistanceprogram.
Suspiciousbehaviors,ifdetected,provideyouanopportunityto  recognize
ahigherriskofinsiderthreatandactaccordingly.Often,coworkersare 
awareofissues;anonymousmeansforreportingcoworkersuspicions 
shouldbeinplaceandcommunicatedtoyouremployees.
Keepinmindthatlegalandemployeeprivacyissuesmustbeconsidered 
whenimplementingthispractice.Itisveryimportantthatyouworkwith 
yourlegaldepartmentindevelopingthesetypesofpoliciesand  procedures!
Case Studies: What Could Happen if I Don’t Do It?
Asubcontractorworkedforanorganizationthathandledstategovern-
mentemployeehealthinsuranceclaims.Usingthemedicalidentity 
numberofanunsuspectingpsychologist,theinsiderchangedthename 
andaddressassociatedwiththepsychologisttoacoconspirator’sname 
andaddress.Heproceededtofilefakeclaimsandsendthepaymentsto 
thebogusaddresses.Auditorsdiscoveredtheschemewhentheybegan 
questioningwhyapsychologistwassubmittingpaymentclaimsfortreat-
ingbrokenbonesandopenwounds,andadministeringchemotherapy. 
Theyalsonoticedthatthenameassociatedwiththepsychologistwas 
thenameofoneoftheirsubcontractors.Duringtheinvestigationitwas 
determinedthattheinsiderhadacriminalhistoryforfraudandthatthe 
ptg7481383
167Practice4:MonitorandRespondtoSuspiciousorDisruptiveBehavior
subcontractingorganizationprobablydidnotperformabackground 
checkpriortohiring.
Backgroundchecksshouldberequiredforallpotentialemployees, 
includingcontractorsandsubcontractors.
Aformersystemadministratoratauniversity’scancerinstitutedeleted 
18monthsofcancerresearchafterquittingbecauseofpersonalityand 
workethicdifferencesbetweenhimself,hissupervisor,andhiscoworkers. 
Hehadbeenthesolesystemadministratoronthecancerresearchproject 
team.Onnumerousoccasionshehaddisplayedaggressiveandmali-
cious(nontechnical)behaviorsbeforequittinghisjob.Hewasnotliked 
by hiscoworkers,but was seenas a “necessaryevil”for hisskills.Hewas 
describedasverylazy—slackingonthejob—buttheydidn’tknowhowto 
getridofhim.Afewdaysafterquitting,hereturnedtothelab.Hisbadge 
hadbeendisabled,sohecouldnotenteronhisown;therefore,heaskedan 
employeewhorecognizedhimtolethimin.Onceinsidethebuilding,he 
usedakeythathadnotbeenconfiscatedtoentertheofficeanddeletethe 
cancerresearch.
Inthiscase,theemployeeobviouslyexhibitedconcerningbehaviorsinthe 
workplace.Asstatedearlier,itisimportanttohaveestablishedpoliciesand 
proceduresfordealingwithconcerningbehaviorsintheworkplace.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
168
Practice 5: Anticipate and Manage Negative Workplace
Issues
Clearlydefinedandcommunicatedorganizationalpoliciesfordealingwith 
employeeissueswillensureconsistentenforcementandreduceriskwhen 
negativeworkplaceissuesarise.
What Can You Do?
Beginningwiththefirstdayofemployment,anemployeeneedstobe 
madeawareoforganizationalpracticesandpoliciesforacceptablework-
placebehavior,dresscode,acceptableusagepolicies,workhours,career 
development,conflictresolution,andmyriadotherworkplaceissues. 
Theexistenceofsuchpoliciesaloneisnotenough.Newemployeesand 
veteranemployeesalikeallneedtobeawareoftheexistenceofsuchpoli-
ciesandtheconsequencesforviolations.Consistentenforcementofthe 
policiesisessentialtomaintaintheharmoniousenvironmentoftheorga-
nization.Whenemployeesseeinconsistentenforcementofpolicies,itmay 
leadtoanimositywithintheworkplace.Inmanyofourcases,inconsistent 
enforcementorperceivedinjusticeswithinorganizationsledtoinsiderdis-
gruntlement.Coworkersoftenfeltthat“starperformers”wereabovethe 
rulesandreceivedspecialtreatment.Manytimesthatdisgruntlementled 
theinsiderstocommitITsabotageortheftofinformation.
Whenyouremployeeshaveissues,whethertheyarejustifiedornot,they
needanavenuetoseekassistance.Employeesneedtobeabletoopenlydis-
cusswork-relatedissueswithamemberofmanagementorhumanresources
withoutthefearofreprisalornegativeconsequences.Whenemployeeissues
arisebecauseofoutsideissues,includingfinancialandpersonalstressors,
itcanbehelpfultouseaservicesuchasanemployeeassistanceprogram.
Theseprogramsofferconfidentialcounselingtoassistemployees,allow-
ingthemtorestoretheirworkperformance,health,orgeneralwell-being.If
insiderswhocommittedfraudhadaccesstoemployeeassistanceprograms,
theymayhavefoundanalternativewaytodealwiththefinancialandper-
sonalstressorsthatappeartobea  motivatingfactorinthecrimes.
Itisimperativethatyouremployeesareawareofandsignintellectual 
propertyagreementsandnoncompeteagreements.Itisimportantthatthey 
areremindedofthoseagreementsatthetimeoftermination.Thereshould 
benoambiguityoverwhoownsintellectualpropertydevelopedasan 
employeeofyourorganization.Manyoftheinsiderswhocommittedtheft 
ofinformationclaimedtonotknowitwasaviolationofcompanypolicy 
ptg7481383
Practice5:AnticipateandManageNegativeWorkplaceIssues 169
whentheytookcustomerlists,pricingsheets,andevensourcecodewith 
themupontermination.
Finally,yourterminationprocessshouldincludeasteptoretrieveall 
organizationpropertyfromterminatingemployees.Theyshouldbe 
requiredtoreturnallproperty,includingcomputersandaccessories,soft-
wareandhardware,confidentialinformation,sourcecodeandcompiled 
code,mobiledevices,removablemedia,andanyotheritemsthatcontain 
sensitive,confidential,orintellectualpropertyownedbyyou.Youshould 
considershowingemployeesthesignedcopyoftheintellectualproperty 
agreementandnoncompeteagreementandexplainingtheconsequences 
forviolatingthosepoliciesaspartoftheemployeeterminationprocess.
Case Studies: What Could Happen if I Don’t Do It?
AfemaleemployeewhowasaDBAandprojectmanagerbecame 
increasinglydisgruntledwhenhermalecoworkersbegantooverride 
hertechnicaldecisionswhereshewastheexpert.Shefiledcomplaints 
withHRoverwhatsheconsideredahostileworkenvironment,but 
nothingwasdoneaboutit.Aftershefiledacomplaintagainsthersuper-
visor,herperformancereviews,whichhadbeenstellar,wentdownhill. 
Hersupervisorthendemotedherbyremovingherprojectmanagement 
responsibilities.Againshecomplained,buthersupervisorstartedfiling 
complaintsagainstherforfailuretofollowinstructions.Shenextfileda 
complaintwiththeEEOCfordiscriminationbasedonhernationalori-
gin(India),race(Asian,Indian),andgender(female).Sheeventually 
resignedbecauseshewasfrustratedbytheorganization’slackofrespon-
sivenesstohercomplaints.Afterresignation,shefoundouthergrievance 
againsttheorganizationhadbeendenied.Thelaststrawwaswhenshe 
foundoutthattheorganizationonlyforwardedhernegativeperformance 
reviewstotheneworganizationwhereshewasnowemployed.Shecon-
nectedfromhercomputerathometoherpreviousorganization.Sheused 
another  employee’susernameandpasswordtologintothesystem.Next 
sheenteredacriticalsystemusingaDBAaccount,whichhadnotbeen 
changedsincesheresigned,anddeletedcriticaldatafromthesystem.She 
deletedtwoweeks’worthofdatausedtodeterminepromotions,  transfers, 
anddisabilityclaims,andcausedthesystemtocrash.
Inthiscase,theorganizationdidattempttomanagethenegative  workplace 
issues.Obviously,thehumanresourcesdepartmentwasinvolvedand 
progressivedisciplinaryactionsweretaken.Unfortunately,theproblems 
werenotresolvedwhenshelefttheorganization.Insomecases,itisworth 
consideringalternativestosanctionsindealingwithemployeeissues. 
Thisparticularinsiderhadbeenastellaremployee,butunfortunatelyher 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
170
performancewasaffectedbytheteamwithwhichsheworked.Atransfer 
toanotherpartoftheorganizationmighthavebeenconsidered,inorderto 
improveanegativesituationforahistoricallyexcellentemployee.
Avicepresidentforengineeringwhowasresponsibleforoversightofall 
softwaredevelopmentinthecompanywasengagedinalong-running 
disputewithuppermanagement.Thisdisputewascharacterizedasver-
balattacksbytheinsiderandstatementstocolleaguesabouthowmuch 
hehadupsetmanagement.Heengagedinpersonalattacksonceortwice 
aweekandononeoccasion,inarestaurant,screamedpersonalattacksat 
theCEOofthecompany.Afinalexplosivedisagreementpromptedhim 
toquit.Whennoseverancepackagewasoffered,hecopiedaportionof 
thecompany’sproductunderdevelopmenttoremovablemedia,deleted 
itfromthecompany’sserver,andremovedtherecentbackuptapes. 
Hethenofferedtorestorethesoftwareinexchangefor$50,000.Hewas 
chargedandconvictedofextortion,misappropriationoftradesecrets,and 
grandtheft.However,themostrecentversionofthesoftwarewasnever 
recovered.
Ifthecompanyinthiscasehadrecognizedthatthewarningsigns—the 
disruptivebehavior—couldsignalapotentialinsiderattack,itcould 
havesecureditsassetsandsubstantiallossescouldhavebeenavoided. 
Itiscriticalthatmanagersrecognize,manage,andrealizethepotential 
consequencesofnegativeworkplaceissues.
ptg7481383
Practice6:TrackandSecurethePhysicalEnvironment 171
Practice 6: Track and Secure the Physical Environment
Althoughorganizationsarebecomingmorereliantonelectronic 
communicationandonlinetransactionstodobusiness,itisstillessential 
thatyoutrackandsecurethephysicalenvironmentagainstinternaland 
externalthreats.
What Can You Do?
Firstandforemost,youmustprotectyourmostcriticalasset:your 
employees.Thisprocessbeginsbyensuringyourofficeenvironmentisfree 
fromoccupationalhazardsandthreatstoemployeesfromoutsiders.While 
planningforthesecurityofthephysicalenvironment,youshouldtakeinto 
considerationthespaceinsidetheofficewallsaswellastheperimeterof 
thebuilding,includinglobbies,elevators,stairwells,andparkingareas. 
Ifyoucankeepunauthorizedpeopleoutofyourfacility,youwilladdan 
extralayertothedesiredsecurityin-depthmodel.
Likewise,physicalsecuritycanlendanotherlayerofdefenseagainst 
terminatedinsiderswhowishtoregainphysicalaccesstoattack.Justas 
withelectronicsecurity,however,formeremployeeshavebeensuccess-
fulinworkingaroundtheirorganization’sphysicalsecuritymeasures. 
Employeeprivacyandrelatedlawsshouldbeconsideredwhendevel-
opingasecurephysicalenvironment.Commonlyusedphysicalsecurity 
mechanisms,somethatwereeffectiveandothersthatwereinadequate,in 
ourcasesincludethefollowing.
Maintainingaphysicalsecuritypresenceonthefacilitiesatalltimes. 
SomeoftheformeremployeesintheCERTdatabasehadtogotoextra 
lengthstocarryouttheircrimeduetosecurityguardsondutyaround 
theclock.Forexample,atleastoneterminatedinsiderliedtothenight-
shiftsecurityguard,whohadnotbeentoldofthetermination,about 
forgettinghisbadge.However,itislikelythatotherformerinsiders 
weredeterredfrommaliciousactionsbythosesameguards.
Requiringallemployees,contractors,customers,andvendorstohave 
anorganization-issuedbadgeandrequiringtheuseofthatbadgeto 
navigatethroughoutthefacility.OneemployeeintheCERTdatabase 
hadtoobtainabadgefromaformercontractor,usedthatbadgeto 
obtainphysicalaccesstoanareaofthefacilityforwhichhewasnot 
authorizedafterhours,andthensabotagedthecomputersinthenet-
workoperationscenter.Anotherformeremployee“piggybacked” 
behindanotheremployeewhohadabadgetoobtainafter-hoursaccess 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
172
tothefacility.However,onceagain,thesemeasuresprobablywould 
deteralessmotivatedinsiderfromcarryingoutacrime.
Usingalarmstodeterandalertwhenunauthorizedindividualsenter 
yourfacility.
Usingclosed-circuitcamerastorecordentry,exit,andcritical 
operationsatthefacility.SomeoftheinsidersintheCERTdatabase 
were  successfullyidentifiedandconvictedthroughuseofclosed-circuit 
camerasorvideosurveillance.
Oncethephysicalperimeterisassecureaspossible,youshoulddevote 
adequateresourcestoprotectingthecriticalinfrastructure,ensuringresil-
iencyofoperation.Aninfrastructuresecuritystrategyshouldbeginby 
definingwhichassetsarecriticaltotheoperationofyourorganization. 
Theseassetsshouldbeconsolidatedintoacentralcomputingfacilitywith 
limitedaccesstothephysicalspace.Accesscontroltothefacilityshouldbe 
clearlydefinedandchangesmadeasemployeesarehiredandterminated. 
Accesstothefacilityshouldbetrackedviaanautomatedloggingmecha-
nismor,ataminimum,signinginandoutofthefacilityusingasign-in 
sheet.
Physicalprotectionofthebackupmediaisalsoofcriticalimportance.In 
somecases,maliciousinsiderswereabletostealorsabotagethebackupsso 
thattheywereunusable,slowingdownorcripplingtheorganizationwhen 
itattemptedtorecoverfromtheinsiderattack.
Inadditiontosecuringthecriticalassetshousedinyourcomputer  facility, 
carefulattentionshouldbepaidtothecomputers,workstations,lap-
tops,printers,andfaxmachineslocatedinallareas,bothsecuredand 
notsecured.Thesecurityofthecomputinginfrastructurebeginswiththe 
protectionoftheperimeteroftheorganizationandmovesdowntothe 
protectionofofficespace,bylockingdoorsandwindows.
Thenextlayerofphysicaldefenseentailssecuringcomputingresources
forexample,usingpassword-protectedscreensavers,andsecuringmobile 
devicesandremovablemedia(suchaslaptops,memorysticks,andsmart-
phones)byrequiringencryptionand/oramultifactorauthentication 
method.
Tothegreatestextentpossible,attemptstoaccessyourfacilitiesshouldbe 
logged.Aregularauditoftheaccesslogsshouldbeperformedtoidentify 
violationsorattemptedviolationsoftheaccesspolicy.Automatedalerting 
ptg7481383
Practice6:TrackandSecurethePhysicalEnvironment 173
ofthoseviolationscouldenableyoutodetectasecurityviolationbefore 
majordamageisinflicted.
Finally,youneedtoimplementastrategyfortrackinganddisposingof 
documentsthatcontaincontrolledinformation.Inaddition,precautions 
againstinsiderthreatsmustbeappliedtoallemployees,eveniftheyappar-
entlyhavenoaccesstoyourcomputingresources.Severalcasesinvolved 
thecompromiseofsensitive,proprietary,confidential,orsecret  information 
duetolaxcontrolsinvolvingdisposalofmaterialscontainingthatinfor-
mation.Inonecase,anight-shiftjanitorobtainedpersonalinformationfor 
bankcustomersbysearchingthroughofficetrash,andthenusedtheinfor-
mationtocommitidentitytheft.Inanothercase,anemployeewasableto 
obtaindocumentscontainingtradesecretsfromahoppercontainingcon-
fidentialmaterialtobedestroyed,andsoldthedocumentstoaforeign 
competitor.
Case Studies: What Could Happen if I Don’t Do It?
Anemployeewassuspendedbyhisemployer,“basedonanemployee 
dispute.”TheemployeehadbeensubcontractedbyhisemployerasanIT 
consultantatanenergymanagementfacility.Becausehewassuspended 
lateFridayafternoon,hisemployerdecidedtowaituntilMondaymorning 
tonotifytheenergymanagementfacilityofhissuspension.LateSunday 
nighthewenttotheenergyproductionfacility;hestillhadauthorized 
access since facility personnel had not been notified of his suspension. He 
usedahammertobreaktheglasscaseenclosingthe“Emergencypower 
offbutton”andhitthebutton,shuttingdownsomeofthecomputersys-
tems,includingcomputersthatregulatedtheexchangeofelectricity 
betweenpowergrids.Foraperiodoftwohours,theshutdowndeniedthe 
organizationaccesstotheenergytradingmarket,butfortunatelydidn’t 
affectthetransmissiongriddirectly.
Thiscaseraisesimportantphysicalsecurityandlegal/contractingissues 
regardingcontractors.Thesetypesofcontractingissueswerealreadydis-
cussedinPractice1.Thiscaseservesasanotherexampleofwhyyoushould 
alteryourcontractingpracticestorequireadvancenotificationofpending 
employeesanctionsbyyoursubcontractors,andrequiringimmediatenoti-
ficationifoneofthecontractorsisterminatedorresigns.Italsoillustrates 
thepotentialdamagethatcouldbecausedbythecascadingeffectsfrom 
adisgruntledinsiderusingphysicalsabotagetoimpactmission-critical 
systems.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
174
Practice 7: Implement Strict Password- and
Account-Management Policies and Practices
Ifyourorganization’scomputeraccountscanbecompromised,insiders 
cancircumventmanualandautomatedcontrolmechanisms.
What Can You Do?
Nomatterhowvigilantyouareaboutmitigatingthethreatsposedby 
insiders,ifyourcomputeraccountscanbecompromised,insidershavean 
opportunitytocircumventmechanismsinplacetopreventinsiderattacks. 
Therefore,computeraccount-andpassword-managementpoliciesand 
practicesarecriticaltoimpedeaninsider’sabilitytouseyoursystemsfor 
illicitpurposes.Fine-grainedaccesscontrolcombinedwithpropercom-
puteraccountmanagementwillensurethataccesstoallofyourcritical 
electronicassetsis
Controlledtomakeunauthorizedaccessdifficult
Loggedandmonitoredsothatsuspiciousaccesscanbedetectedand 
investigated
Traceablefromthecomputeraccounttotheindividualassociatedwith 
thataccount
Somemethodsusedbymaliciousinsiderstocompromiseaccounts 
included
Usingpasswordcrackers
Obtainingpasswordsthroughsocialengineering
Employeesopenlysharingpasswords
Employeesstoringpasswordsinclear-textfilesontheircomputersor 
inemail
Usingunattendedcomputersleftloggedin
Passwordpoliciesandproceduresshouldensurethatallpasswordsare 
strong,4employeesdonotsharetheirpasswordswithanyone,employees 
changetheirpasswordsregularly,andallcomputersautomaticallyexe-
cutepassword-protectedscreensaversafterafixedperiodofinactivity.As 
aresult,allactivityfromanyaccountshouldbeattributabletoitsowner. 
4.  SeeChoosingandProtectingPasswords:www.us-cert.gov/cas/tips/ST04-002.html.
ptg7481383
175Practice7:ImplementStrictPassword-andAccount-ManagementPolicies
Inaddition,ananonymousreportingmechanismshouldbeavailableand 
itsuseencouragedforemployeestoreportallattemptsatunauthorized 
accountaccess.
Someinsiderscreatedbackdooraccountsthatprovidedthemwithsystem 
administratororprivilegedaccessfollowingtermination.Otherinsiders 
foundthatsharedaccountswereoverlookedintheterminationprocess 
andwerestillavailabletothem.Systemadministratoraccountswere 
commonlyused.OthersharedaccountsincludedDBAaccounts.Some 
insidersusedothertypesofsharedaccounts,suchasthosesetupforaccess 
byexternalpartnerslikecontractorsandvendors.Oneinsideralsoused 
trainingaccountsthatwererepeatedlyreusedovertimewithoutever 
changingthepassword.
Periodicaccountauditscombinedwithtechnicalcontrolsenableiden-
tificationofthefollowing:
Backdooraccountsthatcouldbeusedlaterformaliciousactionsbyan 
insider,whetherthoseaccountswerespecificallysetupbytheinsider 
orwereleftoverfromapreviousemployee
Sharedaccountswhosepasswordwasknownbytheinsiderandnot 
changedaftertermination
Accountscreatedforaccessbyexternalpartnerssuchascontractors 
andvendorswhosepasswordswereknownbymultipleemployees, 
andwerenotchangedwhenoneofthoseemployeeswasterminated
Theneedforeveryaccountinyourorganizationshouldbeevaluated 
regularly.Limitingaccountstothosethatarenecessary,withstrictproce-
duresandtechnicalcontrolsthatenableauditorsorinvestigatorstotrace 
allonlineactivityonthoseaccountstoanindividualuser,diminishes 
aninsider’sabilitytoconductmaliciousactivitywithoutbeingidenti-
fied.Account-managementpoliciesthatincludestrictdocumentation 
ofallaccessprivilegesforallusersenableastraightforwardtermination 
procedurethatreducestheriskofattackbyterminatedemployees.
Itisimportantthatyourorganization’spassword-andaccount-
managementpoliciesarealsoappliedtoallcontractors,subcontractors, 
vendors,andothertrustedbusinesspartnersthathaveaccesstoyour 
informationsystemsornetworks.Thesepoliciesshouldbewritteninto 
yourcontractingagreements,requiringthesamelevelofaccountability 
intrackingwhohasaccesstoyourorganization’ssystems.Contractors, 
subcontractors,andvendorsshouldnotbegrantedgroupaccountsfor 
accesstoyourinformationsystems.Theyshouldnotbepermittedtoshare 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
176
passwords,andwhenemployeesareterminatedattheexternalorganiza-
tion,youshouldbe  notifiedinadvancesothataccountpasswordscanbe 
changed.Finally,besuretoincludeallsharedaccounts,includingcon-
tractor,subcontractor,andvendoraccounts,intheregularlyscheduled 
password-changeprocess.
Theprevalenceofoutsourcing,supply-chainmanagement,andthe 
globalizationofthemarketplacehasblurredthelinebetweenyour 
boundaryandtheexternalworld.Itisincreasinglydifficulttotellthe 
differencebetweeninsidersandoutsiderswhenitcomestomanaging 
accesstoyourdataandinformationsystems.Contractors,subcontractors, 
andvendorsarenowcriticalcomponentstoanorganizationthatistrying 
tocompeteinaglobalmarketplace.Whendealingwithyourcontractor, 
subcontractor,andvendorrelationships,youmustrecognizethatinsiders 
arenolongerjustemployeeswithinyourfourwalls.Carefulattentionmust 
bepaidtoensurethattheinsidersemployedbytrustedbusinesspartners 
aremanageddiligently,onlyallowingthemaccesstotheinformationthey 
needtofulfilltheircontractualobligations,andterminatingtheiraccess 
whenitisnolongerneeded.
Case Studies: What Could Happen if I Don’t Do It?
AcomputeradministratorforanInternetserviceprovider(ISP)quithisjob
afterbecomingdissatisfied,andbegantowritethreateningemailstothe
ISP.Hewasabletoretainpartialaccesstotheorganizationasapayingcus-
tomer,andthenexploitedhisknowledgeofacompanytooltoelevatehis
privilegesonthesystemtothatofanemployee.TheISPdetectedhisunau-
thorizedaccessinthelogfiles,anddisabledtheinsider’scustomeraccount.
Theinsider,however,wasabletocontinueattackingtheorganizationusing
twootherbackdooraccountshehadcreated.Hechangedalladministra-
tivepasswords,alteredthebillingsystem,anddeletedtwointernalbilling
databases.Ittookanentireweekendtorecoverfromtheattack.
ThiscasemightnotseemapplicabletoyouifyouarenotanISP,but
takeamomenttoreallythinkaboutwhetheryouhaveanyaccountsfor
accessingyoursystemsfromoutsidebycustomers,vendors,partners,
andsoon.Rememberthatyourinsidersknowyourvulnerabilitiesand
technicalgaps!
Adisgruntledsoftwaredeveloperdownloadedthepasswordfilefromhis 
organization’sUNIXservertohisdesktop.Next,hedownloadedapass-
wordcrackerfromtheInternetandproceededto“break”approximately 
fortypasswords,includingtherootpassword.Fortunately,hedidnodam-
age,buthedidaccesspartsoftheorganization’snetworkforwhichhewas 
ptg7481383
177Practice7:ImplementStrictPassword-andAccount-ManagementPolicies
notauthorized.Theinsiderwasdiscoveredwhenhebraggedtothesystem 
administratorthatheknewtherootpassword.Asaresult,his  organization 
modifieditspoliciesandprocedurestoimplement  countermeasuresto 
preventsuchattacksinthefuture.Systemadministratorswerepermitted 
torunpasswordcrackersandnotifyuserswithweakpasswords,andthe 
organizationimprovedsecuritytrainingfor  employeesonhowandwhy 
tochoosestrongpasswords.
Thiscaseendsupbeinga“good-news”casewhenyouconsiderhowthe 
organizationrespondedtotheincident!
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
178
Practice 8: Enforce Separation of Duties and Least
Privilege
Separationofdutiesandleastprivilegemustbeimplementedinbusiness 
processesandfortechnicalmodificationstocriticalsystemsorinformation 
tolimitthedamagethatmaliciousinsiderscaninflict.
What Can You Do?
Separationofdutiesrequiresdividingfunctionsamongpeopletolimit 
thepossibilitythatoneemployeecouldstealinformation,commitfraud, 
orcommitsabotagewithoutthecooperationofanother.Onetypeofsepa-
rationofduties,calledthetwo-personrule,isoftenused.Itrequirestwo 
peopletoparticipateinataskforittobeexecutedsuccessfully.Thesep-
arationofdutiesmaybeenforcedviatechnicalornontechnicalcontrols. 
Examplesincluderequiringtwobankofficialstosignlargecashier’schecks, 
orrequiringverificationandvalidationofsourcecodebeforethecodeis 
releasedoperationally.Ingeneral,employeesarelesslikelytoengagein 
maliciousactsiftheymustcollaboratewithanotheremployee.
Effectiveseparationofdutiesrequiresimplementationofleastprivilege, 
authorizingpeopleonlyfortheresourcesneededtodotheirjob.Least 
privilegereducesyourriskoftheftofconfidentialorproprietaryinforma-
tionbyyouremployees,sinceaccessislimitedtoonlythoseemployees 
whoneedaccesstodotheirjobs.Somecasesoftheftofintellectualproperty 
involvedsalespeople,forinstance,whohadunnecessaryaccesstostrategic 
productsunderdevelopment.
Itisimportantthatmanagementofleastprivilegebeanongoingprocess, 
particularlywhenemployeesmovethroughouttheorganizationforrea-
sonsincludingpromotions,transfers,relocations,anddemotions.As 
employeeschangejobs,organizationsoftenfailtoreviewtheemployees’ 
requiredaccesstoinformationandinformationsystems.Alltoooften, 
employeesaregivenaccesstonewsystemsand/orinformationrequired
fortheirnewjobwithoutrevokingtheiraccesstoinformationandsystems 
requiredtoperformtheirpreviousjobduties.Unlessanemployeemain-
tainsresponsibilityfortasksfromhisorherpreviousjobthatrequireaccess 
toinformationandinformationsystems,theemployee’saccessshouldbe 
disabledwhenheorsheassumesthenewposition.
Typically,organizationsdefinerolesthatcharacterizetheresponsibilities
ofeachjob,aswellastheaccesstoorganizationalresourcesrequiredto 
fulfillthoseresponsibilities.Insiderriskcanbemitigatedbydefiningand 
ptg7481383
Practice8:EnforceSeparationofDutiesandLeastPrivilege 179
separatingrolesresponsibleforkeybusinessprocessesandfunctions.Here 
aresomeexamples:
Requiringonlinemanagementauthorizationforcriticaldataentry 
transactions
Institutingcodereviewsforthesoftwaredevelopmentand  maintenance 
process
Usingconfiguration-managementprocessesandtechnologytocontrol 
softwaredistributionsandsystemmodification
Designingauditingprocedurestoprotectagainstcollusionamong 
auditors
Physical,administrative,andtechnicalcontrolscanbeusedtorestrict
employees’accesstoonlythoseresourcesneededtoaccomplishtheir 
jobs.Access-controlgapsoftenfacilitatedinsidercrimes.Forexample, 
employeescircumventedseparationofdutiesenforcedviapolicyrather 
thanthroughtechnicalcontrols.Ideally,youshouldincludeseparation 
ofdutiesinthedesignofyourbusinessprocessesandenforcethemviaa 
combinationoftechnicalandnontechnicalmeans.
Theseprincipleshaveimplicationsinboththephysicalandthevirtual
worlds.Inthephysicalworld,youneedtopreventemployeesfromgaining
physicalaccesstoresourcesnotrequiredbytheirworkroles.  Researchers
needtohaveaccesstotheirlaboratoryspacebutdonotneedaccesstohuman
resourcesfilecabinets.Likewise,humanresourcespersonnelneedaccessto
personnelrecordsbutdonotneedaccesstolaboratoryfacilities.Thereisa 
directanalogyinthevirtualworldinwhichyoumustpreventemployees
fromgainingonlineaccesstoinformationorservicesthatarenotrequired
fortheirjob.Thiskindofcontrolisoftencalledrole-basedaccesscontrol.
Prohibitingaccessbypersonnelinonerolefromthefunctionspermittedfor
anotherrolelimitsthedamagetheycaninflictiftheybecomedisgruntledor
otherwisedecidetoexploittheorganizationfortheirownpurposes.
Itisimportanttounderstandthatseparationofdutiesaloneisnotalways 
sufficienttoprotectagainstinsiderthreats;itisonelayerinamultitiered 
defense.ManyoftheinsiderswhocommittedfraudintheCERTdatabase 
collaboratedwithatleastoneotherinsidertocarryoutthecrime.Anumber 
ofreasonscouldexplainthehighdegreeofcollusion.Forexample,internal 
collusioncouldbenecessarytoovercomecontrolsthatenforceseparation 
ofduties.Giventhattheenforcementofseparationofdutiesalonewillnot 
preventinsiderattacks,itisessentialthatyouimplementalayereddefense 
todecreasethelikelihoodofsuchanattack.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
180
Onepatternobservedinmultiplefraudcasesinvolvedinsiderswho 
changedthemailingaddressand/oremailaddressofcustomerssothat 
theydidnotreceiveautomatednotifications,bills,andothercompanycor-
respondencesregardingfraudulentcreditcardaccountsthattheinsiders 
thenopenedusingthecustomer’sidentity.Somebanksandotherorgani-
zationshaveinstitutedpracticesforverifyingcustomeraddressandemail 
addresschangesbeforeactuallymakingthechangeincustomerdatabases. 
Thispracticeprovidesanadditionalcontrolontopoftheseparationof 
dutiesthatusedtobesufficientforprotectionofsuchinformation.
Finally,itisimportanttodesignauditingprocedurestodetectpotential 
collusionamongemployees,withtheassumptionthatcollusionto  override 
separationofdutiescontrolsisquitepossible.
Case Studies: What Could Happen if I Don’t Do It?
Acurrencytrader(whoalsohappenedtohaveacollegeminorin  computer 
science)developedmuchofthesoftwareusedbyhisorganizationto 
record,manage,confirm,andaudittrades.Heimplementedobscurefunc-
tionalityinthesoftwarethatenabledhimtoconcealillegaltradestotaling 
approximately$700millionoveraperiodoffiveyears.Inthiscase,itwas 
nearlyimpossibleforauditorstodetecthisactivities.Theinsider,who 
consentedtobeinterviewedfortheCERTProgram/SecretServiceInsider 
ThreatStudy,toldthestudyresearchersthatproblemscanarisewhen“the 
foxisguardingthehenhouse”[Randazzo2004].Specifically,hissupervi-
sormanagedboththeinsiderandtheauditingdepartmentresponsiblefor 
ensuringhistradeswerelegalorcompliant.Whenauditingdepartment 
personnelraisedconcernabouthisactivities,theyweredoingsotothe 
insider’ssupervisor(whohappenedtobetheirsupervisoraswell).The 
supervisordirectedauditingdepartmentpersonnelnottoworryabouthis 
activitiesandtoceaseraisingconcern,forfearhewouldbecome  frustrated 
andquit.
Thiscaseillustratestwowaysinwhichseparationofdutiescanpreventan 
insiderattackordetectitearlier.
Endusersofyourcriticalsystemsshouldnotbeauthorizedtomodify 
thesystemfunctionalityoraccesstheunderlyingdatadirectly.
Responsibilityformaintainingcriticaldataandresponsibilityfor 
auditingthatsamedatashouldneverbeassignedtothesameperson.
ptg7481383
Practice8:EnforceSeparationofDutiesandLeastPrivilege 181
AsupervisorfraudulentlyalteredU.S.immigrationasylumdecisions 
usinghisorganization’scomputersysteminreturnforpaymentsofupto 
severalthousanddollarspercase,accumulating$50,000overa  two-year 
period.Hewouldapproveanasylumdecisionhimself,requestthatoneof 
hissubordinatesapprovethedecision,oroverturnsomeoneelse’sdenial 
ofanasylumapplication.Severalforeignnationalseitheradmittedin 
anintervieworpleadedguiltyinacourtoflawtolyingontheirasylum 
applicationsandbribingpublicofficialstoapprovetheirapplications.
Theorganizationhadimplementedseparationofdutiesviarole-based
accesscontrolbylimitingauthorizationforapprovingormodifyingasylum 
decisionstosupervisors’computeraccounts.However,supervisorswere 
abletoalteranydecisionsintheentiredatabase,notjustthoseassigned 
totheirsubordinates.Anadditionallayerofdefense,leastprivilege,also 
couldhavebeenimplementedtopreventsupervisorsfromapprovingasy-
lumapplicationsoroverturningasylumdecisionswithwhichtheyortheir 
teamswerenotinvolved.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
182
Practice 9: Consider Insider Threats in the Software
Development Life Cycle
Technicalemployeeshavetakenadvantageofdefectsintroducedinthe 
SoftwareDevelopmentLifeCycle(SDLC)todeliberatelyperformmali-
cioustechnicalactions;likewise,nontechnicalemployeeshaverecognized
vulnerabilitiesandusedthemtocarryouttheirfraudulentactivities.
ThisbestpracticeisdescribedindetailinChapter5,InsiderThreatIssues 
intheSoftwareDevelopmentLifeCycle.Asummarywasintentionallyleft 
inthischaptertokeepall16bestpracticesinonelocationforeasy  reference.
What Can You Do?
ImpactsfrominsidersthatexploiteddefectsintheSDLCinclude
Closingofabusiness
Fraudlossesofupto$700million
Driver’slicensescreatedforindividualswhocouldnotgetalegitimate 
license
Disruptionoftelecommunicationsservices
Modificationofcourtrecords,creditrecords,andothercriticaldata
Avirusplantedoncustomers’systems
Clearly,theimpactsinthesecasesweresignificant.Itisimportantthatyou 
recognizethesethreats,andthatyouconsiderpotentialthreatsandmiti-
gationstrategieswhendevelopingandmaintainingsoftwareinternallyas 
wellaswhenimplementingsystemsacquiredelsewhere.
InsidersexploiteddefectsinallphasesoftheSDLCinthecasesexamined. 
EachphaseoftheSDLCisnowanalyzedinmoredetail.
Requirements Definition
Manysystemsautomatebusinessandworkflowprocesses.Whendefining 
therequirementsforsuchsystems,theprocessestobeautomatedmustbe 
carefullydefined.Inthecasesexamined,manyoftheinsiderswereableto 
carryouttheirillicitactivitiesbecausetheyrecognizedinstancesinwhich 
protectionfrominsiderthreatswasnotconsidered.Forexample,insome 
cases,therewasnoseparationofdutiesrequiredinautomatedprocesses. 
Inothers,authenticationandrole-basedaccesscontrolswerenotrequired
forsystemaccess.Systemrequirementsshouldalsoinclude  specification 
ptg7481383
Practice9:ConsiderInsiderThreatsintheSoftwareDevelopmentLifeCycle 183
ofdataintegrityandconsistencychecksthatshouldbeimplemented 
forallchangesmadetoproductiondatabysystemendusers,aswellas 
automatedchecksthatmustberunperiodicallytodetectsuspiciousmodi-
fications,additions,ordeletions.Inotherwords,requirementsshould 
considerperiodicauditingfunctions,whichcanbeimplementedandrun
automaticallyonamorefrequentbasisthanmanualsystemaudits.
Notethatalloftherecommendationsdetailedhereforsystem  requirements
definitionapplytosystemsyoubuildin-houseandtothoseyouacquire.When
evaluatingnewsystemsforacquisition,thetypesofrequirementsdetailed
hereshouldalsobeconsidered.Oncerequirementshavebeendefinedand
potentialsystemsareevaluatedforpurchase,thecapabilityofeachsystemto
meetthoserequirementsisanimportantpartofthe  evaluationprocess.
System Design
Insomecases,theorganizationdidaddressprotectionfrominsidersinits
systemrequirementsdefinitionprocess.However,inadequatedesignof
thosefunctionsinautomatedworkflowprocessesenabledsomeinsidersto
commitmaliciousactivity.Forexample,improperlydesigned  separationof
dutiesfacilitatedsomeinsidercrimes.Insomecases,separationofduties
wasnotdesignedintothesystematall.Inothers,althoughseparation
ofdutieswasimplemented,therewasnodesignto“checkthechecker.”
Unfortunately,duetothehighdegreeofcollusionobservedininsider
fraudcases,itisnecessaryforsystemdesignerstoconsiderhowtheymight
implementyetanotherlayerofdefenseontopofseparationofduties,to
discovercasesinwhichtwoemployeesareworkingtogethertocommita 
crime.Mostofthesetypesofcrimescontinueoveraprolongedperiod,so
althoughdetectionmightnotbeimmediate,patternsofsuspiciousactivity
canbediscoveredtocatchtheactivitysoonerratherthanlater.
Anotherkeyfindingrelatedtosystemdesignvulnerabilitiesinvolved
authorizedsystemoverrides.Severalinsidersusedspecialsystemfunctions
createdforexceptionhandlingtocarryouttheircrimes.Theyrealizedthat
thesefunctionswerecreatedforexceptionalsituationsinwhichchangeshad
tobemadequickly,thusbypassingtheusualmandatedsecuritychecks.This
typeoffunctionalityprovidedaneasywayforinsidersto“getaroundthe
rules.”Itisimportanttodesignspecialdataintegritychecksforanydata
modified,added,ordeletedusingtheseexception-handlingfunctions.
Implementation
Veryfewinsidersactuallyintroducedintentionalvulnerabilitiesormali-
ciouscodeintosourcecodeduringtheinitialdevelopmentprocess;that 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
184
typeofactivitywasmoreoftencarriedoutduringthemaintenancephase 
oftheSDLC.However,one18-year-oldWebdeveloperdidusebackdoors 
hehadinsertedintohissourcecodeduringsystemdevelopmenttoaccess 
hisformercompany’snetwork,spamitscustomers,alteritsapplications, 
andultimatelyputitoutofbusiness.Codereviewsandstrictchangecon-
trol,apartofanysolidsoftwaredevelopmentprocess,couldhavedetected 
thebackdoorsandperhapssavedthecompany.
Duringthesoftwaredevelopmentprocess,youarevulnerabletothesame 
typesofinsiderattacksthatcanoccuronproductionsystems.Onesoftware 
developmentprojectmanager,recognizingtherewasnowaytoattribute 
actionstoasingleuserinthedevelopmentenvironment,repeatedlysabo-
tagedhisownteam’sproject.Themotivationinthiscasewasunique:His 
teamwasfallingbehindintheprojectschedule,andheusedtherepeated
sabotageasaconvenientexcuseformisseddeadlines.Itisimportant 
thatyouconsiderresiliencyduringthedevelopmentprocessjustason 
productionsystems.
Installation
Avarietyofoversightsintheprocessofmovingasystemfrom  development 
toproductionprovidedavenuesforattackbyinsiders.Examplesfrom 
severaldifferentcasesfollow.
Thesamepasswordfilewasusedfortheoperationalsystemwhenit 
wasmovedintoproductionashadbeenusedinthedevelopmentenvi-
ronment,enablingoneofthedeveloperstoaccessandstealsensitive 
dataafterithadbeenenteredintotheoperationalsystem.
Unrestrictedaccesstoallcustomers’systemsenabledacomputer 
techniciantoplantavirusdirectlyoncustomernetworks.
AnorganizationimplementedaWebcontent-managementsystem 
thatmanagedallchangestoitspublicWebsite.Althoughituseda 
change-controlsystemtotrackchanges,ithadnoprocessforapproval 
ofchangesbeforetheywerereleasedtotheWebsite.Asaresult,acol-
legeintern,beforeleavingforthesummer,publishedmaterialintended 
tobeajokeontheorganization’sWebsite,causingquiteascandaland 
damagetothereputationofthegovernmentagency.
Itisimportantthatyoucarefullyconsiderthesetypesofissuesasyoumove 
asystemfromdevelopmenttoproductionbecauseemployeesusingthose 
systemsonadailybasiswilllikelynoticethevulnerabilities.
ptg7481383
Practice9:ConsiderInsiderThreatsintheSoftwareDevelopmentLifeCycle 185
System Maintenance
MoreinsiderincidentsoccurredduringthemaintenancephaseoftheSDLC 
thanduringinitialsystemimplementation.Weknowfromourassessments 
andworkshopsthatorganizationsimposemorestringentcontrolsduring 
theinitialdevelopmentprocess,butonceasystemhasbeeninproduc-
tionandstabilizedfollowinginitialrelease,thosecontrolstendtobecome 
morelax.Insidersinourcasestookadvantageofthoserelaxedcontrolsin 
a  varietyofways.
Whilemanyorganizationsinstitutemandatorycodereviewsfor 
developmentofnewsystemsorsignificantnewmodulesforexistingsys-
tems,severalinsiderswereabletoinjectmaliciouscodeintostable,fairly 
staticsystemswithoutdetection.Ineffectiveconfigurationorchange-
controlprocessescontributedtotheirabilitytodoso.Afeworganizations 
inthecasesexaminedimplementedconfiguration-managementsystems 
thatrecordedadetailedlogofthemaliciousinsideractivity.However, 
therewasno  proactiveprocessforactuallycontrollingsystemreleases
usingthose  systemsorreviewingthelogstodetectmaliciousactivityafter 
thefact.
Insiderswerealsoabletosabotagebackupsystemsthatwereleft 
unprotectedtoamplifytheirattack.Also,knownsystemvulnerabilities 
wereexploitedonunpatchedsystemsbyafewknowledgeableinsiders. 
Riskmanagementofcriticalsystemsneedstoextendbeyondthesystem 
itselftosurroundingsupportsystems,suchastheoperatingsystemand 
backups.
Userauthorizationisanotherareathattendstobecomemorelaxovertime. 
Whenasystemisinitiallyreleased,systemauthorizationsandaccessmeth-
odstendtobecarefullyimplemented.Oncethesystemisinproduction, 
useraccesscontrolstendtoslip.Accesstothesystemandtothesource 
codeitselfmustbecarefullymanagedovertime.
Case Studies: What Could Happen if I Don’t Do It?
Aprogrammeratatelecommunicationscompanywasangrywhenit 
wasannouncedthattherewouldbenobonuses.Heusedthecomputer 
usedbyhisprojectleader,whosatinacubicleandoftenleftthecomputer 
loggedinandunattended,tomodifyhiscompany’spremierproduct,an 
inter-networkcommunicationinterface.Hismodification,consistingof 
twolinesofcode,insertedthecharacteriatrandomplacesinthetrans-
missionstreamandduringprotocolinitialization.Themaliciouscode 
wasinsertedasalogicbomb,recordedinthecompany’sconfiguration 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
186
managementsystem,andattributedtotheprojectleader.Sixmonthslater, 
theinsiderleftthecompanytotakeanotherjob.Sixmonthsthereafter,the 
logicbombfinallydetonated,causingimmenseconfusionanddisruption 
tothe  company’sservicestoitscustomers.
Thiscaseexemplifiesmanyoftheissuesdiscussedinthissection.Thenext 
caseillustratesamorelow-techincidentthatwasenabledbyoversightsin 
theSDLC,withseriousconsequences.
Theprimaryresponsibilityofapolicecommunicationsoperatorwasto 
communicateinformationregardingdriver’slicensestopoliceofficers 
inthefield.Thiscasebeganwhentheoperatorwasapproachedbyan 
acquaintanceandaskedifshewouldbewillingtolookupinformation 
forthreepeopleforhim,andsheagreed.Overtime,sheproceededto 
lookupinformationonpeopleinreturnforpaymentbyheracquaintance. 
Atsomepointshediscoveredthatshenotonlycouldreadinformation 
fromthedatabase,butalsocoulduseothersystemfunctions.Atthat 
point,attherequestofheraccomplice,shebegantogenerate,inreturn
forpayment,illegaldriver’slicensesforpeoplewhowereunabletogain 
legitimatelicenses.Fortunately,aconfidentialinformantledtoherarrest 
for  fraudulentlycreatingapproximately195illegaldriver’slicenses.
Thiscaseshowsthedangersofoverlookingrole-basedaccesscontrol 
requirementswhendefiningsystemrequirements,designingthesystem, 
andduringimplementation.
ptg7481383
187Practice10:UseExtraCautionwithSystemAdministrators
Practice 10: Use Extra Caution with System
Administrators and Technical or Privileged Users
Systemadministratorsandtechnicalorprivilegedusershavethe  technical 
ability,access,andoversightresponsibilitytocommitandconceal  malicious 
activity.
What Can You Do?
RecallthatthemajorityoftheinsiderswhocommittedITsabotageheld 
technicalpositionssuchassystemadministrator,DBA,orprogrammer. 
Technicallysophisticatedmethodsofcarryingoutandconcealingmali-
ciousactivityincludedwritingordownloadingofscriptsorprograms 
(includinglogicbombs),creationofbackdooraccounts,installationof 
remotesystemadministrationtools,modificationofsystemlogs,planting 
ofviruses,anduseofpasswordcrackers.
Systemadministratorsandprivileged users5bydefinitionhaveahigher 
system,network,orapplicationaccesslevelthanotherusers.Thishigher 
accesslevelcomeswithhigherriskduetothefollowing.
Theyhavethetechnicalabilityandaccesstoperformactionsthat 
ordinaryuserscannot.
Theycanusuallyconcealtheiractions,sincetheirprivilegedaccess 
typicallyprovidesthemtheabilitytologinasotherusers,tomodify 
systemlogfiles,ortofalsifyauditlogsandmonitoringreports.
Evenifyouenforcetechnicalseparationofduties,systemadministrators 
aretypicallytheindividualswithoversightandapprovalresponsibility
whenapplicationorsystemchangesarerequested.
Techniquesthatpromotenonrepudiationofactionensurethatonlineactions 
takenbyusers,includingsystemadministratorsandprivilegedusers,can 
beattributedtothepersonwhoperformedthem.Therefore,shouldmali-
ciousinsideractivityoccur,nonrepudiationtechniquesalloweachand 
everyactivitytobeattributedtoasingleemployee.Policies,practices, 
andtechnologiesexistforconfiguringsystemsandnetworkstofacilitate 
nonrepudiation.However,keepinmindthatsystem  administratorsand 
5.  Privileged users:userswhohaveanelevatedlevelofaccesstoanetwork,computersystem,or 
applicationthatisshortoffullsystemadministratoraccess.Forexample,databaseadministrators 
(DBAs)areprivilegedusersbecausetheyhavetheabilitytocreatenewuseraccountsandcontrolthe 
accessrightsofuserswithintheirdomain.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
188
otherprivilegeduserswillbetheonesresponsiblefordesigning,creating, 
andimplementingthosepolicies,practices,andtechnologies.Therefore, 
separationofdutiesisalsoveryimportant:Network,system,andappli-
cationsecuritydesignsshouldbecreated,implemented,andenforcedby 
multipleprivilegedusers.
Evenifonlineactionscanbetracedtothepersonwhoengagedinthe 
action,itisunreasonabletoexpectthatalluseractionscanbemonitored 
proactively.Therefore,whilethepracticesdiscussedhereensureidentifi-
cationofusersfollowingdetectionofsuspiciousactivity,additionalsteps 
mustbetakentodefendagainstmaliciousactionsbeforetheyoccur.For 
instance,systemadministratorsandprivilegedusershaveaccesstoall 
computerfileswithintheirdomains.Technologiessuchasencryptioncan 
beimplementedtopreventsuchusersfromreadingormodifyingsensitive 
filestowhichtheyshouldnothaveaccess.
AswedescribedinPractice6,policies,procedures,andtechnicalcontrols 
shouldenforceseparationofdutiesandrequireactionsbymultipleusers 
forreleasingallmodificationstocriticalsystems,networks,applications, 
anddata.Inotherwords,nosingleusershouldbepermittedorbetech-
nicallyabletoreleasechangestotheproductionenvironmentwithout 
onlineactionbyaseconduser.Thesecontrolswouldpreventaninsider 
fromreleasingalogicbombwithoutdetectionbyanotheremployee.They 
wouldalsohavebeeneffectiveagainstaforeigninvestmenttrader,who 
manipulatedsourcecodetocarryouthiscrime.Hehappenedtohavea 
degreeincomputerscience,andwasthereforegivenaccesstothesource 
codeforthetradingsystem.Heusedthataccesstobuildinbackdoor 
functionality,whichenabledhimtohidetradinglosseswithoutdetection 
totalingapproximately$700millionoverafive-yearperiod.
Notethatinordertoenforceseparationofdutiesforsystemadministration 
functions,youmustemployatleasttwosystemadministrators.Thereare 
afewcasesinthisbookinwhichtheorganizationwasvictimizedbyits 
solesystemadministrator.Althoughmanysmallorganizationsmaynotbe 
abletohiremorethanonesystemadministrator,itisimportantthatthey 
recognizetheincreasedriskthataccompaniesthatsituation.
Finally,manyoftheinsidersstudied,especiallythoseengagedinIT 
sabotage,wereformeremployees.Youmustbeparticularlycarefulindis-
ablingaccess,particularlyforformersystemadministratorsandtechnical 
orprivilegedusers.Thoroughlydocumentedproceduresfordisabling 
accesscanhelpensurethatstrayaccesspathsarenotoverlooked.In 
addition,thetwo-personruleshouldbeconsideredforthecritical  functions 
ptg7481383
189Practice10:UseExtraCautionwithSystemAdministrators
performedbytheseuserstoreducetheriskofextortionaftertheyleavethe 
organization.
Case Studies: What Could Happen if I Don’t Do It?
Asystemadministratorataninternationalfinancialorganizationheard 
rumorsthattheannualbonusesweregoingtobelowerthanexpected. 
Hebeganconstructingalogicbombathomeandusedauthorizedremote
accesstomovethelogicbombtothecompany’sserversaspartofthetyp-
icalserverupgradeprocedureoveraperiodoftwoandahalfmonths. 
Whenhewasinformedbyhissupervisorthathisbonuswouldbesig-
nificantlylowerthanhehadexpected,heterminatedhisemployment 
immediately.Lessthantwoweekslater,thelogicbombwentoffat9:30 
a.m.,deleting10billionfilesonapproximately1,000serversthroughout 
theUnitedStates.Thevictimorganizationestimatedthatitwouldcost 
morethan$3milliontorepairitsnetwork,andthelossaffected1.24billion 
sharesofitsstock.
Inthiscase,thedisgruntledinsiderplantedhislogicbombinthescript 
thatpropagatedsoftwaretoallofthecompany’sserversnightlyaspart 
ofitsconfiguration-managementprocess.Thisisanexampleofafilethat 
shouldbecarefullymonitoredforchanges,astherepercussionsofillicit 
modificationswillimpacteveryserverintheorganization.
Anemployeewaspromotedfromonepositiontoanotherwithinthe 
sameorganization.Bothpositionsusedthesameapplicationforenter-
ing,approving,andauthorizingpaymentsformedicalanddisability 
claims.Theapplicationusedrole-basedaccesstoenforceseparationof 
dutiesforeachsystemfunction.However,whenthisparticularemployee 
waspromoted,shewasauthorizedforhernewaccesslevel,butadmin-
istratorsneglectedtorescindherprioraccesslevel(separationofduties 
wasinadequatelyenforced).Asaresult,sheendeduphavingfullaccess 
totheapplication,withnooneelserequiredtoauthorizetransactions 
(payments)fromthesystem.Sheenteredandapprovedclaimsand 
authorizedmonthlypaymentsforherfiancé,resultinginpaymentsof 
morethan$615,000overalmosttwoyears.
Thiscaseillustrateswhatwemeanby“privilegeduser.”The“erosion 
ofaccesscontrols”whenemployeesmovearoundwithinanorganiza-
tionpresentsadefinitevulnerability.Weknowfromourassessmentsand 
workshopsthatthisisaverydifficultproblemthatmostorganizations 
havenotsolved.Hereisacontrolthatoneorganizationweworkwith 
hasimplemented:Whenanemployeetransferswithintheorganization, 
theorganizationsetsthetransferdateinadatabase.Ithasanautomated 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
190
scriptthatsendsanemailtothemanageroftheteamthattheemployee 
transferredfromthreemonthsafterthetransfer.Thescriptreminds
themanagerthattheemployeeleft,andlistsalloftheemailaliasesthe 
employeeisstillon,allinternalWebsitestheemployeestillhasaccessto, 
allsharedfolderstheemployeestillhasaccessto,andsoon.Theorganiza-
tionhasfoundthatathree-monthtransitionperiodistypicallytheright 
amountoftimeinwhichemployeesneedlegitimateaccesstoboththeir 
newandoldteam’sinformation.Afterthreemonths,theorganizationhas 
foundthatmostmanagersarereadytorescindaccessfortheirteam’sfor-
meremployee.
Thefollowingcasedemonstrateshoworganizationalfailuresindealing 
withdisgruntledsystemadministratorsandotherprivilegeduserscan 
eventuallyresultinITsabotage.
Adeveloperofe-commercesoftwareforanorganizationdecidedtomove 
hisfamilytoadifferentstate,andthereforehecouldnolongerworkforthe 
organization.Theorganizationhiredhimasaconsultantandhetraveled 
acrossstatelinestoworktwodaysaweek,andtelecommutedthreedays 
aweekfromhome.Hewasdisgruntledbecausetheorganizationwould 
notprovidehimthebenefitshefelthedeservedoncehebecameacontrac-
tor,andtherelationshipcontinuedtodeteriorate.Finally,theorganization 
toldhimhisemploymentwouldbeterminatedinapproximatelyone 
month.Afteraweekandahalf,heloggedinremotelyfromhome,deleted 
thesoftwarehewasdeveloping,aswellassoftwarebeingdevelopedby 
others,modifiedthesystemlogstoconcealhisactions,andthenchanged 
the root password.Hethenjoinedatelephoneconference,nevermention-
ingwhathehaddone.Afterthetelephoneconferenceendedhereported
thathewashavingproblemsloggingin,againtoconcealhisactions.At 
theendofthedayheannouncedhisresignation.Thisactioncosttheorga-
nizationmorethan$25,000,including230staffhoursandassociatedcosts.
Inmuchofthetextinthisbookweusethewordemployeeswhenwe 
reallymeanemployees and contractors.Thiscasepointsoutthatyoucannot 
overlookcontractorswhohavesystemadministratororprivilegedaccess 
toyoursystems,networks,andinformation.
ptg7481383
Practice11:ImplementSystemChangeControls 191
Practice 11: Implement System Change Controls
Changestosystemsandapplicationsmustbecontrolledtoprevent 
insertionofbackdoors,keystrokeloggers,logicbombs,andother  malicious 
codeorprograms.
What Can You Do?
Change controlsareformalprocessesusedtoensurethatchangestoa 
productorsystemareintroducedinacontrolledandcoordinatedman-
ner.6Thewidevarietyofinsidercompromisesthatreliedonunauthorized 
modificationstotheorganizationsystemssuggeststheneedforstronger 
changecontrols.Tosupportthis,youshouldidentifybaselinesoftwareand 
hardwareconfigurations.Youmayhaveseveralbaselineconfigurations, 
giventhedifferentcomputingandinformationneedsofdifferentusers 
(e.g.,accountant,manager,programmer,andreceptionist).Butasconfigu-
rationsareidentified,youshouldcharacterizethehardwareandsoftware 
thatmakeupthoseconfigurations.
Characterizationcanbeabasiccatalogofinformation,tracking  information
suchasversionsofinstalledsoftware,hardwaredevices,anddiskutilization.
However,suchbasiccharacterizationscanbeeasilydefeated,somorecompre-
hensivecharacterizationsareoftenrequired.These  characterizationsinclude
Cryptographicchecksums(usingSHA-1orMD5,forexample)
Interfacecharacterization(suchasmemorymappings,deviceoptions, 
andserialnumbers)
Recordedconfigurationfiles
Oncethisinformationiscaptured,computersimplementingeach 
configurationcanbevalidatedbycomparingtheinformationagainstthe 
baselinecopy.Discrepanciescanthenbeinvestigatedtodeterminewhether 
theyarebenignormalicious.Usingthesetechniques,changestosystem 
filesortheadditionofmaliciouscodewillbeflaggedforinvestigation. 
Therearetoolscalledfileintegrity checkers7thatpartiallyautomatethis 
processandprovideforscheduledsweepsthroughcomputersystems.
Computerconfigurationsdonotremainunchangedforlong.Therefore, 
characterizationandvalidationshouldbepartofyourchange-management 
6.  Wikipedia
7.  File integrity checker:atoolthatpartiallyautomatestheprocessofidentifyingchangesto  system 
filesortheadditionofmaliciouscodeandflaggingthemforinvestigation.Seewww.sans.org/
resources/idfaq/integrity_checker.phpforadiscussionoffileintegritycheckers.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
192
process.Differentrolesshouldbedefinedwithinthisprocessand 
conductedbydifferentindividualssothatnoonepersoncanmakea 
changeunnoticedbyotherswithinyourorganization.Forexample,vali-
dationofaconfigurationshouldbedonebyapersonotherthantheone 
whomadechangessothatthereisanopportunitytodetectandcorrect 
maliciouschanges(includingplantingoflogicbombs).
Changelogsandbackupsneedtobeprotectedsothatunauthorized 
changescanbedetectedand,ifnecessary,thesystemrolledbacktoapre-
viousvalidstate.Inaddition,someinsidersincasesintheCERTdatabase 
modifiedchangelogstoconcealtheiractivityorframesomeoneelsefor 
theiractions.Otherinsiderssabotagedbackupstofurtheramplifythe 
impactoftheirattack.
Manyorganizationsdefendagainstmaliciouscodeusinganti-virus 
softwareandhostornetworkfirewalls.Whilethesedefensesareuseful 
againstexternalcompromises,theirvalueislimitedinpreventingattacks 
bymaliciousinsidersintwoimportantrespects:Theydonotworkagainst 
newornovelmaliciouscode(includinglogicbombsplantedbyinsiders) 
andtheyareconcernedprimarilywithmaterialspreadthroughnetwork-
inginterfacesratherthaninstalleddirectlyonamachine.Changecontrols 
helpaddressthelimitationsoftheseperimeterdefenses.
Justastoolscanbeimplementedfordetectingandcontrollingsystem 
changes,configuration-managementtoolsshouldbeimplementedfor 
detectingandcontrollingchangestosourcecodeandotherapplicationfiles. 
AsdescribedinPractice9,someinsidersmodifiedsourcecodeinorderto 
carryouttheirattack.Notethatthesemodificationsweretypicallydone 
duringthemaintenancephaseoftheSDLC,notduringinitialimplemen-
tation.Itappearsthatsomeorganizationsinstitutemuchmorestringent 
configuration-managementcontrolsduringinitialdevelopmentofanew 
system,includingcodereviewsanduseofaconfiguration-management 
system.However,oncethesystemisinproductionanddevelopmentsta-
bilizes,thosecontrolsdonotseemtobeasstrictlyenforced.Itappearsthat 
organizationstendtorelaxthecontrols,leavingopenavulnerabilityfor 
exploitbytechnicalinsiderswiththepropermotivationandlackofethics.
Case Studies: What Could Happen if I Don’t Do It?
Amanufacturingfirm’ssystemadministratorbeganemploymentasa 
machinist.Overaten-yearperiod,theinsidercreatedthecompany’s 
networksupportingthecriticalmanufacturingprocessesandhadsole 
authorityforsystemadministrationoverthatnetwork.Thecompany 
ptg7481383
Practice11:ImplementSystemChangeControls 193
eventuallyexpanded,openingadditionalofficesandplantsnationally 
andinternationally.Theinsiderdidthefollowing.
Hebegantofeeldisgruntledathisdiminishingimportancetothe 
company.
Helaunchedverbalandphysicalassaultsoncoworkers.
Hesabotagedprojectsofwhichhewasnotincharge.
Heloadedfaultyprogramstomakecoworkerslookbad.
Hereceivedaverbalwarningandtwowrittenreprimands,wasdemoted, 
andfinallywasfiredasaresultofhisactions.Afewweekslater,alogic 
bombexecutedonthecompany’snetwork,deleting1,000criticalmanu-
facturingprogramsfromthecompany’sservers.Theestimatedcostof 
thedamageexceeded$10million,leadingtothelayoffofapproximately 
eightyemployees.Theinvestigationrevealedthattheinsiderhadactually 
testedthelogicbombthreetimesonthecompany’snetworkafterhours 
priortohistermination.
Inthiscase,practicesfordetectionofmaliciouscodewouldhavedetected 
thatanewprogramhadbeenreleasedwithtimedexecution.Change-
controlprocedureswithatwo-personruleforreleaseofsystem-level 
programs,andcharacterizationprocedures,couldhavedetectedtherelease
ofanewsystemfilethatwasnotpartoftheoriginalsystembaseline.
Anorganizationbuiltautomatedmonitoringintoitssoftwarethatsent 
automaticnotificationtothesecurityofficeranytimeahighlyrestricted
screenwasusedtomodifyinformationstoredinthedatabase.Role-based 
accesscontrolrestrictedaccesstothisscreentoafewprivilegedusers;the 
automatednotificationprovidedasecondlayerofdefenseagainstillegal 
datamodificationusingthatfunction.However,anITmanagerwhohad 
accesstothesourcecodemodifieditsothattheautomatednotification 
wasnolongersent;hesimplycommentedoutasinglelineofcode.He 
thenproceededtousethefunctiontostealalargesumofmoneyfromhis 
employer.
Interestingly,thisorganizationhadaconfiguration-managementsystem 
inplaceforsoftwarechanges.Whenaprogramwascompiled,areport
wasproducedlistingwhichfileswerecompiled,bywhichcomputer 
account,andwhen.Italsolistedmodulesadded,modified,ordeleted. 
Unfortunately,thisreportwasnotmonitored,andthereforetheapplication 
changeswerenotdetectedduringtheyearandahalfoverwhichthefraud 
wascommitted.Haditbeenmonitored,orhadtheconfiguration-control 
systemenforcedatwo-personruleforreleasingnewversionsofsoftware, 
theremovalofthesecuritynotificationwouldhavebeendetectedandthe 
insidercouldnothavecommittedthefraud.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
194
Althoughthisinsidercommittedfraud,stoptoaskyourselfifyouhave 
anymission-criticalsystemsthatcouldbemodifiedinthisway.Whatif 
thishadbeenasafetysystem,orasecuritysystem?Whatpotentialdamage 
couldoneofyouremployeesorcontractorsinflictbycommentingouta 
fewlinesofsourcecode?
SomecasesintheCERTdatabaseinvolvedtheftofinformationusinga 
keystroke logger—ahardwareorsoftwaredevicethatrecordstheexact 
keystrokesenteredintoacomputersystem.Keystrokeloggerscanbeused 
maliciouslytoobtainanorganization’sconfidentialinformationoranindi-
vidual’sprivateinformation,andintheworstcasecanbeusedtoobtain 
passwordsorencryptionkeys.
Aclaimsmanagerataninsurancecompany,whowasupsetwiththe 
company’spracticeofcancelingpoliciesafterlatepayment,installeda 
hardwarekeystrokeloggeronthecomputerofthesecretarytoachiefexec-
utive.Althoughhedidnothaveaccesstotheexecutive’soffice,herealized
thatanabundanceofconfidentialinformationpassedfromthesecretaryto 
andfromtheexecutive.Furthermore,herdeskwasnotphysicallysecured, 
liketheexecutive’sofficewas.Theinsiderusedthekeystrokeloggerto 
gatherconfidentialinformationfromthesecretary’scomputer,whichhe 
thensenttothelegalteamassemblingthecaseagainsttheorganization.
Othercasesinvolvedsoftwarekeystrokeloggers.
Twoinsiderscolludedwithanexternalpersontocollecttheircompany’s 
intellectualpropertyandrelayittoacompetitor.Theexternalcollaborator 
sentanemailmessagecontaininganattachmentinfectedwithavirusto 
oneoftheinsiders.Theinsiderdeliberatelydouble-clickedontheinfected 
attachment,anditproceededtoinstallakeystrokeloggeronmachineson 
thecompany’snetwork.Thekeystrokeloggerperiodicallysentconfiden-
tialinformationtoacompetitor,whousedittolurecustomersawayfrom 
thevictimorganization.
Thesoftwarekeystrokeloggercouldhavebeendetectedbyachange-
controlprocessasdescribedinthissection.
ptg7481383
Practice12:Log,Monitor,andAuditEmployeeOnlineActions 195
Practice 12: Log, Monitor, and Audit Employee Online
Actions
Logging,monitoring,andauditingcanleadtoearlydiscoveryand 
investigationofsuspiciousinsideractions.
What Can You Do?
Ifaccountandpasswordpoliciesandproceduresareinplaceandenforced, 
yourorganizationhasagoodchanceofclearlyassociatingonlineactions 
withtheemployeewhoperformedthem.Logging,monitoring,andaudit-
ingprovideyoutheopportunitytodiscoverandinvestigatesuspicious 
insideractionsbeforemoreseriousconsequencesensue.
Auditinginthefinancialcommunityreferstoexaminationand  verification 
offinancialinformation.Inthetechnicalsecuritydomain,itreferstoexam-
inationandverificationofvariousnetwork,system,andapplicationlogs 
ordata.Topreventordetectinsiderthreats,itisimportantthatauditing 
involvethereviewandverificationofchangestoanyofyourcriticalassets.8
Furthermore,auditingmustexamineandverifytheintegrityaswellasthe 
legitimacyofloggedaccess.
Automatedintegritycheckingshouldbeconsideredforflaggingarequired
manualreviewofsuspicioustransactionsthatdonotadheretopredefined 
businessrules.Insiderthreatsaremostoftendetectedbyacombination 
ofautomatedloggingandmanualmonitoringorauditing.Forexample, 
integritycheckingofcomputeraccountcreationlogsinvolvesautomated 
loggingcombinedwithmanualverificationthateverynewaccounthas 
beenassociatedwithalegitimatesystemuserandthattheuserisawareof 
theaccount’sexistence.
Automatedtoolscoulddetectcreationofthetypicalbackdoor
account—asystemadministratoraccountnotassociatedwithacur-
rentemployee.Unfortunately,detectionofbackdooraccountscannot
betotally  automated.Forexample,oneinsidercreatedvirtualprivate
network(VPN)accountsforthreelegitimate,currentemployees,and
simplydidnottellthemtheaccountshadbeencreated.Afterbeingfired,
heusedthosebackdooraccountstoobtainremoteaccessatnightfortwo
weeks.Hesetuphisattackduringthosetwoweeksrightunderthenose
8.  Manyriskmanagementmethodologiesarebasedonprotectionofcriticalassets—forexample, 
theOCTAVE(OperationallyCriticalThreat,Asset,andVulnerabilityEvaluation)risk-basedstrategic 
assessmentandplanningtechniqueforsecurity[Alberts2003].Seealsowww.cert.org/octave/.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
196
ofacontractor,whowashiredspecificallytomonitorthenetworkfor
remoteaccessbyhim.
Likewise,dataauditstypicallyinvolvemanualprocesses,suchascom-
paringelectronicdatamodificationhistorytopaperrecordsorexamining 
electronicrecordsforsuspiciousdiscrepancies.
Acommonreactiontooursuggestionsformonitoringandauditingfor 
potentialinsiderthreatsisthis:Thereisanabundanceofmonitoringtools 
onthemarket,andtheyproducesomuchinformationoverloadthatitis 
impossibletoreviewthedata;it’sliketryingtofindaneedleinahaystack. 
Thegoodnewsisthatifyoudesignmonitoringstrategiesbasedonthepat-
ternsininsiderthreatcaseswedescribeinthisbook,youwillminimize 
informationoverloadbyusingarisk-basedapproachtoprioritizingalerts.
Auditingshouldbebothongoingandrandom.Ifemployeesareaware
thatmonitoringandauditingisaregular,ongoingprocessandthatitis
ahighpriorityfortheindividualswhoareresponsibleforit,itcanserve
asadeterrenttoinsiderthreats.Forexample,ifadisgruntledsystem
administratorisawarethatallnewcomputeraccountsarereviewedfre-
quently,itislesslikelythatheorshewillcreatebackdooraccountsfor
later  malicioususe.
Ontheotherhand,itprobablyisnotpracticaltoinstitutedaily  monitoring 
ofeveryfinancialtransactioninafinancialinstitution.Monthlyandquar-
terlyauditingprovidesonelayerofdefenseagainstinsiders,butitalso 
providesapredictablecycleonwhichinsiderscoulddesignafraudscheme 
thatcouldgoundetectedoveralongperiodoftime.Randomaudit-
ingofalltransactionsforagivenemployee,forexample,couldaddjust 
enoughunpredictabilitytotheprocesstodeteraninsiderfrom  launchinga 
contemplatedattack.
ItisalsoworthmentioningthatmultipleinsidersincasesintheCERT 
databaseattackedotherexternalorganizationsfromtheircomputersat 
work.Theforensicsandinvestigationactivitiesthattheemployees’orga-
nizationshadtoendureasaresultwereverydisruptivetotheirstaffand 
operations.
AswedescribedinChapter3,inalmostalloftheinsidertheftofIPcases 
theinsiderresignedbeforeorafterthetheft.Themajorityofthetheftstook 
placewithinonemonthoftheinsider’sresignation,andmoststoleallofthe 
informationatonce.Mostofthoseinsidersmadenoefforttoconcealtheir 
technicalactions.Thissuggeststhatmonitoringofonlineactions,particu-
larlydownloadswithinonemonthbeforeandafterresignation,couldbe 
ptg7481383
Practice12:Log,Monitor,andAuditEmployeeOnlineActions 197
particularlybeneficialforpreventingordetectingthetheftof  proprietary 
information. 
Awidevarietyoftechnicalmeanswereusedinthetheftcasestotransfer 
information,includingemail,phone,fax,downloadingtoorfromhome 
overtheInternet,collectionandtransmissionbymaliciouscode,andprint-
ingoutmaterialontheorganizations’printers.Ifyouaremonitoringfor 
theftofinformation,youneedtoconsiderthewidevarietyofwaysthat 
informationispurloinedandcustomizeyourdetectionstrategyaccord-
ingly.Dataleakagetoolsmayhelpwiththistask.Manytoolsareavailable 
thatenableyoutoperformfunctionssuchasthefollowing:
Alertingadministratorstoemailswithunusuallylargeattachments
Taggingdocumentsthatshouldnotbepermittedtoleavethenetwork
Trackingorpreventingprinting,copying,ordownloadingofcertain 
information,suchasPIIordocumentscontainingcertainwordslike 
new-productcodenames
Trackingofalldocumentscopiedtoremovablemedia
Preventingordetectingemailstocompetitors,togovernmentsand 
organizationsoutsidetheUnitedStates,toGmailorHotmailaccounts, 
andsoon
Centralloggingappliancesandeventcorrelationenginesmayhelp 
craftautomatedqueriesthatreduceananalyst’sworkloadforroutinely
inspectingthistypeofdata.
Sometheftcasesinvolvedinsidersdownloadinginformationoutsidetheir 
areaofexpertiseorresponsibility.Thismayprovideameansforyouto 
detectsuspiciousactivity,providedyoutrackwhatinformationeach 
employeeneedsinordertoaccomplishhisorherjob.Role-basedaccess 
controlmayprovideabasisforsuchtracking.
Finally,youmustbeawareofthepossibilitythatinsiderswillattackanother 
organization,possiblyapreviousemployer,usingyoursystems.Whilenot 
common,suchcrimescananddohappen—thereareafewsuchcasesinthe 
CERTdatabase.Youneedtoconsidertheliabilityand  disruptionthatsuch 
acasecouldcause.
Thebottomlineisthatyouneedtohaveclearlydefinedemployee- 
monitoringpolicies,andtheymustbeconsistentlyenforced.Policiesmust 
defineveryclearthresholdsforwhenaspecificemployeewillbeaudited 
andmonitored.Inaddition,youcannotmonitorsomeemployeeswho 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
198
exceedthosethresholdsandnotothers.Employeeprivacylawsmustbe 
consideredwhendevelopingamonitoringpolicy;employeemonitoring 
policiesandproceduresshouldbedevelopedinconjunctionwithyour 
legalstaff.
Case Studies: What Could Happen if I Don’t Do It?
Aresearchchemistwasresponsibleforvariousresearchanddevelopment 
projects.Hisorganizationofferedhimapositioninaforeigncountry,but 
hisfamilydidnotwanttomovetothatlocation.Consequently,hesought 
employmentwithacompetitor;thecompetingcompanyofferedhim 
aposition,butthestartdatewasnotforafewmonths.Theinsiderdid 
notnotifyhiscurrentorganizationofhisplantoresignuntiltwoweeks 
priortostartinghisnewjobwiththecompetitor.Overthatfour-month 
period,fromwhenhereceivedthejoboffertowhenheleftthevictim 
organization,hedownloadednearly17,000PDFfilesand22,000abstracts 
containingtradesecretsfromhisemployer’sserver.Thedownloadstook 
placeon-site,duringworkhours,overseveral15-to20-hourperiods.The 
amountofdatahedownloadedwas15timeshigherthanthatofthenext 
highestuserandthedatawasnotrelatedtohisresearch.Hisactivities 
wentunnoticeduntilheleft,andthevictimorganizationdetectedhissub-
stantialnumberofdownloads.
Afterstartinghisjobatthecompetitor,hetransferredtheinformationtoa 
company-assignedlaptop.Thevictimorganizationnotifiedthecompeti-
torthatithaddiscoveredthehigh-volumedownloads.Thecompetitor 
seizedtheinsider’slaptopandturneditovertothevictimorganization, 
whichturneditovertotheFBI.Agentsdiscovereddocumentsfromthe 
victimorganizationmarked“Confidential,”shreddedtechnicaldocu-
ments,andnumerousotherdocumentsintheinsider’sapartmentandina 
storageunit.Whenthesearchwasconducted,theinsiderwasattempting 
toeraseanexternalharddrive.Hewasarrested,convicted,sentencedto 
18monthsofimprisonment,andorderedtopay$14,500inrestitutionand 
a$30,000fine.
Considerwhetherthiscouldhappentoyou.Ifso,youshouldconsideruse 
oftechnicaldetectionmethodsforalertingwhenanemployeeorcontrac-
tordownloadsasignificantamountofinformation.Thisshouldnotresult
in“informationoverload”asonewouldthinkthisshouldnot  happenvery 
often!
Alargeinternationalcompany,whileperformingremoteaccessmonitor-
ing,noticedthataformerconsultanthadobtainedunauthorizedaccess
toitsnetworkandcreatedanadministratoraccount.Thispromptedan
investigationoftheformerinsider’spreviousonline  activity,  revealinghe
ptg7481383
Practice12:Log,Monitor,andAuditEmployeeOnlineActions 199
hadrunseveraldifferentpassword-crackingprogramsonthe  company’s
networkfivedifferenttimesoveraten-monthperiod.Initially,hestored
thecrackedpasswordsinafileonthecompany’sserver.Laterheinstalled
amoresophisticatedpassword-crackingprogramonthecompany’ssys-
tem.Thisprogramenabledhimtoautomaticallytransferallaccountsand
passwordsthatcouldbecrackedtoaremotecomputeronaperiodicbasis.
Fivethousandpasswordsforcompanyemployeesweresuccessfullytrans-
ferred.
Thiscaseillustratestheimportanceofloggingandproactivemonitoring. 
Becauseofthosepractices,thisinsider’sactionsweredetectedbeforeany 
maliciousactivitywascommittedusingtheaccountsandpasswordsorthe 
backdooraccount.Thenextcaseprovidesacontrastingexample—onein 
whichlackofauditingpermittedtheinsidertoconductanattackthatwas 
lesstechnicallysophisticatedbutthatenabledhimtostealalmost$260,000 
fromhisemployeroveratwo-yearperiod.
Theinsider,whowasthemanagerofawarehouse,convincedhis 
supervisorthatheneededprivilegedaccesstotheentirepurchasing 
systemforthewarehouse.Hethenaddedafakevendortothelistofautho-
rizedsuppliersforthewarehouse.Overthenexttwoyears,heentered 
78purchaseordersforthefakevendor,and,althoughnosupplieswere 
everreceived,healsoauthorizedpaymenttothevendor.Hewasaware 
ofapprovalprocedures,andallofhisfraudulentpurchasesfellbeneath 
thethresholdforindependentapproval.Thebankaccountforthevendor 
happenedtobeownedbyhiswife.Thefraudwasaccidentallydetectedby 
afinanceclerkwhonoticedirregularitiesinthepaperworkaccompanying 
oneofthepurchaseorders.
Thisfraudcouldhavebeendetectedearlierbyclosermonitoringofonline 
activitiesbyprivilegedusers,particularlysincethisuserpossessedunusu-
allyextensiveprivilegedaccess.Inaddition,normalauditingprocedures 
couldhavevalidatedthenewvendor,andautomatedintegritychecking 
couldhavedetecteddiscrepanciesbetweenthewarehouseinventoryand 
purchasingrecords.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
200
Practice 13: Use Layered Defense against Remote Attacks
Remoteaccessprovidesatemptingopportunityforinsiderstoattackwith 
lessrisk.
What Can You Do?
Insidersoftenattackorganizationsremotely,eitherusinglegitimate 
accessorfollowingtermination.Whileremoteaccesscangreatlyenhance 
employeeproductivity,cautionisadvisedwhenremoteaccessisprovided 
tocriticaldata,processes,orinformationsystems.Insidershaveadmit-
tedtousininterviewsthatitiseasiertoconductmaliciousactivitiesfrom 
homebecauseiteliminatestheconcernthatsomeonecouldbephysically 
observingthemaliciousacts.
Thevulnerabilitiesinherentinallowingremoteaccesssuggestthat 
multiplelayersofdefenseshouldbebuiltagainstremoteattack.Youmay 
provideremoteaccesstoemailandnoncriticaldatabutshouldconsider 
limitingremoteaccesstothemostcriticaldataandfunctionsandonly 
frommachinesthatareadministeredbyyourorganization.Accesstodata 
orfunctionsthatcouldinflictmajordamagetoyoushouldbelimitedto 
employeesphysicallylocatedinsidetheworkplaceasmuchaspossible. 
Remotesystemadministratoraccessshouldbelimitedtothesmallest 
grouppracticable,ifnotprohibitedaltogether.
Whenremoteaccesstocriticaldata,processes,andinformationsystems
isdeemednecessary,youshouldoffsettheaddedriskwithcloserlogging
andfrequentauditingofremotetransactions.Allowingremoteaccess
onlyfromorganization-ownedmachineswillenhanceyourabilitytocon-
trolaccesstoinformationandnetworksandmonitortheactivityofremote
employees.Informationsuchasloginaccount,date/timeconnectedand
disconnected,andIPaddressshouldbeloggedforallremotelogins.It
alsoisusefultomonitorfailedremotelogins,includingthereasonthe
loginfailed.Ifauthorizationforremoteaccesstocriticaldataiskepttoa 
minimum,monitoringcanbecomemoremanageableandeffective.
Disablingremoteaccessisasometimesoverlookedbutcriticalpartofthe 
employeeterminationprocess.Itiscriticalthatemployeetermination 
proceduresinclude
Retrievinganyorganization-ownedequipment
Disablingremoteaccessaccounts(suchasVPNanddial-inaccounts)
ptg7481383
Practice13:UseLayeredDefenseagainstRemoteAttacks 201
Disablingfirewallaccess
Changingthepasswordsofallsharedaccounts(includingsystem 
administrator,DBA,andotherprivilegedsharedaccounts)
Closingallopenconnections
AcombinationofremoteaccesslogsandsourceIPaddressesusually 
helpstoidentifyinsiderswholaunchremoteattacks.Identificationcanbe 
straightforwardbecausetheusernameoftheintruderpointsdirectlytothe 
insider.Ofcourse,corroborationofthisinformationisrequired,because 
theintrudersmighthavebeentryingtoframeotherusers,castattention 
awayfromtheirownmisdeedsbyusingotherusers’accounts,or  otherwise 
manipulatethemonitoringprocess.
Case Studies: What Could Happen if I Don’t Do It?
Thechieftechnologyofficer(CTO)announcedhisresignationfollowing 
asalarydisputewiththeCEO.Heleftonemonthlater,andwenttowork 
asatemporaryemployeeforanunrelatedorganization.Threeweeksafter 
heleft,hisformercompany’svoice-mailservicestartedsendingsome 
customerstoapornographictelephoneservice.Oneweekafterthatinci-
dent,unusualtrafficonthecompany’snetworkcausedthenetworktofail. 
Ashorttimelater,itsemailserverswerefloodedwiththousandsofmes-
sagescontainingpornographicimages,andauto-replymessagesweresent 
fromitsemailserverdisparagingthecompanyanditsservices.TheCEO 
begantoreceivestrangeandthreateningemailmessages,someclaiming 
tobefromacremationsociety.Threateningemails,phonecalls,andforum 
postingscontinueduntillawenforcementwasabletoidentifythesource 
ofthethreateningmessages:acomputerassociatedwiththeformerCTO’s 
newemployer.
Thiscasehighlightsanimportantissueforyoutoconsider:Whohasthe 
accessandcredentialstomodifyyourvoice-mailsystem?Thisisnotan 
accesspathoneordinarilythinksofintheemployeeterminationpro-
cess,butonethatcouldcauseyousevereembarrassmentifmodifiedasin 
thiscase!
Agovernmentorganizationnotifiedoneofitscontractprogrammersthat 
hisaccesstoasystemunderdevelopmentwasbeingeliminatedandthat 
hisfurtherresponsibilitieswouldbelimitedtotestingactivities.Afterhis 
protestsweredenied,theprogrammerquithisjob.Then,threetimesover 
atwo-weekperiod,heusedabackdoorintothesystemwithadministra-
torprivilege(whichhepresumablyinstalledbeforeleaving)todownload 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
202
sourcecodeandpasswordfilesfromthedevelopmentalsystem.The 
unusuallylarge sizeoftheremote downloadsraisedred flagsintheorga-
nization,whichresultedinaninvestigationthattracedthedownloadsto 
hisresidenceandledtohisarrest,prosecution,andimprisonment.
Thiscasedemonstratesthevalueofvigilantmonitoringofremote
accesslogsandreactiontosuspiciousbehaviorinlimitingdamageto 
your  interests.
ptg7481383
Practice14:DeactivateComputerAccessFollowingTermination 203
Practice 14: Deactivate Computer Access Following
Termination
Itisimportanttofollowrigorousproceduresthatdisableallaccesspaths 
intoyournetworksandsystemsforterminatedemployees.
What Can You Do?
Whileemployed,insidershavelegitimate,authorizedaccesstoyour
network,system,applications,anddata.Onceemploymentisterminated,
itisimportantthatyouhaveinplaceandexecuterigorousterminationpro-
ceduresthatdisableallaccesspointsavailabletotheterminatedemployee.
Otherwise,yournetworkisvulnerabletoaccessbyanow-illegitimate,unau-
thorizeduser.Someorganizationschoosetopermitcontinuedaccessby
formeremployeesforsometimeperiodunderfavorableterminationcircum-
stances;itisimportantthatthoseorganizationshaveaformalpolicyinplace
forthesecircumstancesandcarefullyconsiderthepotentialconsequences.In
addition,itisimportanttomanagetheaccessofemployeeswhochangetheir
statuswithyourorganization(e.g.,changefromanemployeetoacontractor;
changefromafull-timetoapart-timeemployee;ortakealeaveofabsence).
Ifformalterminationpoliciesandproceduresarenotinplace,the 
terminationprocesstendstobeadhoc,posingsignificantriskthatoneor 
moreaccesspathswillbeoverlooked.Ourresearchshowsthatinsiderscan 
bequiteresourcefulinexploitingobscureaccessmechanismsneglectedin 
theterminationprocess.Ifaformalprocessexists,itmustbeconsistentlyfol-
lowed.Itisalsocriticalthatyouremainalerttonewinsiderthreatresearch
andperiodically reviewandupdatetheseprocesses.Ifatthetimeoftermi-
nationyouhavenotbeendiligentlyfollowingstrictaccount-management 
practices,itmaybetoolatetoperformanaccountauditfortheterminat-
ingemployee.Abackdooraccountcouldhavebeencreatedmonthsbefore, 
andverificationofthelegitimacyofallaccountsofalltypes—systemlogin 
accounts,VPNaccounts,databaseorapplicationaccounts,emailaccounts, 
andsoon—canbeaverytime-consumingprocess,dependingonthesize 
ofyourorganization.Whenanemployeeleaves,youshouldbeabletocon-
fidentlysayallaccesspathsavailabletothatemployeehavebeendisabled.
Someaspectsoftheterminationprocessarequiteobvious,suchasdisabling 
theterminatedemployee’scomputeraccount.However,organizations 
thathavebeenvictimsofinsiderattackswereoftenvulnerablebecauseof 
poor,nonexistent,ornoncomprehensiveaccount-managementprocedures. 
Manyemployeeshaveaccesstomultipleaccounts;allaccountcreations 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
204
shouldbetrackedandperiodicallyreviewedtoensurethatallaccesscan 
bequicklydisabledwhenanemployeeisterminated.
Accountssometimesoverlookedintheterminationprocessareshared 
accounts,suchassystemadministratoraccounts,DBAaccounts,andtest-
ing,training,development,andexternalorganizationalaccounts,such 
asvendororcustomeraccounts.Inaddition,someapplicationsrequire
administrativeaccountsthatarefrequentlysharedamongmultipleusers. 
Itisimportantthatyoumeticulouslymaintainarecordofeveryshared 
accountandeveryuserauthorizedtohavethepasswordtoeach,and 
changethepasswordsforthoseaccountswhenemployeesareterminated.
Remoteaccessisfrequentlyexploitedbyformerinsiders.Remoteaccess 
orVPNaccountsmustbedisabled,aswellasfirewallaccess,inorderto 
preventfutureremoteaccessbytheterminatedemployee.Inaddition,any 
remoteconnectionsalreadyopenbythatemployeeatthetimeoftermina-
tionmustbeclosedimmediately.
Ifanemployeeisterminatedunderadversecircumstances,youmightcon-
siderreviewingtheemployee’sdesktopcomputer,laptop,andsystemlogs 
toensurenosoftwareorapplicationshavebeeninstalledthatmaypermit 
theemployeebackintoyoursystems.Inonecase,aterminatedemployee 
leftsoftwareonhisdesktopthatallowedhimtoaccessit,controlitremotely,
anduseittoattackhisnextemployer.Inaddition,afewinsiderswhostole 
intellectualpropertyimmediatelybeforeleavingtheorganizationwere 
caughtwhentheirdesktopcomputeractivitylogswereanalyzed.
Insummary,alayereddefensethataccountsforallaccessmethodsshould 
beimplemented.Remoteaccessshouldbedisabled,butifanobscure 
remoteaccessmethodisoverlooked,thenextlayerofdefenseisaccounts. 
Allaccountsshouldbedisabledforusebytheformeremployeesothateven 
ifremoteaccessisestablished,theinsiderispreventedfromproceedingfur-
ther.Therefore,itisimportantthatintranetaccounts,  application-specific 
accounts,andallotheraccountsforwhichtheuserwasauthorizedbe 
disabledorthepasswordschanged.Also,keepinmindthatifthetermi-
natedinsiderwasresponsibleforestablishingaccountsforothers,suchas 
employees,customers,orexternalWebsiteusers,thoseaccountscouldalso 
beaccessibletotheterminatedinsider.
Finally,terminationproceduresmustincludestepstopreventphysical 
access.Insidershaveexploitedphysicalaccesstogainaccesstotheirfor-
meremployer’ssystems.Carefulattentionshouldbepaidtodisableaccess 
bycollectingkeys,badges,andparkingpermits,anddisablingaccessto 
facilitiesincard-controlsystems.Whenemployeesarefired,itisimportant 
ptg7481383
Practice14:DeactivateComputerAccessFollowingTermination 205
thatotheremployeesareawarethatthepersonwasterminated.Multiple 
insiderattackswerefacilitatedwhenterminatedemployeeswereableto 
obtainphysicalaccesstotheorganizationbypiggybackingthroughdoors, 
usingtheexcusethattheyforgottheirbadge.
Case Studies: What Could Happen if I Don’t Do It?
Asoftwareengineeratahigh-technologycompanythatdevelopedand 
manufacturedcomputerchipswasterminatedduetopoorperformance. 
Hewasresponsibleformanaginganautomatedmanufacturingsystem, 
andduringtheworkweekhemaintainedaconstantremoteaccesscon-
nectionfromhishometothecompany’snetwork.Priortoinforminghim 
ofhistermination,thecompanyterminatedhisnetworkaccess,butfailed 
todetecthisremoteaccessconnectionthatwasactivefromhome.Theday 
afterhistermination,outsideofworkhoursandundertheinfluenceof 
alcohol,heusedtheopenremoteaccessconnectiontocompletelyshut 
downthecompany’smanufacturingsystembydeletingcriticalfiles.Due 
tohisactions,thecompanylostfourhoursofmanufacturingtimeandhad 
toloadbackupdatatorestartthemanufacturingprocess.Theincidentcost 
thecompany$20,000toremedy.Connectionandactivitylogsconnected 
theinsidertotheincident.Hewasarrestedandconvicted,butsentencing 
detailswereunavailable.
Thiscasepointsoutoneeasystepthatyoushouldaddtoyouremployee 
terminationprocess,ifit’snotintherealready:Checkforanyactiveremote
connectionsbytheemployee.
Afinancialorganization’ssystemadministratorwasterminatedsud-
denlywithnoadvancednoticethathisemployerwasdissatisfiedwith
hiswork.Thatnighthesuspectedthathisreplacement,whohefeltwas
technicallyinferior,hadnotdisabledhisaccess.Heattemptedtoaccess
thesystemfromhomeandfoundthathewasright—hisreplacement
hadfailedtodisablehisaccessthroughthecompanyfirewall.Inaddi-
tion,althoughhisaccounthadbeendisabled,shehadfailedtochange
thepasswordofthesystemadministratoraccount.Theinsiderusedthat
accounttoshutdownthecompany’sprimaryserver,onethathadbeen
havingproblemsandhadinfactcrashedthepreviousweekend(and
hadtakentheorganizationanentireweekendtobringupagain).Ittook
thefinancialinstitutionthreedaystobringtheserverbackintoservice;
duringthattimenoneofits  customerswereabletoaccessanyoftheir
accountsinanyway.
Thiscaseillustratesthenecessityofthoroughlydisablingaccess,aswellas 
theconsequenceswhenyouhavenocompetentbackupforasinglesystem 
administrator.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
206
Asystemadministratorloggedinonemorningandwasnotifiedbyher 
custom-writtenloginsoftwarethatherlastloginwasonehourearlier. 
Thissetoffimmediatealarms,asshehadinfactnotloggedinforsev-
eraldays.Shehadpreviouslytakenstepstoredirectloggingofactions 
byheraccounttoauniquefileratherthanthestandardshellhistoryfile. 
Therefore,shewasabletotracetheintruder’sstepsandsawthathehad 
readanotheremployee’semailusingheraccount,andthendeletedthe 
standardhistoryfileforheraccountsothattherewouldbenologofhis 
actions.Theloginwastracedtoacomputeratasubsidiaryofthecom-
pany.Furtherinvestigationshowedthatthesamecomputerhadlogged 
intothecompany’ssystemperiodicallyforthepastmonth,andthatafor-
meremployeehadaccessedupto16ofhisformeremployer’ssystemson 
adailybasisduringworkhours.Theinsiderhaddonethefollowing:
Gainedaccesstoatleast24useraccounts
Reademail
Reviewedsourcecodeforhispreviousproject
Deletedtwosoftwaremodificationnoticesfortheproject
Theformeremployeehadbeenterminatedfornonperformanceandthen 
wenttoworkforthesubsidiary.
Thiscaseillustratestheimportanceofterminatingaccesscompletelyfor 
formeremployees,carefulmonitoringforpost-terminationaccess,and 
payingparticularattentiontoterminatedtechnicalemployees.
ptg7481383
Practice15:ImplementSecureBackupandRecoveryProcesses 207
Practice 15: Implement Secure Backup and Recovery
Processes
Despitealloftheprecautionsyoutake,itisstillpossiblethataninsiderwill 
successfullyattack.Therefore,itisimportantthatyouprepareforthatpos-
sibilityandenhanceyourresiliencybyimplementingsecurebackupand 
recoveryprocessesthataretestedperiodically.
What Can You Do?
Preventionofinsiderattacksisthefirstlineofdefense.However,  experience 
hastaughtusthattherewillalwaysbeavenuesfordeterminedinsid-
erstosuccessfullycompromiseasystem.Effectivebackupand  recovery
processesneedtobeinplaceandoperationalsothatifcompromisesdo 
occurbusinessoperationscanbesustainedwithminimalinterruption. 
Ourresearchhasshownthateffectivebackupandrecoverymechanisms 
affectedtheoutcomesinactualcases,andcanmeanthedifferencebetween
Severalhoursofdowntimetorestoresystemsfrombackups
Weeksofmanualdataentrywhencurrentbackupsarenotavailable
Monthsoryearstoreconstructinformationforwhichnobackupcopies 
existed
Backupandrecoverystrategiesshouldconsiderthefollowing:
Controlledaccesstothefacilitywherethebackupsarestored
Controlledaccesstothephysicalmedia(e.g.,nooneindividualshould 
haveaccesstobothonlinedataandthephysicalbackupmedia)
Separationofdutiesandthetwo-personrulewhenchangesaremade 
tothebackupprocess
Inaddition,accountabilityandfulldisclosureshouldbelegallyand 
contractuallyrequiredofanythird-partyvendorsresponsibleforprovid-
ingbackupservices,includingoff-sitestorageofbackupmedia.Itshould 
beclearlystatedinservicelevelagreementstherequiredrecoveryperiod, 
whohasaccesstophysicalmediawhileitisbeingtransportedoff-site,as 
wellaswhohasaccesstothemediainstorage.Furthermore,caseexamples 
throughoutthisbookhavedemonstratedthethreatpresentedbyemploy-
eesoftrustedpartners;themitigationstrategiespresentedforthosethreats 
shouldalsobeappliedtobackupserviceproviders.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
208
Whenpossible,multiplecopiesofbackupsshouldexist,with  redundant
copiesstoredoff-siteinasecurefacility.Differentpeopleshouldbe 
responsibleforthesafekeepingofeachcopysothatitwouldrequirethe 
cooperationofmultipleindividualstofullycompromisethemeansto 
recovery.Anadditionallevelofprotectionforthebackupscaninclude 
encryption,particularlywhentheredundantcopiesaremanagedbya 
third-partyvendorattheoff-sitesecurefacility.Encryptionprovidesan 
additionallevelofprotection,butitdoescomewithadditionalrisk.The 
two-personruleshouldalwaysbefollowedwhenmanagingtheencryp-
tionkeyssothatyouarealwaysincontrolofthedecryptionprocessinthe 
eventtheemployeesresponsibleforbackingupyourinformationleave 
yourorganization.
Youshouldensurethatthephysicalmediaonwhichbackupsarestoredare 
alsoprotectedfrominsidercorruptionordestruction.Insidercasesinour 
researchhaveinvolvedattackerswhodidthefollowing:
Deletedbackups
Stolebackupmedia(includingoff-sitebackupsinonecase)
Performedactionsthatcouldnotbeundoneduetofaultybackupsys-
tems
Somesystemadministratorsneglectedtoperformbackupsinthefirstplace, 
whileotherssabotagedestablishedbackupmechanisms.Suchactionscan 
amplifythenegativeimpactofanattackonanorganizationbyeliminating 
theonlymeansofrecovery.Toguardagainstinsiderattack,youshould
Performandperiodicallytestbackups
Protectmediaandcontentfrommodification,theft,ordestruction
Applyseparationofdutiesandconfiguration-managementprocedures 
tobackupsystemsjustasyoudoforothersystemmodifications
Applythetwo-personruleforprotectingthebackupprocessand 
physicalmediasothatonepersoncannottakeactionwithoutthe 
knowledgeandapprovalofanotheremployee
Makesureyouaccountforpocketsofdevelopmentsystems,orproduction 
systemsthataremaintainedindependentlyinsteadofbeingmanagedas 
partofyourITenterprise.Thesesystemscanbejustascriticaltoyouas 
yourenterprisesystemsare,andtheyarenotnecessarilymanagedusing 
thesamerigorasyourcentrallymaintainedITsystems.
ptg7481383
Practice15:ImplementSecureBackupandRecoveryProcesses 209
Unfortunately,someattacksagainstnetworkscouldinterferewith  common 
methodsofcommunication,therebyincreasinguncertaintyand  disruption 
inorganizationalactivities,includingrecoveryfromtheattack.Thisis 
especiallytrueofinsiderattacks,sinceinsidersarequitefamiliarwithyour 
communicationmethodsand,duringanattack,mayinterferewithcom-
municationsessentialtoyourdata-recoveryprocess.Youcanmitigatethis 
effectbymaintainingtrustedcommunicationpathsoutsideofthenetwork 
withsufficientcapacitytoensurecriticaloperationsintheeventofanet-
workoutage.Thiskindofprotectionwouldhavetwobenefits:Thecostof 
strikesagainstthenetworkwouldbemitigated,andinsiderswouldbeless 
likelytostrikeagainstconnectivitybecauseofthereducedimpact.
Case Studies: What Could Happen if I Don’t Do It?
Anorganizationwasresponsibleforrunningthe911phone-number-to-
addresslookupsystemforemergencyservices.Aninsiderdeletedtheentire
databaseandsoftwarefromthreeserversintheorganization’snetwork
operationscenter(NOC)bygainingphysicalaccessusingacontractor’s
badge.TheNOC,whichwasleftunattended,wassolelyprotectedvia
physicalsecurity;allmachinesintheroomwereleftloggedinwithsystem
administratoraccess.AlthoughtheNOCsystemadministratorswereimme-
diatelynotifiedofthesystemfailureviaanautomaticpagingsystem,there
werenoautomatedfailovermechanisms.Theorganization’srecoveryplan
reliedsolelyonbackuptapes,whichwerealsostoredintheNOC.Unfor-
tunately,theinsider,realizingthatthesystemscouldbeeasilyrecovered,
tookallofthebackuptapeswithhimwhenheleftthefacility.Inaddition,
thesamecontractor’sbadgewasauthorizedforaccesstotheoff-sitebackup
storagefacility,fromwhichhenextstolemorethan50off-sitebackuptapes.
Thiscaseillustratestheriskofstoringyourbackupsinthesamephysical 
locationasyourcriticalsystems.Inaddition,therewasnolayereddefense 
toprotectthebackups—theywereaccessiblebyanyonewhohadphysi-
calaccesstotheNOC.Asaresult,thisverycriticalsystemanditsbackups 
weretotallyvulnerabletoaninsiderITsabotageattack.
Aninsiderwasterminatedbecauseofhisemployer’sreorganization.The 
companyfollowedproperprocedurebyescortinghimtohisofficetocol-
lecthisbelongingsandthenoutofthebuilding.TheITstaffalsofollowed 
thecompany’ssecuritypolicybydisablingtheinsider’sremoteaccess 
andchangingpasswords.However,theyoverlookedonepasswordthat 
wasknowntothreepeopleintheorganization.Theterminatedinsider 
usedthataccounttogainaccesstothesystemthenightofhistermination 
andtodeletetheprogramshehadcreatedwhileworkingthere.Someof 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
210
theseprogramssupportedthecompany’scriticalapplications.  Restoration 
ofthedeletedfilesfrombackupfailed.Althoughtheinsiderhadbeen 
responsibleforbackups,companypersonnelbelievethatthebackups 
werenotmaliciouslycorrupted.Thebackupshadsimplynotbeentested 
toensurethattheywereproperlyrecordingthecriticaldata.Asaresult,
theorganization’soperationsinNorthandSouthAmericawereshut 
downfortwodays,resultinginmorethan$80,000inlosses.
Thiscaseillustratesthedelaythatcanbecausedinrecoveryfollowingan 
insiderattackifbackupsarenottestedperiodically.
ptg7481383
Practice16:DevelopanInsiderIncidentResponsePlan 211
Practice 16: Develop an Insider Incident Response Plan
Proceduresforinvestigatinganddealingwithmaliciousinsiderspresent 
uniquechallenges;responsemustbeplanned,clearlydocumented,and 
agreedtobyyourmanagersandattorneys.
What Can You Do?
Anincidentresponseplanforinsiderincidentsdiffersfromaresponse
planforincidentscausedbyanexternalattacker.Youneedtominimize 
thechancesthattheinternalperpetratorisassignedtotheresponseteam 
orisawareofitsprogress.Thisischallengingsincethetechnicalpeople 
assignedtotheresponseteammaybeamongtheemployeeswiththemost 
knowledgeandabilitytousetheirtechnicalskillsagainsttheorganization. 
Anotherchallengeofinsiderincidentresponseisthehesitationorresis-
tancethatmanagersmayhavetoparticipatinginaninvestigation.This 
hesitationcouldhaveseveralcauses:Itcoulddiverttheteam’sresources
frommission-criticalactivities,exposeateammembertoinvestigation, 
orexposeshortcomingsbymanagementoroversightsinsystemsecurity, 
openingthemanagersuptoembarrassmentorliabilityforlosses.
Youneedtodevelopaninsiderincidentresponseplanwiththerightsof 
everyoneinvolvedinmind.Specificactionstocontroldamagebymalicious 
insidersshouldbeidentified,togetherwiththecircumstancesunderwhich 
thoseeffortsareappropriate.Theplanshoulddescribethegeneralpro-
cesstobefollowedandtheresponsibilitiesofthemembersoftheresponse
team.Amediatorforcommunicationbetweenthedepartmentsofyour 
organizationneedstobeassignedthatistrustedbyalldepartmentheads. 
Yourdepartmentheadsneedtounderstandtheplanandwhatinformation 
canandcannotbesharedintheinvestigationoftheincident.
Thedetailsoftheinsiderincidentresponseplanprobablywouldnotbe
sharedwithallofyouremployees.Onlythoseresponsibleforcarryingoutthe
planneedtounderstanditandbetrainedonitscontentandexecution.Your
employeesmayknowofitsexistenceandshouldbetrainedonhowto(anon-
ymously)reportsuspiciousbehavior,aswellasspecifictypesofsuspicious
behaviorsthatshouldbereported.Yourmanagersneedtounderstandhow
tohandlepersonalandprofessionalproblemsandwhentheymightindicate
increasedriskofinsidercompromise.Ifyourorganizationexperiencesdam-
ageduetoamaliciousinsiderorasyourrisksevolve—forinstance,dueto
newinternalorexternalattackvectors—youremployeetrainingshouldbe
updated.Lessonslearnedfrominsider  incidentsshouldbefedbackintoyour
insiderincidentresponseplantoensureitscontinualimprovement.
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
212
Case Studies: What Could Happen if I Don’t Do It?
TheITmanagerinalotteryagencyturnedlosinglotteryticketsinto 
winnerstostealnearly$63,000overayearandahalf.Tocarryoutthe 
scam,hepurchasedaticketasusual,andthenmodifiedittobeawinner 
inthelotteryagency’sdatabase.Whentheagencydiscoveredthefraud-
ulenttickets,itstartedaninvestigation.Fortunately,theinsiderwason 
vacationorhewouldhavebeenchosentoinvestigatetheincident.Upon 
hisreturn,whenconfrontedwiththefraudulenttickets,hebehavedsus-
piciously,andthereforewasputonadministrativeleaveandhisphysical 
accesswasdisabled.Managementneglectedtoinformhissubordinates 
oftheaction,sohestillhadmanagerialcontrolofhispersonnel.Beforehe 
leftonadministrativeleave,hedeletedahistorylogthatmayhaveproven 
hiscriminalacts.Healsoinstructedoneofhissubordinatestoerasefour 
weeksofbackuptapes,claimingthattheywouldn’tbeusefulunderanew 
backupdataformatthatwasbeingimplemented.Shecompliedwiththis 
request,andtheorganizationlostmuchoftheevidenceofhistampering 
withsystemsecuritycontrols.Oncehisallegedcrimedidcometolight,he 
askedadifferentsubordinatetoretrievesomeadditionalbackuptapesfor 
himthatwouldhelphimprovehisinnocence.Hecomplied,andtheorga-
nizationneverrecoveredthosetapes.
Whiletheorganizationtooktherightactionstoremovethesuspectfrom 
theorganization,itneglectedtoinformhissubordinatesoftheaction,so 
hestillhadmanagerialcontroloforganizationpersonnel.Iftheorganiza-
tionhadaformalinsiderincidentresponseplaninplace,anditsemployees 
wereeducatedontheirresponsibilitiesforrespondingtotheinsider’s 
requests,theorganizationmayhavebeenbetterabletorespondtothe 
insider’sfraud.
Anassemblyinspectoratamanufacturingplantcomplainedto 
managementaboutthelackofsupportgiventoinspectorstodotheirjob, 
sayingthatinspectorsarepressuredtoapproveworkregardlessofquality. 
Despitethefactthatanindependentevaluatordeterminedthathisclaims 
wereunfoundedhethreatenedtosuethecompanyandofferedhissilence 
foracashsettlement.Thisextortionattemptwasdeclinedbythecompany 
andnofurtheractionwastakenuntilyearslaterwhennewspaperarticles 
beganappearingthatdivulgedsomeofthecompany’sproprietaryinfor-
mation.Afterreceivingananonymoustipthattheinsiderwasresponsible
fortheleaks,thecompanystartedaninvestigation.Workingwithlaw 
enforcement,theorganizationfoundevidencethathehadbeendown-
loadingtheorganization’sconfidentialinformation,whichwasoutside 
hisareaofresponsibility,formorethantwoyears.Hehaddownloaded 
massiveamountsofinformationusingaUSBdriveandstoreditathis 
residence.Theinvestigationalsofoundevidenceoftheinsider’semail 
ptg7481383
Summary 213
correspondencewithreportersdiscussingtheproprietarydocuments, 
articles,andmeetings.
Whilehindsightis20/20,iftheorganizationhadexecutedanincident 
responseplanatthetimeoftheattemptedextortion,itmayhaveprevented 
theinsider’sfollow-onactionsandhavebeenabletopreventtheflowofits 
confidentialinformationtothemedia.
Summary
Thebestpracticespresentedinthischapterprovideaframeworkfor 
establishinganinsiderthreatprograminyourorganization.Startbyinclud-
inginsiderthreatsinyourenterprise-wideriskassessment.Next,conduct 
asecurityawarenesscampaigntoensurethatinsiderthreatisunderstood 
acrossyourorganizationsothatresponsibilityfortheidentificationofand 
responsetoinsiderswhoposeanelevatedriskcanbedistributedenter-
prise-wide.Developclearlydefinedpolicies,asdescribedthroughoutthis 
chapter,andenforcethemconsistentlyandfairly.Managementneedsto 
understandhowtorecognizeandrespondtoconcerningbehaviorinthe 
workplace,andneedstounderstandthepotentialramificationsofnegative 
workplaceevents.Awell-definedemployeeterminationprocessisessen-
tialinpreventingattacksfollowingtermination.Youneedtosecureboth 
thephysicalandelectronicenvironment,includingaccountandpassword 
management,separationofduties,controlsforyoursoftwaredevelopment 
process,changecontrols,andextravigilanceforsystemadministrators, 
otherprivilegedusers,andremoteaccess.
Youneedtoapplyaconsistentmonitoringstrategyforonlineactions;your 
employeemonitoringpracticesshouldbedevelopedinconjunctionwith 
yourlegalcounseltoensurethattheyarecompliantwithemployeeprivacy 
laws.Ifmonitoringidentifiessuspiciousactivity,awell-definedresponse
planshouldbeenactedtominimizetheimpacttoyourorganization.
Despitealloftheprecautionsyouimplement,itisstillpossiblethatan 
insiderwillsuccessfullyattack.Therefore,itisimportantthatyourlast 
stepinpreparingforaninsiderthreatistoprepareforthatpossibilityand 
enhanceyourorganizationalresiliencybyimplementingsecurebackup 
andrecoveryprocessesthataretestedperiodically.
Remember:Itisveryimportantnottooverlookcontractorsandtrusted 
businesspartnersthathaveaccesstoyourinformationsystems, 
ptg7481383
Chapter6. BestPracticesforPreventionandDetectionofInsiderThreats
214
information,ornetworks.Muchofwhatyoureadinthischapterapplies 
equallywelltothosetypesofinsiderthreats!
Thischapterpresentedaframeworkthatyoucanuseacrossyour
organization.The“CommonSenseGuide”(referencedatthebeginningof
thischapter)hasbeenoneofthemostpopulardocumentswehavecreated,so
westandbehinditsusefulnessandstronglyencourageyoutomeasureyour
organization’spracticesagainstittoidentifygapsthatshouldbeaddressed.
Whenwewerewritingthisbook,theNationalInstituteofStandardsand 
Technology(NIST)wasworkingonthenextversionofSpecial Publication
800-53: Recommended Security Controls for Federal Information Systems and
Organizations.9Thespecialpublicationisaimedatprovidingfederalagen-
cies,stateandlocalgovernments,andprivate-sectororganizationsasetof 
securityandprivacycontrolstosafeguardtheircriticalassets.Thisnew 
versionwillincludenewguidanceintheformofcontrolstoaddresspri-
vacy,mobility,cloudcomputing,industrialcontrols,applicationsecurity, 
Webapplications,andinsiderthreats.TheCERTInsiderThreatCentercon-
tributedinputoninsiderthreatcontrolstotheJointTaskForce,agroup 
ofcivilian-,defense-,andintelligence-agencyinformationsecurityexperts 
workingtoproduceaunified,federalITsecurityframework.Pleaserefer
tothatpublication10formoreinformationonspecificcontrols.
References/Sources of Best Practices
Thischapterdescribed16practices,basedonexistingindustry-accepted 
bestpractices,providingyouwithdefensivemeasuresthatcouldprevent 
orfacilitateearlydetectionofmanyoftheinsiderincidentsotherorgani-
zationsexperiencedinthehundredsofcasesintheCERTinsiderthreat 
database.Ifyouwouldlikemoredetailonimplementinganyofthe 
practiceswedescribed,youshouldconsultthefollowingresources:
CERTRMM(www.cert.org/resilience/)
ISO27002(www.27000.org/iso-27002.htm)
NIST800-53(http://csrc.nist.gov/publications/PubsSPs.html)
SANSTop20SecurityControls(www.sans.org/critical-security-
controls/)
9.  http://csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final.pdf
10.  NIST800-53:http://csrc.nist.gov/publications/PubsSPs.html
ptg7481383
215
Chapter  7
TechnicalInsider 
ThreatControls
Chapter6,BestPracticesforthePreventionandDetectionofInsider 
Threats,coveredthebroaderrangeofinsiderthreatcontrols,including 
bothadministrativeandtechnicalcontrols.Thischapterwillbeofinterest 
tothemoretechnicalreadersamongyou,asitcontainssuggestionsfornew 
technicalcontrolsyoucanimplementtopreventanddetectinsiderthreats. 
Thesecontrolsaretheoutputoftheinsiderthreatlab.First,wedescribe 
thelabatahighlevel,thenweexplainhowwedevelopedthesecontrols, 
andthenwedescribeeachcontrol.Notethatthecontrolsbecomeincreas-
inglysophisticatedasyouprogressthroughthechapter,sincewepresent 
themintheordertheyweredeveloped.Theyprogressfromstraightfor-
wardcontrolsthatmanyorganizationsdonotseemtoimplement,toactual 
signaturesthatyoucanimportintoexistingtoolsinyourorganization.
Sinceweanticipatetechnicalexpertsreadingthischapter,youmightcare 
aboutthedetailsbehindthelab.However,ifyoudon’tcareaboutthelabor 
howwecreatedthecontrolsyoucanskiprighttothediscussionofcontrols 
laterinthechapter.
Wedonotincludedefinitionsoftechnicalterminologyinthischapter,since 
therewouldbefartoomanydefinitions!Weassumethatifyouarereading
thischapteryouaretechnicalenoughtounderstanditwithoutthatlevelof 
assistance.
ptg7481383
Chapter7. TechnicalInsiderThreatControls
216
Also,allofthesignatures,rules,andqueriescontainedinthischapterare 
alsoavailableonourWebsite:www.cert.org/insider_threat.Pleasegoto 
theWebsitesothatyoucancopyandpasteorimportthemdirectlyinto 
yourtools.Inaddition,wewillcontinuetoreleaseimprovementsfor 
thesecontrolsasmoreorganizationsimplementthem,andaswereceive
feedbackfrompractitionersonhowtomakethemevenmoreusefulin 
anoperationalenvironment.Thesecontrolshavebeenpresentedatlarge 
conferencessuchasRSAandhavereceivedverypositivefeedback,but 
werealizethattheywillneedtobetailoredandoptimizeddependingon 
eachorganization’sspecificrequirements.Therefore,thesecontrolsarenot 
intendedtobeimplementedblindly,butrathershouldbeusedasageneral 
templatethatyoucancustomizeforyourownuse.
Theinsiderthreatlabisthenewestadditiontoourbodyofworkoninsider 
threat.1In2008wedecidedthatafterstudyingtheinsiderthreatproblem 
forsevenyearsitwastimetoshiftourfocustosolutions.Wefeltthatwe 
understoodinsiderthreataswellasanyonecould:whodoesit,how,when, 
why,where,andsoon.Wealsohadaddedtechnicalsecurityexpertstoour 
teamatthattimewhohadtheabilityandvisiontoembarkoninnovative 
newworkforus.Therefore,in2009westartedtheCERTinsiderthreatlab.
Integratingtheinsiderthreatlabintoourresearchhasresultedin 
tremendousadvancesinhelpingthecommunitytobetterunderstand 
insiderthreat.Thelabhasavarietyofpurposes,includingthefollowing:
Performinglivetestingofcommercialandopensourcetoolsandtool 
configurationsthataimtocombatinsiderthreatsagainstre-creationsof 
actualinsidereventsfromtheCERTdatabase
Developingnewinsiderthreatcontrolsusingexistingtechnology
1.  Materialfromthischapterincludesportionsfrompreviouslypublishedworks.Specifically,Michael 
Hanley,TylerDean,WillSchroeder,MattHouy,RandyTrzeciak,andJojiMontelibanopublishedinfor-
mationaboutthelabin“AnAnalysisofTechnicalObservationsinInsiderTheftofIntellectualProperty 
Cases”[Hanley2011b].JojiMontelibanoalsopublishedinformationaboutControl3in“InsiderThreat 
Control:UsingaSIEMSignaturetoDetectPotentialPrecursorstoITSabotage”[Montelibano2011]. 
Finally,MichaelHanleypublishedinformationaboutControl4in“CandidateTechnicalControlsand 
IndicatorsofInsiderAttackfromSocio-TechnicalModelsandData,”intheProceedingsofthe2010 
NSACenterofAcademicExcellence(CAE)WorkshoponInsiderThreat,andinalaterrefinementof 
thatcontrol[Hanley2010,Hanley2011a].
These controls are not intended to be implemented blindly, but rather
should be used as a general template that you can customize for your
own use.
ptg7481383
InfrastructureoftheLab 217
Creatingdemonstrationalvideosforconferencesandworkshopsthat 
illustratethosenewcontrols
Developingonlineexercisestogivecyberdefendershands-on 
experiencetobetterpreparethemforinsiderthreatswithintheir 
organizations
Overtheyears,ourongoinganalysisofinsidercasesyieldedbest  practices, 
modelsofinsiderbehavior,trainingmaterials,andotherusefulresults.
Theinsiderthreatlabenablesustoputthisbodyofknowledgeinto 
practice,testingourresultsinarealisticenvironment.Wecandetermine 
theeffectivenessofvariouscontrolsandtoolsagainstthethreatofmali-
ciousinsidersandarenowinabetterpositiontomakeconcrete,technical 
recommendationsforpreventionandmitigation.
Ourlabteamcontinuallyreviewstheever-changingcommercialandopen 
sourcetoolspacetoensurethatweunderstandtheavailabletechnology, 
andleveragesourcasestudiesofrealincidentstodrawconclusionsabout 
gapareasthatexistintheindustry.Wealsofactorinknowledgegained 
byourinsiderthreatassessmentteamsandworkshopinstructorsregard-
ingfeedbackfrompractitionersonwhat’sworkingandnotworkingfor 
them.Whenwediscoveranewcontrolthatsomeoneinthecommunityis 
usingsuccessfully,wetransitionthatviaourblog,workshops,conference 
presentations,andreports.Wethenfocusourworkinthelabongapareas 
forwhichwehavenotfoundaprovensolution.
Inthischapterwebrieflydescribetheinfrastructureofthelab,andthe 
processweuseincreatingdemonstrationalvideos,newcontrols,andexer-
cises.Next,wedescribethesolutionswehavedevelopedsofarinthelab. 
Notethatdemonstrationalvideos,signatures,andrulesareavailableon 
ourWebsite,andwewillcontinuetoaddnewonesevenafterpublication 
ofthisbook.KeepcheckingourWebsiteperiodicallytoensurethatyouare 
pickingupthelatestreleasesfromtheCERTinsiderthreatlab!
Infrastructure of the Lab
Thelabconsistsoftwovirtualenvironmentsthatarecapableofsimulating 
verydetailednetworkarchitecturesandsystemconfigurations,running
fromthenetworkperimetertotheend-userworkstation.Weuseonevir-
tualenvironmenttotestmicro-scalescenarios,andanotherlarger-scale 
platformtosimulatethebehaviorofa“real”network.Inotherwords,the 
“micro-lab”providesuswithasmallnetworkoffewerthantenservers, 
ptg7481383
Chapter7. TechnicalInsiderThreatControls
218
workstations,andusersinordertostageourscenario.The“macro-lab”can 
replicateanetworktopologyofseveralhundredserversandworkstations, 
andwehaveactuallyusedthislabenvironmenttosimulatethebehaviorof 
upto5,000users.
Themicro-labconsistsofafewphysicalsystemsrunningvariousvirtual 
machinestosimulatecompletenetworks.Thisflexibilityprovidesaquick 
waytoreconstructinsiderattacksandrespectivedefensemechanisms. 
Itenablesustodeterminetheeffectivenessofvariouscontrolsandtools 
againstthethreatofmaliciousinsidersandtotestourproposednewcoun-
termeasuresinarealisticenvironment.Asaresult,wecannowprovide 
concrete,technicalrecommendationsforpreventionandmitigationof 
insiderthreats.Wecreaterealisticenvironmentstostudyinsiderattacks 
andtoevaluatecandidatedefensemechanisms.Additionally,thelaballows 
ustorapidlyprototypesmalltomedium-sizednetworksatminimalcost 
andallowsustointegratephysicaldevicesintothesimulated  topology.
Thelargermacro-labusestheXNET2environment.XNETisa 
next-generationcybersecuritytrainingandsimulationplatform.Itsinfra-
structureconsistsofseveralserver-graderack-mountedserverscapable 
ofseamlesslyrunningsimultaneousinstancesofvirtualmachines.The 
majordifferencebetweenthemicro-andmacro-labsisscale.Wealso 
deploycontrolsinthemicro-labpriortotestingitintheXNETenviron-
ment.Thereasonforthisapproachisthatwetrytofocusontheattackand 
defensemechanismswhentestinginthemicro-lab.Onceweconfirmthat 
ourdefensestrategyissound,wethendeploythescenarioinXNET,tosee 
howourdefensivemechanismsbehaveinatypicalnetwork,withalarge 
amountoftrafficor“noise.”Onlywhenacontrolpassesbothofthesetests 
dowereleaseitforpilottestinginproductionenvironments.
Demonstrational Videos
Sincethelabwascreated,wehavedevelopedaseriesofdemonstrational 
videosthatdepictscenariostakenfromrealcasesintheCERTdatabase. 
Eachvideodescribesaninsiderthreatcaseandshowshowoneormore 
opensourcetoolscouldbeusedtodetectsuchanincidentandidentifythe 
individualresponsibleshouldithappeninyourenvironment.Wepresent 
thesevideosinourinsiderthreatworkshops.Wehavealsopresentedthem 
2.  XNETCERTExerciseNetwork:http://xnet.cert.org
ptg7481383
High-PriorityMitigationStrategies 219
atvariousconferences,includingtheRSAConference,theU.S.  Department 
ofDefenseCyberCrimeConference(DC3),the  GovernmentForumof 
IncidentResponseandSecurityTeams(GFIRST),theForumofIncident 
ResponseandSecurityTeams(FIRST),andMIS  TrainingInstituteInfoSec 
World.
ThedemoscanbewatchedatthefollowingURL:www.cert.org/insider_
threat.Wereleaseadditionaldemoseveryfewmonths,sowerecommend
thatyouwatchthatsitefornewreleases.Inthischapterwewilldescribe 
theinsiderthreatmitigationstrategiesdepictedinthedemos.
High-Priority Mitigation Strategies
Thefirststepincreatinganewcontroliscaseselection.Wehavea 
prioritizedlistofissueswefeelneedtobeaddressed,basedonourcases, 
assessments,andfeedbackfromworkshopparticipants.Weusethatlistto 
selectthetypeofcase—sabotage,fraud,ortheftofIP—aswellasthetech-
nicalmethodwewishtoaddress.Wethenpulltheapplicablecasesfrom 
theCERTdatabase,reviewthedetailsforeachcase,andeliminatethose 
withoutmuchtechnicaldetail.Thefinalcandidatecasesareanalyzedonce 
more,andthreetofourcasesarechosenthatareinteresting,arerepresen-
tative,andhavesufficienttechnicaldetailforademonstration.Thecase 
thatisthemostinterestingtobothatechnicalandnontechnicalaudience 
isthefinalselection.Thisensuresthatnotonlyisthechosencaseoptimal 
foratechnicaldemonstration,butitwillalsobeinterestingforthewidest 
audiencepossible.
Oncethecaseischosen,toolsthatcouldhavedetectedormitigated
theinsiderattackareselected.AsaFederallyFundedResearchand
DevelopmentCenter(FFRDC),theSoftwareEngineeringInstituteisunable
toendorseorpromotespecificvendors.Therefore,wetrytouseopensource
toolsasmuchaspossibleinourdemos.However,themitigationstrategies
wehighlightinourdemoscanbeimplementedusingwhatevertechnolo-
giesyoualreadyhaveinplaceinyourorganization.Ourgoalistoteachyou
thestrategyandbasicfunctionalitythatcanbeimplementedusingtools
thatyoulikelyalreadyhaveinplace,orprovideanopensourcealternative.
Next,weconstructthedemonstration.Weusuallyhavetofillinsomegaps
inthecaseswithplausibledetailsaswerarelyhavecompletetechnicalinfor-
mationneededtore-createthecaseexactly.Thisresultsinaproductbased
largelyonafactualcasewithenoughtechnicaldetailtomakeitinteresting.
ptg7481383
Chapter7. TechnicalInsiderThreatControls
220
Finally,wecreatetheenvironmentforthedemointheinsiderthreatlab. 
Oncethemachinesarebuiltandthescenarioisworkingcorrectly,the 
virtualnetworkismovedintotheCERTProgram’sXNETenvironment 
andthedemonstrationsarerecorded.
Thesedemonstrationsarenotmeanttobecriticalofthevictim  organizations. 
Weonlyusethesecasesasopportunitiestopointoutwhereatypical 
organizationcouldbeabletointervene,andhow,ingiven  scenarios.
Intherestofthischapterwewilldescribethecontrolswehavecreatedat 
timeofpublication.Wewilldescribethecaseexamplesusedinthecor-
respondingdemos,andthenexplainthecountermeasureswesuggestyou 
considertoprotectyoufrombeingavictimofasimilarattack.Youdonot 
needtowatchthevideosinordertounderstandthischapter,buttheyare 
availableonourWebsiteinordertoreinforcetheselessons.
Control 1: Use of Snort to Detect Exfiltration of
Credentials Using IRC
OurfirstcontrolwasmodeledafteraninsiderITsabotagecasethat 
occurredatanInternetServiceProvider(ISP).Wechosethiscasebecauseit 
enabledustoillustrateafundamentalconceptininsiderthreatmitigation: 
Youshouldconsiderusingyourintrusiondetectionsystem(IDS)todetect 
notonlyintrusions,asthenamesuggests,butalsoexfiltrationofsensitive 
information.SnortisapopularopensourceIDStoolthatcouldeasilybe 
tunedtoexamineinboundaswellasoutboundtraffic.
AtechnicalsupportemployeeatanInternetserviceprovider(ISP)had 
extensivetiestohackergroups,usedseveralonlinealiases,attended 
organizedhackermeetings,andcommunicatedwithhackersfromwork 
inonlineIRCchatsessions.Acoworkeroftheinsiderdiscoveredthatthe 
insiderwasattendingorganizedhackermeetings.
Theemployee’sInternetaccesswassuspendedbecausehis  supervisor 
discoveredunauthorizedprogramsonhismachine,specificallyacredit 
cardnumberverificationprogramandanetworksniffer.Sincefree 
Internet access was an employee benefit, this sanction resulted in extreme 
disgruntlement.Inordertoexactrevenge,theemployeeconnectedwithan 
outsidehackerviaIRCchatandgavehimtheusernamesandpasswords 
forcustomeraccountsthatwereexpiredbutnotdisabled.Thehackerthen 
usedthosecredentialstodefacetheISP’sWebsiteandsteallargeamounts 
ofcustomerinformation.
ptg7481383
Control2:UseofSiLKtoDetectExfiltrationofDataUsingVPN 221
Suggested Solution
Oursuggestedsolutionfocusesonhowaknownandoftenroguechannel 
ofcommunication,IRCchat,couldbedetected.AssumingthatIRCchatis 
prohibited,aSnortrulecouldhavebeenalertedontheinsider/hackerIRC 
communication,andanadministratorcouldusetheBasicAnalysisand 
SecurityEngine(BASE)userinterfacetoinvestigate.
Respondingtothatalert,theadministratorcouldhaveinvestigatedfurther 
usingapacketsniffingapplicationsuchasWiresharktorebuildthecommu-
nicationstream.UsingWiresharkhecouldcompletelyreconstructthefull 
communicationstreambetweentheinsiderandthehacker.Hewouldhave 
immediatelyseentheexfiltrationofcredentialsforthedormantcustomer 
accounts,aswellasthehacker’splantoattacktheorganization.Using 
opensourcetools,hecouldhavepreventedtheattackfrom  occurring.
Thelessontobelearnedfromthiscaseisthatmanyorganizationsusean 
IDStodetectattemptedintrusionsfromoutsidetheirnetwork.  However, 
youcanalsotuneittodetectunauthorizedcommunicationsfromwithin
yournetwork.IfcommunicationsmechanismssuchasIRCchatarepro-
hibitedonyournetwork,thisSnortruleshouldnotgeneratemany 
false-positivealerts,andthereforecouldbeaneasy,newcontrolforyour 
insiderthreatmitigationtoolbox.
Control 2: Use of SiLK to Detect Exfiltration of Data
Using VPN
Oursecondcontrolwasmodeledafteratheftofintellectualpropertycasein
theCERTdatabase.WechosethiscasebecauseitexemplifiesmanytheftofIP
cases,whichinvolveexfiltrationoflargeamountsofdatawithinashorttime
periodfromaremotelocationusingavirtualprivatenetwork(VPN).
Thisinsiderwasemployedasasoftwareengineeratatelecommunications 
company.Shetooktwoleavesofabsenceforatotalofayear,claimingthat 
shewassufferingfromseveremedicalconditions.Althoughshehadno 
workassignmentsduringtheseleaves,hercompanydidnotdisableher 
VPNaccesswhileshewasonleave.
Duringoneleaveofabsence,shenegotiatedemploymentwitha  competitor 
outsidetheUnitedStates,ultimatelyacceptinganofferfromthecompany 
todeveloptelecommunicationssoftware.Whileattheirofficesabroad,she 
usedherVPNconnectiontoaccessheremployer’snetworkanddownload 
ptg7481383
Chapter7. TechnicalInsiderThreatControls
222
proprietarydocuments.Fourmonthslatershereturnedtoheroriginaljob 
asafull-timeemployee.
Overthenextthreedaysshepurchasedaone-wayticketabroad, 
downloadedmorethan200proprietarydocuments,andremovedphysi-
caldocumentsfromtheoffice.Thensheresignedfromherjobviaemail, 
downloadedmoreinformationthatnight,andattemptedtoleavethe 
UnitedStateswiththecompanylaptop.
Fortunately,airportsecuritycaughtherwiththeproprietarydocuments 
asshewasleavingthecountrywiththem.Thelaptop,CDs,thumbdrive, 
andavideotapecontainedproprietarydocumentsandsourcecode.
Suggested Solution
OursuggestedsolutionutilizesaCERTopensourcetoolsuiteknownas 
SiLK,3whichcouldbeusedtodetecttheexfiltrationofproprietaryinfor-
mationfromanetwork.TheSiLKtoolsuiteisdesignedtocollect,store, 
andanalyzenetworkflowdata,providingavaluableplatformfornetwork 
situationalawareness.
ASiLKsensorcouldbeconfiguredtowatchalltrafficattheperimeterof 
asubnetwhereVPNconnectionsattachtothenetwork.AstandardSiLK 
configurationcanbeusedtoidentifylargeflowsoftrafficfromsensitive 
fileserverstousersonVPNconnections,indicatingpotentiallysuspicious 
traffic.Especiallyduringanoff-peaktime,anetworkadministratorcould 
detectananomalybydoingthefollowing:
Recognizingachangeinthedistributionoftheport/protocolof 
networktraffic
Seeingtwodevicesmovingalargeamountofdatainonedirectionina 
shortperiodoftime
Duringanoff-peaktimewhennetworkactivityistypicallylow,  movement 
ofalargeamountofdataoverWindowsfileshareswouldcausetheper-
centageoftrafficpassingtheflowsensortorapidlyrisebeyondother 
protocols,evenHTTP.Thiswouldalerttheadministratortoaconcerning 
behaviorexhibitedonthenetwork.Fromhere,theanalystcoulduseSiLK 
toidentifythespecificflowsinvolved,andthus,thespecifichostonthe 
VPN,forfurtherinquiry.
3.  Seehttp://tools.netsa.cert.org/silk/formoreinformation.
ptg7481383
223Control3:UseofaSIEMSignature 
Thisisaprimeexampleofhowopensourcetoolscanberepurposedto 
assistwithdetectionofmaliciousinsiderbehavior.Wearenowexploring 
newalertingmechanismsusingadditionstotheSiLKsuitethatprocess 
flowdatainrealtime,lookingforpatternsthatmightbeassociatedwith 
dataexfiltration.KeepaneyeonourWebsitefordemonstrationsofthis 
newtechnicalcontrolinthecomingmonths.
Control 3: Use of a SIEM Signature to Detect Potential
Precursors to Insider IT Sabotage
Aftercreatingthefirsttwodemonstrations,wedecideditwastimetobegin 
documentingourcontrolsinamoreformalmanner,ratherthansimplycre-
atingdemonstrations.Theremainderofthissectiondescribeseachcontrol 
inmoredetail,andprovidesmoreimplementationguidance.
ThissectiondescribesdevelopmentandsuggestedapplicationofaSecurity
InformationandEventManagement(SIEM)signaturetodetectpossible
maliciousinsideractivitythatcouldleadtoITsabotage.Sincethereisnouni-
form,standardizedeventloggingformat,wepresentthesignatureintwoof
themostvisiblepublicformats:CommonEventFormat(CEF)andCommon
EventExpression(CEE).BecauseCEFandCEEarebothindraftformatat
thetimeofthiswriting,theSIEMdescribedinthissectionalsoemploysan
operationalversionoftheproposedsignatureinanArcSightenvironment.
RecallthatinsiderITsabotageisdefinedasaninsider’suseof  information 
technologytodirectspecificharmatanorganizationoranindividual. 
ThepurposeofthisanalysisSIEMsignatureistodetectthepresenceofa 
maliciousinsiderbasedonkeyindicatorsrelatedtoITsabotageactivity.
Aformersoftwareengineerwhohadbeenemployedbythevictim 
organization,ahuge,high-techcompany,wasresponsibleformanagingan 
automatedmanufacturingsystem.Duringtheworkweek,hemaintained 
aconstantremoteaccessconnectionfromhishometotheorganization’s 
network.
Theinsider,whohadpreviouslyworkedinanotherdepartmentatthe 
organization,wasterminatedduetopoorperformance.Priortoinforming 
theinsiderofhistermination,theorganizationterminatedtheinsider’s 
networkaccess,butfailedtocheckifhisremoteaccessconnectionwas 
active.(Mostorganizationswehavetalkedtoaboutthishaveadmitted 
thattheywouldnotcatchthiseither.)
ptg7481383
Chapter7. TechnicalInsiderThreatControls
224
Themaliciousincidentoccurredthedayaftertheinsider’stermination, 
outsideofworkhours.Whileundertheinfluenceofalcohol,heused 
theopenVPNconnectionhehadopenedearlierintheweek,priortohis 
termination,toremotelyconnecttocriticalsystemsandshutdownthe 
organization’smanufacturingsystembydeletingcriticalfiles.
Duetohisactions,theorganizationlosthoursofmanufacturingtimeand 
hadtoloadbackupdatatorestartthemanufacturingprocess.Connection 
andactivitylogsconnectedtheinsidertotheincident,andtheinsiderwas 
arrestedandconvicted.
Inthiscase,sincetheinsiderremotelyaccessedtheorganization’s 
informationsystemsoutsideofworkhoursusinghisownaccount,the 
signaturethatfollowswouldhavealertedonthisquestionableactivity 
evenbeforetheinsidersabotagedthedata.Thesignaturewouldhavenoti-
fiedsystemadministratorstotheinsider’sinitialVPNconnectionevery 
Mondayeveningandeverydayduringtheweek,sincetheinsiderleft 
itconnectedallday,allweek.Itwouldhaveloggedfromwhoseaccount 
andfromwheretheconnectionwascoming,andcouldhavepotentially 
detectedtheinsiderbeforehedeletedtheorganization’scriticalinfor-
mation.Thesignaturewouldalsohavealertedontheinsider’sremote
connectivitytothecriticalsystemsandhisdeletionofoperationalfiles. 
Withoutasignaturelikethis,theinsiderwasabletoexploitthevulnerabil-
itytheorganizationcreatedbyfailingtodisabletheinsider’sconnections 
upontermination.
Suggested Solution
ThecasesintheCERTdatabaserevealthatalmostallinsidersinvolvedin 
actsofITsabotagedisplayedbehavioralindicatorspriortocommitting 
theircrimes,asdescribedinChapter2,InsiderITSabotage.Therespec-
tiveorganizationscouldhave,andideallyshouldhave,actedonthese 
behavioralprecursorstopreventthecrimesfromtakingplace.Recallfrom 
Chapter2thatbehavioralindicatorsinclude,butarenotlimitedto,the 
following:
Conflictswithcoworkersorsupervisors
Improperuseoforganizationinformationassets
Sanctions
Ruleviolationsand/orsecurityviolations
Thissignatureisdesignedtobeappliedtowardaparticularuserorgroup 
ofuserswhoare“ontheHRradar”forthosetypesofconcerning  behaviors. 
ptg7481383
225Control3:UseofaSIEMSignature 
Itisnotintendedtobeappliedtoallusersacrossyourenterprise,asdoing 
sowillgeneratealargenumberoffalsepositives.
Beforeapplyingthissignature,youshouldcarefullycraftpoliciesand 
practicesforformalcommunicationsaboutemployeeswhoexhibitescalat-
ingorsignificantconcerningbehaviorsandcoordinationamongrelevant
departmentsacrossyourenterprise.Departmentsthatshouldbeincluded 
areinformationtechnology,informationsecurity,humanresources,physi-
calsecurity,andlegal.Theseproactivestepsarenecessarytoensurethat 
anymeasuresyoutaketocombatinsiderthreatcomplywithallorgani-
zationalpolicies,localandnationallaws,laborunioncontractsandother 
contracts,andregulations.
Policiesmustbeclearlydefinedandconsistentlyenforced.Thresholdsfor 
whenconcerningbehaviorswarranttargetedmonitoringmustbeclearly 
defined.Inaddition,youcannotchoosetofollowuponconcerningbehav-
iorsbysomeemployees,butneglecttodosoforotheremployeeswho 
exhibitthesamebehaviors.
Onceusersareidentifiedwhowarranttargetedmonitoringviathis 
signature,youwillthenbeabletodeterminetheappropriateusernames, 
accountnames,hostnames,and/orhostaddressestoenterintothe 
signaturetomakethealertvolumemoremeaningfulandmanageable.
Database Analysis
WeconductedabriefanalysisontheITsabotagecasesintheCERT  database 
basedonthefollowingquestionstofindwhatinformationcouldbeusedto 
developaSIEMsignature.
Whattimedidtheyattack?Afterhoursorduringbusinesshours?
HowmanyinsidersattackedusingVPNversusintheoffice?
Whatprotocolsdoinsidersuseforremoteconnection?SecureShell 
(SSH),Telnet,RemoteDesktopProtocol(RDP)?
Wefoundthat26%oftheattacksoccurredduringworkhoursand35% 
occurredoutsideofworkhours;in39%ofthecasesthetimeofattackwas 
unknown,asshowninFigure7-1.Breakingthisdownfurther,outofthe 
casesforwhichthetimeofattackisknown,58%oftheattacksoccurred 
outsidenormalworkhoursand42%occurredduringworkhours.
Anotherenlighteningfindingconcernedthenumberofinsiderswho 
attackedusingVPNversusthenumberofinsiderswhoattackedwhilein 
ptg7481383
Chapter7. TechnicalInsiderThreatControls
226
theoffice.Wefoundthat54%oftheattacksusedremoteaccessand27% 
occurredon-site.Inonly19%ofthecases,thelocationoftheattackwas 
unknown.Therefore,ifwediscardUnknowns,66%oftheattacksoccurred 
usingremoteaccessand34%occurredon-site.Figure7-2presentsthese 
findings.
Notethatevenforemployees“ontheHRradar”whohavebeenplaced 
undertargetedmonitoring,theVPNconnectionalonedoesnotnecessar-
ilyindicatemaliciousactivity.TheinsidersintheCERTdatabasemost 
oftenusedaremoteconnectiontothetargetsystemaftertheyestablished 
aVPNconnectionwiththeorganization’snetwork.Forthisreason,wedo 
notincludeVPNtrafficasamonitoredprotocol,butinsteadweinclude 
theVPNusernameincaseswherethataccountmaydifferfromtheuser’s 
regularusername.Thiswillbecomeclearerasyoucontinuereading.
Figure 7-2 Location of attack for IT sabotage cases
27%
19%
54%
On-Site
Remote Access
Location Unknown
Figure 7-1 Time of attack for IT sabotage cases
26%
39%
35%
During Work Hours
Outside Work Hours
Time Unknown
ptg7481383
227Control3:UseofaSIEMSignature 
Figure7-3depictsthetypicalsequenceofeventsassociatedwitharemote
attackviaVPN.
Thespecificprotocolsinsidersuseforremoteconnectionsarenotcurrently 
codedintheCERTdatabase.However,throughinterviewswithsomeof 
theactualperpetrators,aswellasthroughamoredetailedanalysisofthese 
cases,wediscoveredthatthemostcommonknownportsusedforremote
attacksareports22(SSH),23(Telnet),and3389(TerminalServices,orRDP). 
Sinceamajorityofmaliciousinsidersusedremoteaccessfortheirattacks, 
weconsideredinstancesofconnectionstothesethreeportsassuspicious 
inthedevelopmentofoursignature,andpilottestingbypractitioners 
validatedthisassertion.Youwillneedtoaccountforotherprotocolsused 
inyourownenvironmenttomakesureyouaremonitoringallpossible 
channelsofcommunication.
BasedonthisanalysisoftheCERTdatabase,wefoundthattherelevant
indicatorstobeincludedinthisparticularcontrolarethelocationofthe 
attackandthetimeoftheattack.Also,aspreviouslymentioned,since 
remoteaccessisacommonmethodofattack,itisimportanttoconsider 
thetypeofprotocoltheattackeruses(althoughthisinformationwasnot 
specificallycodedinthedatabase).Thisinformationisthebasisforour 
SIEMsignature.
SIEM Signature
Rememberthatthissignatureistobeappliedonlytoindividualswho 
warrantincreasedscrutiny.This signature should not be applied to all privileged
users as it will generate inordinate false positives.
Thecharacteristicsoftheattackerinvolvesomeoneaccessingthe 
organization’sinformationsystemsremotely,outsidenormalworkhours. 
Withthesecharacteristics,wedevelopedthefollowingsignature:
Figure 7-3 Ty pi ca l rem ot e att ack act iv it y via V PN
Malicious
Insider
VPN Connection
to Enterprise
Network
VPN Endpoint:
Entry to Network
Remote
Connection to
Target System via
SSH/Telnet/RDP or
Other Remote
Protocols
Target System
ptg7481383
Chapter7. TechnicalInsiderThreatControls
228
Detect <username> and/or <VPN account name> and/or <hostname> using
<ssh> and/or <telnet> and/or <RDP> from <5:00 PM> to <9:00 AM>
Thepurposeofthesignatureistoidentifytheattacker,theremote
connectionprotocolused,andwhetherthisactivityisoccurringoutside 
normalworkhours.Theidentityoftheattackercanberetrievedthrough 
anyorallofthefollowingparameters:username,VPNaccountname,or 
hostname.Similarly,theremoteconnectionprotocolcanbeanyorallofthe 
following:SSH,Telnet,orRDP.Wehavebasedthesignatureonthefollow-
ingkeyfields:username,VPNaccountname(incasethisaccountnameis 
differentfromthelocalusername),hostnameoftheattacker,andwhether 
theattackerisusingSSH,Telnet,orRDP.
Withthisbasicstructureinmind,weusedtwostandardsforcreatingthe 
signature:theCommonEventFormat,developedbyArcSight,andthe 
CommonEventExpression,developedbyMITRE.Briefsummariesofeach 
standardareprovidedinthefollowingsections.
Common Event Format
TheCommonEventFormatisaneventinteroperabilitystandarddeveloped 
byArcSight.Thepurposeofthisstandardistoimprovetheinteroperabil-
ityofinfrastructuredevicesbyinstitutingacommonlogoutputformatfor 
differenttechnologyvendors.Itensuresthataneventanditssemantics 
containallnecessaryinformation.CEFisanextensible,text-basedformat 
designedtosupportmultipledevicetypesintheeasiestwaypossible.It 
definessyntaxforlogrecordsconsistingofastandardheaderandavari-
ableextensionthatisformattedaskey-valuepairs.Thisformatcontains 
themostrelevantinformation,whichmakesiteasierforeventconsumers 
toparseandusethem.TheformatofCEFis(header/extension):
CEF:Version|Device Vendor|Device Product|Device
Version|Signature ID|Name|Severity|Extension
TheVersionidentifiestheversionoftheCEFformat.TheDevice Vendor, 
Device Product,andDevice Versionuniquelyidentifythetypeofsend-
ingdevice.TheSignature IDidentifiesthetypeofeventreported.The 
Namerepresentsahuman-readableandunderstandabledescriptionof 
theevent,andtheSeverityreflectstheimportanceoftheevent.The 
Extensionpartofthemessageisaplaceholderforadditionalfields,which 
arepartofapredeterminedset.
ptg7481383
229Control3:UseofaSIEMSignature 
Usingthisstandardandthekeyindicatorsweidentifiedduringthe  database
analysis,wedevelopedthefollowingtwoCEF-basedSIEMsignaturesto
identifysuspectedattackers.Thefirstsignature,forMicrosoftproducts,iden-
tifiesasuspectedattackerbylogginghisorherusernameandhostname:
CEF:0|microsoft|activedirectory|2011|001|username logged
in|10|suser=<username> src=<10.0.0.1> shost=<hostname>
Withthisinformation,thesecondsignatureisforSnortproducts.It 
identifiesanattackerwhoinitiatesaremoteconnectiontoTCPport22, 
23,or3389.Itusestheusername/IPaddress/hostnameofthesuspected 
attackergatheredfromthefirstsignature,andalertsonanyattemptsfrom 
thissourcetothetargetdestinationaddress:
CEF:0|sourcefire|snort|2.9|002|remote connection from <suser>
or <src> or <shost> to <dst>|src=<10.0.0.1> or shost=<hostname>
prot=TCP dpt=<22,23,3389> start=<17:00:00> end=<08:00:00>
SinceasingleCEFcannotbeusedtodrawfromtwoseparateproducts,these
twosignaturesareusedtogethertoidentifyasuspectedmaliciousinsider.
Common Event Expression
TheCommonEventExpression(CEE)architecturedefinesanopenand 
practicaleventlogstandarddevelopedbyMITRE.LikeCEF,thepurpose 
ofCEEistoimprovetheauditprocessandusers’abilitytoeffectivelyinter-
pretandanalyzeeventlogandauditdata.Italsoenablesthecreationof 
usefulandefficientlogrecordswithinapplications.Itstandardizesthe 
event-logrelationshipbynormalizingthewayeventsarerecorded,shared, 
andinterpreted.
ThebasiccomponentsofCEEaredictionaryandeventtaxonomy,  logging 
recommendations,logsyntax,andlogtransport.Eventrecordsareguided 
bylogrecommendations(suggestedeventstolog).Logmessagesare 
exchangedviaacommonlogtransport(standardcommunicationsmech-
anisms,suchasXML,SMTP,Syslog,etc.);logmessagesarereceivedin 
commonlogsyntax(consistentdataelementsandformat,suchasXML); 
andthedictionaryandeventtaxonomyspecifiestheeventinacommon 
representation(standardfieldnames,terminology,andeventtypes,such 
asauserlogin,servicerestart,ornetworkconnection).
UsingtheCEEformat,wedevelopedasignaturebasedonthekey 
indicatorsofinsiderITsabotage.Asamplesignatureusingarbitrarydata 
ptg7481383
Chapter7. TechnicalInsiderThreatControls
230
for<logTime>,<user>,<src>,and<shost>,todetectremoteaccess 
outsidenormalworkhoursinXMLformat,is:
<event name=”remote connection by suspected malicious insider”>
<logTime>2011-03-17T12:17:32</logtime>
<suser>maliciousinsider</suser>
<src>10.0.0.1</src>
<shost>insider_system</shost>
<prot>TCP</prot>
<dpt>{22,23,3389}</dpt>
<start>17:00:00</start>
<end>08:00:00</end>
</event>
Thesignatureidentifiesasuspectedattackerwhoisusingaremote
connectiontologontotheorganization’sinternalsystemusingTCPport 
22,23,or3389outsidenormalworkhours.Italsologsthetimetheevent 
wasrecorded.
Applying the Signature
WeultimatelyfoundthattranslatingthesignaturedependsontheSIEM. 
Initially,weusedanopensourceSIEMfordevelopingthesignatures. 
However,theopensourceSIEMweuseddidnothavetheabilitytoexport 
thesignatureintextformat.Inordertoimplementandtestthesignature 
inaproductionenvironment,wedeployeditinanArcSightplatform.The 
ArcSightsignaturewedevelopedandfullytestedusingourkeyindicators 
todetectremoteaccessoutsidenormalworkhoursis:
((Attacker User Name = <username> OR Attacker Host Name = <host-
name>) AND (Target Port = 3389 OR Target Port = 23 OR Target Port
= 22) AND Manager Receipt Time Between (17:00:00.000,08:00:00.000)
AND Target Address = any)
Thissignaturegeneratesanalertif,afternormalworkhours(i.e.,between 
5:00p.m.and8:00a.m.),anattackerisconnectedtoanymachineviaport 
3389(RDP),23(Telnet),or22(SSH).Toidentifytheattacker,thesignature 
logstheattacker’susernameorhostname.
Notethatthemajordeterminantofutilityandsuccessofthissignatureis 
properidentificationofuserstowhomthissignaturewillbeapplied.The
SIEM signatures described here should not be applied to a general user popula-
tion because that will generate a large number of false positives.Privilegedusers, 
ptg7481383
231Control4:UseofCentralizedLogging
suchassystemadministrators,typicallyconnectremotelytovarious 
systems  outsideofficehoursinthenormalcourseoftheirdailyactivities. 
Todeterminewhichusersmeritmoretargetedmonitoringthroughthissig-
nature,youwillhavetorelyonmanagementandhumanresourcesrecords
toproperlyidentifyemployeeswhohaveexhibitedconcerningbehaviors 
thatwarrantcloserinspection.
Conclusion
Ideally,yourinformationsecuritypersonnelshouldregularly  communicate 
withdifferentdepartmentsacrosstheenterprise,especiallywithHRand 
legal.Theyshouldbeinformedwhenanemployeemeetsthethreshold 
ofconcerningbehaviorthatwarrantstargetedmonitoring,asexplained 
inChapter2.IntheCERTdatabase,thevastmajorityofinsiderswho 
committedITsabotagewereguiltyofpolicyviolationsandongoing, 
excessive,concerningbehaviorsintheworkplacepriortotheexecution 
oftheirattack.Inmostcases,insiderscarriedouttheirattackviaaVPN 
connection,fromwhichtheylaunchedremoteconnectionstotheirtarget 
systems.  Organizationsshouldfirstidentifysuspiciousinsidersandthen 
havetheirinformationsecuritystaffapplytheSIEMsignaturedescribedin 
this  sectiontoensurethattheiractionsarecloselymonitored.
Control 4: Use of Centralized Logging to Detect
Data Exfiltration during an Insiders Last Days of
Employment
Next,weselectedasetofinsidertheftofIPcasesfordeeperstudy.We
knowthatinsiderswhostealIParetypicallyscientists,engineers,or 
programmers,asdescribedinChapter3,InsiderTheftofIntellectual 
Property.Theystealassetstheycreatedandtowhichtheyhave  authorized 
access.Theyusuallystealtheinformationwithin30dayspriortotheir 
termination,whetherforcedorvoluntary.Commonexfiltration  methods 
includesendingemailtocompetitorsorforeignorganizations,using 
The SIEM signatures described here should not be applied to a general
user population because that will generate a large number of false positives.
Yo u w i l l h a v e t o r e l y o n m a n a g e m e n t a n d h u m a n r e s o u r c e s r e c o r d s t o
properly identify employees who have exhibited concerning behaviors that
warrant closer inspection.
ptg7481383
Chapter7. TechnicalInsiderThreatControls
232
personalemailaccountsfromwork,anddownloadingfilestoremovable
mediaortolaptops.
Thissectiondescribesacontrolwedevelopedbasedonthosepatterns.Using
acentralizedlogstorageandindexingengine,suchasSplunk,4weshowan
exampleimplementationofthispatternonanenterprise-classsystem.
Anengineerinafirmthatmanufacturedelectronicdevicesand 
microprocessorsusedinsideknowledgeandprivilegedaccesstostealpro-
prietaryproductinformationandsendittoacompetingfirminacountry 
outsidetheUnitedStates.
Aftercommunicatingbackandforthwithahigh-levelofficialatthe 
competitor,theinsidersubmittedhisresignationtohisemployerwithno 
mentionofthecompetitor.Followinghisnoticeofresignationandpriorto 
hislastdayofwork,heproceededtoemailseveralcompressedsetsofcon-
fidentialfilesoffthenetworkdirectlytoacontactatthecompetingfirm. 
Thecasefilealsosuggeststhattheinsideremailedsensitiveinformation 
fromthecorporatenetworktoapersonalemailaddress.
Suggested Solution
Let’sstartbybreakingoutkeycomponentsofthecaseintotechnicalareas 
ofinterest.First,weidentifythetargetasset:stolentradesecrets.Next,we 
considerthesourceoftheasset,whichappearstohavebeenarepositoryof 
sensitivedocuments,likelyafileserver.Last,themediumusedtoexfiltrate 
thedatawasthecorporatenetwork,specificallythestandardcorporate 
emailenvironment,fromwhichtheinsidersentanemaildirectlytoan 
individualatacompetitornotbasedintheUnitedStates.
Next,whenconsideringcontrolstrategies,weexaminewhatmayhave 
preventedthecrime,ledtoearlierdetection,orfacilitatedmoreefficient 
andeffectiveincidentresponseafterthecrimeoccurred.Ofthethreestrate-
gies,prevention clearlyispreferable. However,thisisnotalwayspossible, 
especiallyinglobalorganizationsthatmovemillionsofemailmessages 
acrosstheirnetworkseveryday.Ifitisrealisticforyoutosimplyblock 
allemailstocompetitors,andperhapsallemailsgoingtodomainsoutside 
yourcountry,byallmeansdoso!However,detectionislikelytoprovide 
themostpracticalopportunityforsuccessinmostorganizations.
Weknowthattheinsidersubmittedhisresignation,continuedworking, 
andstoletheproprietaryinformationbeforehislastdayofemployment.As 
describedinChapter3,wealsoknowthatmostinsiderssteal  intellectual 
propertywithinamonthoftermination,whetherforcedorvoluntary. 
4.  www.splunk.com
ptg7481383
233Control4:UseofCentralizedLogging
Thiscompellingpatternfromourmodelingworkprovidesaninteresting 
opportunityforatechnicalcontrol.
Ourgoalwastocreateanewcontrolusingtoolsalreadybeingusedby 
manyorganizations.Wedecidedtoutilizecentralizedlogging,oracentral-
izedlogqueryingmechanism,todetectemailsenttoadirectcompetitor’s 
domain,outsidetheUnitedStates,containinganattachmentwithinone 
monthoftermination.
Priortoapplyingthissignature,youshouldfacilitatecommunication 
andcoordinationbetweenrelevantdepartmentsacrosstheenterprise, 
especiallyinformationtechnology,informationsecurity,humanresources,
physicalsecurity,andlegal.Thiscooperationisnecessaryinparttoensure 
thatanymeasuresyoutaketocombatinsiderthreatcomplywithall 
organizational,local,andnationallawsandregulations.
Onceusersareidentifiedthatwarranttargetedmonitoringviathis  signature
(whichinthiscaseincludesemployeeswithinthe30-daywindowofter-
mination),youwillbeabletodeterminethecorrespondingusernames,
accountnames,hostnames,and/orhostaddressestoenterintothesigna-
tureinordertomakethealertvolumemoremeaningfulandmanageable.
Monitoring Considerations Surrounding Termination
Theprimarymeansinsidersusefordataexfiltrationoverthenetwork 
involvestheuseofeithercorporateemailsystemsorWeb-basedpersonal 
emailservices.Whilenolessathreat,monitoringformisuseofpersonal 
Webemailservicesisoutofscopeforthiscontrol.Weexpecttostart 
addressingthischallengeinthenearfuture,sokeepaneyeonourWebsite: 
www.cert.org/insider_threat.
Corporateemailaccountsrunningonenterprise-classservershaveawealth 
ofauditingandloggingfunctionalityavailable.Thisfunctionalitycanbe 
usedbyadministratorsinaninvestigationor,inthiscase,aquerytodetect 
suspiciousbehavior.Forexample,ifyouenumerate(butdonotblacklist) 
suspicioustransactions,suchasdatatransferstocompetitors,thoseemail 
CAUTION
It is important to note that this signature is not intended to be applied to
all users across the enterprise, as doing so will generate a large number
of false positives. You need to have a policy in place that defines explicit
thresholds for monitoring of high-risk insiders, and it must be consistently
enforced.
ptg7481383
Chapter7. TechnicalInsiderThreatControls
234
transactionsarerecordedinmailservertransactionlogsinaformthatis 
easilyconsumedbyalogindexingengine.Weusetheselogstofind
Messagesofsize,potentiallyindicatinganattachmentorlargeamount 
oftextinthemessagebody
Messagessenttosuspiciousdomains
Messagessentwithinthe30-daywindowofanemployee’stermination
Nowwehavethebasiccriteriaforbuildingaqueryrule:
Iftheemailisfromadepartinginsider,
andthemessagewassentinthepast30days,
andtherecipientisnotintheorganization’sdomain,
andthetotalbytessummedbydayaremorethanaspecifiedthreshold,
thensendanalerttothesecurityoperator.
Thissolutionfirstfocusesondepartinginsiders,andthensetsatime
windowof30days,representingthewindowsurroundingtheirtermination
inwhichtosearchforsuspiciousemailtraffic.The30-daywindowserves
astherootofthequery.Possibledatasourcesthatcanbeusedtoinstanti-
atethisattributeinalivequeryincludeanActiveDirectoryorotherLDAP
directoryservice,partialHRrecordsthatareconsumablebyanindexing
engine,orotherproxiesforemployeestatussuchasphysicalbadgeaccess
status.HRsystemsdonotalwaysprovidesecuritystaffmemberswitha 
simpleindicatorthatanemployeeisleavingtheorganization.Instead,suit-
ableproxies(presetaccountexpiration,datetheaccountisdisabled,etc.)
canbeusedtoboundthe30-daywindowfortargeted  monitoring.
Ifyouimmediatelysettheaccountexpirationdateinyourdirectoryservice 
whenanemployeeturnsinhisorherresignation,thiscontrolcandeter-
mineallemployeeswhowillbeleavingtheorganization.Dependingon 
yourconventions,somecustomizedlogicmightbeneededtoconvertthe 
userid(UID)fromyourdirectoryserviceintotheemployee’semailaddress; 
wesimplyconcatenatetheUIDtothelocaldomainname.
Next,ourqueryidentifiesallemailtrafficfromthosedepartingusers.From 
thattrafficitfocusesonallemailtrafficthathasleftyourlocaldomain 
namespace(orotherlogicalboundaryinthecaseofalargefederationof 
disparatenamespacesorawidetrustzonewithothernamespaces).This 
identifiesanypossibledataexfiltrationviaemailbyidentifying  messages 
ptg7481383
235Control4:UseofCentralizedLogging
wheretheintendedrecipientresidesinanuntrustedzoneorinanamespace 
youotherwisehavenocontrolover.Youmaychoosetosignificantlypare 
downthisportionofthequerybasedonspecificintelligenceorthreat 
information.Forinstance,youcouldspecifysetsof“unwanted”recipient
addressesbycountrycodetop-leveldomains(ccTLD),known-baddomain 
names,orothersimilarcriteria.
Becausenotallmailserversindicateanattachment’spresenceinthesame 
way,thequerynextusesbytecounttoindicatepotentialdataexfiltration. 
Settingareasonableper-daybytethreshold,startingbetween20and50 
kilobytes,shouldallowyoutodetectwhenseveralattachments,orlarge 
volumesoftextinthebodiesofemailmessages,leaveyournetworkonany 
givenday.
An Example Implementation Using Splunk
IfyouareusingSplunkforcentralizedlogindexingandinterrogation,you
canconfigureittoraiseanalertwhenitobservesthebehaviorswedescribed.
Ifyouareusingadifferentlogcorrelationengine,youcanimplementthe
samefunctionalitybyreplicatingwhatwedemonstrateinthissection.
ThefollowingisaSplunkrulethatyoucanadjusttoyourparticular 
environment.Thesampleruleusesasampleinternalnamespacetoillus-
tratetheimplementation.Weassumeagenericinternalnamespaceofcorp.
merit.lab,withtwoserversofinterest.MAILHOSTisanExchangeserver, 
andDCisanActiveDirectorydomaincontroller.
Thecharacteristicsoftheattackerinvolvesomeoneaccessingyour 
informationsystemsremotely,outsidenormalworkhours.Withthese 
characteristics,wedevelopedthefollowingSplunkrule:
Terms: ‘host=MAILHOST
[search host=”DC.corp.merit.lab”
Message=”A user account was disabled. *”
| eval Account_Name=mvindex(Account_Name, -1)
| fields Account_Name
| strcat Account_Name “@corp.merit.lab” sender_address
| fields - Account_Name]
total_bytes > 50000 AND recipient_address!=”*corp.merit.lab”
startdaysago=30
| fields client_ip, sender_address, recipient_address,
message_subject, total_bytes’
ptg7481383
Chapter7. TechnicalInsiderThreatControls
236
Nowwewilldescribethequerybybreakingitintomanageablesegments.
Mail from the Departing Insider: ‘host=MAILHOST []
Thisqueryisactuallyanestedquery.Theoutermostbracketreferstoamail 
server,MAILHOST,andlooksforasetofinformationfirstpulledfrom 
DC,adomaincontrollerinthesampledomain.Becausethelogquerytool 
seeksemployeesleavingwithinthe30-dayresignationwindow,thelogi-
calplacetostartlookingforemployeeinformationisthelocaldirectory 
service.Assumingaccountsaresettoexpireuponresignation,thecorre-
spondingalertcanbequeriedfortheassociatedeventIDorknowntext 
(asinthisdemonstration)tofindallemployeesleavingtheorganization. 
Thequerythenconcatenatestheaccountnameassociatedwiththedis-
ableeventtoastringthatendswiththeorganization’sDNSsuffix(“@corp.
merit.lab”inthisdemonstration)toformastringthatrepresentstheemail 
sender’saddress.Thisendsthefirstcomponentofthequeryandprovides 
thepotentiallymaliciousinsider’semailaddress.
Total Bytes Summed by Day More than Specified Threshold: total_bytes
> 50000
Notallmailserversprovideareadilyaccessibleattributeindicatingthatan 
emailmessageincludedanattachment.Thus,themailserverisconfigured 
tofilterfirstforallmessages“ofsize”thatmightindicateanattachmentor 
alargevolumeoftextinthemessagebody.Thispartofthequerycanbe 
tunedasneeded;50,000bytesisasomewhatarbitrarystartingvalue.
Recipient not in Organization’s Domain:
recipient_address!=”*corp.merit.lab”
ThisportionofthequeryinstructsSplunktofindonlytransactionswhere 
theemailwassenttoarecipientnotintheorganization’snamespace.This 
isavaguequerytermthatcouldgeneratemanyunwantedresults,butit 
doesprovideanexampleoffilteringbasedondestination.Clearly,notall 
messagesleavingthedomainaremalicious,andanorganizationcanfilter 
basedonmorespecificcriteriasuchasspecificcountrycodes,knownbad 
domainnames,Gmail,Hotmail,andsoon.
Message Sent in the Last 30 Days: startdaysago=30
Thissetsthequerytimeframeto30dayspriortothedateoftheaccount 
disablealertmessage.RecallfromChapter3thatthe30-daywindowsur-
roundingresignationisactually60daystotal:30daysbeforeand30days 
ptg7481383
237Control4:UseofCentralizedLogging
afterresignation.Thiscanbeadjustedasneeded,thoughthedataon 
insidertheftofIPexhibitsthe30-daypatterndiscussedpreviously.
Final Section: fields client_ip, sender_address, recipient_address,
message_subject, total_bytes’
Thefinalsectionofthequerycreatesatablewithrelevantinformationfor 
asecurityoperator’sreview.Theoperatorreceivesacomma-separatedval-
ues(CSV)fileshowingthesender,recipient,messagesubjectline,totalbyte 
count, and client IP address that sent the message. This information, along 
withafinitenumberofmessagesthatmatchthesecriteria,shouldprovide 
sufficientinformationforfurtherinvestigation.
Advanced Targeting and Automation
Originally,thiscontrolrequiredmanuallyidentifyingauser,orusers,of 
interesttopopulatethequerywithtargets.Infact,wefindthatthereare 
waystogoastepfurtherusingsimpletoolstoidentifyalluserswhohave 
accountssettoexpirewithina30-daywindow,andpossiblyfeedthese 
directlyintoSplunkviaacommand-linetool.
First,whenanemployeeorcontractorresigns,youmustsethisorher 
accountstoexpireonhisorherlastdayofemployment.InMicrosoftActive 
Directory,youcanquicklyidentifytheuserswhohaveaccountsexpir-
inginthenext30daysbyusingthePowerShellADadministrationtools 
withasimple,one-linequery.Youcanrunthefollowingexamplequeryby 
importingtheADPowerShellmodules.Dependingonprivilegedelegation 
inyourenvironment,aprivilegeduserinthedirectorymightberequired
torunthecommand.
PS C:\Users\ffishbeck_sec> Search-ADAccount -AccountExpiring -TimeSpan
30.00:00:00
AccountExpirationDate : 7/9/2011 12:00:00 AM
DistinguishedName : CN=Brian Smith,OU=Employees,DC=corp,DC=merit,
DC=lab
Enabled : True
LastLogonDate : 7/1/2011 18:40:03 AM
LockedOut : False
Name : Brian Smith
ObjectClass : user
ObjectGUID : a6ed88a4-fab3-494d-9f45-4d9ad11e1069
PasswordExpired : True
PasswordNeverExpires : False
ptg7481383
Chapter7. TechnicalInsiderThreatControls
238
SamAccountName : Brian Smith
SID : S-1-5-21-2581603451-735610124-1584908375-1108
UserPrincipalName : bsmith@corp.merit.lab
AccountExpirationDate : 7/23/2011 12:00:00 AM
DistinguishedName : CN=Jennifer Burns,OU=Employees,DC=corp,
DC=merit,DC=lab
Enabled : True
LastLogonDate : 6/29/2011 12:18:00 PM
LockedOut : False
Name : Jennifer Burns
ObjectClass : user
ObjectGUID : fdd0b06f-c929-4da9-9f89-4c9415e3d756
PasswordExpired : True
PasswordNeverExpires : False
SamAccountName : Jennifer Burns
SID : S-1-5-21-2581603451-735610124-1584908375-1110
UserPrincipalName : jburns@corp.merit.lab
AccountExpirationDate : 7/2/2011 12:00:00 AM
DistinguishedName : CN=Megan Jordan,OU=Employees,DC=corp,DC=merit,
DC=lab
Enabled : True
LastLogonDate : 6/30/2011 4:30:28 AM
LockedOut : False
Name : Megan Jordan
ObjectClass : user
ObjectGUID : 4f11a5f4-7e49-4ec7-a34b-882fb643e5a3
PasswordExpired : True
PasswordNeverExpires : False
SamAccountName : Megan Jordan
SID : S-1-5-21-2581603451-735610124-1584908375-1117
UserPrincipalName : mjordan@corp.merit.lab
Onceyouknowwhichuseraccountsareexpiringinthenearfuture,you 
caneithermanuallypopulatetheSplunkquerywiththeseLDAPuser-
names,orexperimentwithpipingthemintoacommand-lineSplunkquery. 
Thereareopensourceprojects,includingsplunk-powershell,thatwould 
supportthistypeofactivitywithaverysimplescript.5Whilethisproject 
doesnotappeartoworkwiththenewestreleaseofPowerShell2,itdoes 
workwiththeoriginalPowerShellbinariesandwillsuccessfullyquerya 
currentv4.1.xSplunkinstallation.
5.  http://code.google.com/p/splunk-powershell/
ptg7481383
Summary 239
Conclusion
Accordingtoourresearch,itisveryimportantthatyoucarefullyconsider 
organizationalcommunicationsduringthetimeframesurroundingan 
employee’sresignation.Manyinsidershavestoleninformationwithina 
30-daywindowofterminationfromtheirorganization.Further,manyof 
thesetheftsoccurredviauseofstandardcorporateemailservers.Awell-
constructedrulesetcanbeplacedonacentralizedloggingapplianceto 
identifysuspiciousmailtrafficoriginatingfromsoon-to-be-departing 
employees.Thesewell-craftedrules,basedontrendsobservedfromactual 
cases,canreduceanalysts’workloadsbypresentingthemwithbehaviors 
thatareknowntobemaliciousinseveralactualinstances,andtherefore 
meritfurtherinvestigation.
Insider Threat Exercises
WerecentlymovedthenetworksfromtheinsiderthreatlabintotheCERT 
XNETenvironmenttocreaterealistictrainingexercisesforcyberdefend-
ers.Theseinteractive,team-basedexercisesre-createcomplexactual 
insiderthreatscenariosandchallengeparticipantstoprepareforand 
respondtoinsiderthreatincidents.Theyincludevariousinjectsfromthe 
teamsrunningtheexercisetosimulateincidents.Theseexercisescanbe 
conductedwithinanorganizationtobetterequipitsdefensesagainstmali-
ciousinsiders,orcanbeusedincyberflagexercisestorecognizethemost 
sophisticatedteamamongmultiplecompetingorganizations.AppendixA, 
InsiderThreatCenterProductsandServices,containsadescriptionofour 
insiderthreatexercises.
Summary
Afterspendingmanyyearsstudyingtheinsiderthreatproblem,and 
fullyunderstandingthepatternsinthedifferenttypesofinsidercrimes, 
wecreatedtheCERTinsiderthreatlabtotestexistingtechnicalsolutions 
andbegintocreatenewones.Manycommercialinsiderthreattoolsare 
available;however,wecontinuetoseethesametools,techniques,andpro-
cedures(TTPs)thatwe’vebeenseeingforthepastdecade.Thequestionis: 
Why?Oneansweristhatmaliciousactivitybyinsiderslooksverymuch 
ptg7481383
Chapter7. TechnicalInsiderThreatControls
240
liketheirauthorizedday-to-dayonlineactivity.Theirbehaviordoesnot 
appeartobeanomalous.Inaddition,manyinsiderthreatdetectiontools 
resultininformationoverload.Thelinebetweenmaliciousandnormal 
behaviorissodifficulttodiscernthatthesetoolsendupreportingamulti-
tudeoffalsepositivesthatmakethetoolsunusable.So,whatistheanswer?
Wehavediscoveredthatitispossibletocreateeffectiveinsiderthreat 
controlsusingexistingtechnology,evenopensourcetoolsinmanycases. 
Thetoolssimplyneedtobeconfiguredandintegratedbasedonthe  patterns 
ofactivityobservedinourinsiderthreatmodels.
Thischapterpresentedcontrolsforusing
SnorttodetectexfiltrationofcredentialsusingIRC
SiLKtodetectexfiltrationofdatausingVPN
ASIEMsignaturetodetectpotentialprecursorstoinsiderITsabotage
Centralizedloggingtodetectdataexfiltrationduringaninsider’slast 
daysofemployment
Asyoucansee,wehaveusedavarietyofexistingtechnologytodetect 
insiderthreatsbasedonthemostcommonbehavioralpatternsintheCERT 
database.KeepcheckingourWebsite,www.cert.org/insider_threat,aswe 
continuetoreleasemorecontrolsonanongoingbasis!
ThenextchapteriscomposedofmanycaseexamplesfromtheCERT 
database.Throughouttheyears,wehavefoundthatthesecasesarevalu-
abletoolsinhelpingpractitioners,management,andotherleaderstorealize
thepotentialthreatsfacingorganizations.Asyoureadthroughtheexam-
ples,askyourselfonceagain:Couldthishappentome?Unfortunately,in 
manycasestheanswerwillbeyes.Thegoodnewsisthatthisbookcanhelp 
youtofigureoutwhatyouneedtodotochangetheanswertono.
ptg7481383
241
Chapter  8
CaseExamples
Wevealreadyusedmanycaseexamplesthroughoutthisbook.This 
chapterpresentsanadditionalselectionofcasesfromtheCERTinsider 
threatdatabase.1Thedescriptionsusedherewerederivedfromavarietyof 
publicsources.Whilewetriedtocorroboratethedetailswherewecould, 
itwasnotalwayspossible.Nevertheless,webelievemanylessonscanbe 
learnedfromreviewingthesecases—obviously,wehavelearnedalotfrom 
themovertheyears!
ThefirstsectioncontainsITsabotagecases,followedbycasesthatwereboth 
sabotageandfraud,thentheftofIP,fraud,andfinallythe  miscellaneous 
cases.Withineachsection,thecasesaresortedbythesectorofthevictim 
organization.Eachsectionstartswithatabledescribingeachcaseinthat 
section.Youmightwanttousethosetablestosearchforcasesthatyoufind 
particularlyinteresting,eitherbecauseofthemethodusedorbecauseof 
theapplicabilitytoyourorganization.
Sabotage Cases
Table8-1providesanindexofsabotagecasesintheCERTinsiderthreat 
database.
1.  Someofthesesummarieswerepulledfrompreviouslypublishedworkscitedinotherchapters. 
OtherswerepulledfromtheCERTinsiderthreatdatabase.Wewouldliketorecognizethemanystaff 
membersonourteamwhohavecontributedtothesesummariesoverthepasttenyears;theyarelisted 
bynameintheAcknowledgmentssectionofthePreface.
ptg7481383
Chapter8. CaseExamples
242
Table 8-1 SabotageCases
Case #
Industry or Government
Sector Description
1 Banking and finance Revenge via framing of another
employee
2 Banking and finance Logic bomb that covered its tracks
3 Banking and finance Logic bomb propagated to server
configuration management baseline
4 Banking and finance Insider threatens attack from the
Internet underground
5 Commercial facilities Insider conducts attack with help from
the Internet underground
6 Defense industrial
base
Multiple logic bombs
7 Defense industrial
base
Massive leakage of proprietary
information to the media by
whistle-blower
8 Defense industrial
base
Insider tests logic bomb three times
before final attack
9 Energy Contractor still has access even after
his company suspends him
10 Food Consultant steals 5,000 passwords
11 Government Contractor plants logic bomb just prior
to termination
12 Government Former DBA deletes critical
information following denied EEOC
complaint
13 Government Insider changes someone to
“deceased” in a government database
14 Information
technology
Consultant attacks after being told
contract will end
金融与财政
商业设施
告密者造成的大量产权信息泄露
Sabotage类型:
1. 埋放逻辑炸弹;
2. 向产品或系统中嵌入恶意代码;
3. 删除组织的关键信息(故意没有备份);
4. 公布组织中的敏感信息;
5. 切断组织的对外服务;
6. 丑化组织形象(上传色情图片或丑化网站)
破坏组织的正常运行(业务运行,对外服务,产品瑕疵),
可以看出CERT的内部威胁定义并没有包含进向产品中植入恶
意代码造成瑕疵的破坏行为(不属于信息完整性保护的非法
修改与破坏范畴),因此该定义仅仅聚焦于信息角度,并不
全面。
ptg7481383
SabotageCases 243
15 Information
technology
Consultant renders systems
inaccessible after being reduced to
part-time
16 Information
technology
Insider who left ISP prevents
customers from accessing Internet for
three weeks
17 Information
technology
System administrator, fearing layoffs,
plants malicious code
18 Information
technology
Manufacturer suffers widespread
shutdown after disgruntled employee
of business partner sabotages wire-
less networks
19 Information
technology
Programmer plants malicious code
that disrupts critical operations
12 months after he left
20 Information
technology
Former application developer inserts
pornographic images on company
Web site
21 Information
technology
IT worker brings down 911 systems so
that he can “play the hero”
22 Information
technology
Technical support person works
with the Internet underground to
compromise his organization and
deface its Web site
23 Information
technology
Computer technician with a criminal
history posts employees’ PII to the
Internet
24 Postal and shipping Company discovers backups had
not been recording critical data
after former programmer deletes his
software
Sabotage Case 1
Adisgruntledformeremployeeofahumanresourcesdepartmentcaused
majorhavocfortheorganizationoveraperiodofnearlyfivemonths.He
brokeintotheorganization’ssystemsremotelyafterhewasfiredanddeleted
顾问在被拒绝兼职后
使系统无法访问
将雇员的个人验证信息发布到网上
ptg7481383
Chapter8. CaseExamples
244
approximately1,000filesrelatedtoemployeecompensation.Healso  modified
thepayrollrecordstoreflectalargesalaryincreaseandsubstantialbonusfor
oneofhisformercoworkers.Thecoworkerwasa  previousromanticinter-
estofhiswhohadrejectedhim.Tofurtherframethewomanforthecrime,
hesentanemailtoseniormanagersfromacomputeraccountthatcontained
thefemaleemployee’slastname.Theemailhadanattachmentcontainingan
excerptofthedeletedfiles.Aforensicimageofthecomputerattheinsider’s
newemployerrevealedthattheemailstotheseniormanagersofthevictim
organizationweresentfromthatcomputer.Theinsiderwasarrested,con-
victed,orderedtopaymorethan$90,000inrestitution,andsentencedto18
monthsofimprisonmentfollowedbythreeyearsofsupervisedrelease.
Sabotage Case 2
Afirm’snetworkmanagerplacedamaliciousprogram—atimedlogic 
bomb—onthenetworktodisruptanddamagehisemployerasrevenge
forperceivedwrongs.Hehadbeenadvisedofadverseemploymentissues 
andwasplacedonaperformanceimprovementplan.Thelaststrawfor 
theorganizationwashisunexcusedabsencefromworkseveralweeks 
later.Theorganizationimmediatelyterminatedhim.However,themali-
ciouscodehehadalreadyplacedonthesystemhadbeenprogrammed 
toexecuteattheendofthemonth.Themalicioussoftwaredeletedand 
modifiedmorethan50,000accountsanddisruptedthefirm’scomputer 
network.Theinvestigationuncoveredevidencethattheinsiderhadtaken 
stepstoconcealhisactivity:Themaliciouscodeactuallydeleteditselfafter 
execution,andtheinsiderhaddeletedthesystemlogsthathadrecorded
hisonlineactivityrelatedtoplantingthemaliciouscodeinthefirstplace. 
Fortunately,investigatorseventuallyfoundevidenceonabackuptapethat 
confirmedtheinsider’sactions.Hewasconvicted,andsentencedtomore 
thanoneyearofimprisonment,sixmonthsofelectronicmonitoringand 
home  confinement,andthreeyearsofsupervisedrelease.
Sabotage Case 3
Rumorsspreadacrossaninternationalfinancialorganizationthatannual 
bonuseswouldbesmallerthanusual.Thispromptedasystemadminis-
tratortobeginconstructingalogicbombathome,evenworkingoniton 
Christmasday,andtouseauthorizedremoteaccesstomovethelogicbomb 
tothecompany’snetwork.Hethenpropagatedthemaliciouscodetoallof 
thecompany’sserversaspartofthestandardserverupgrade  procedure. 
Heresignedwhenhefoundouttherumorsaboutlowbonusesweretrue; 
hehadalreadylaidthefoundationforhisrevenge.Thelogicbomb,which 
动机:因
解雇不
满,报
复,陷害
同事;
攻击:远
程入侵服
务器,删
除员工福
利文件、
篡改同事
工资单,
发送陷害
同事邮
件;
攻击目
标:
服务器中
员工福利
数据文件
以及同事
工资单、
邮件
动机:因
感觉被错
误对待、
解雇而不
满,报
复;
攻击:向
系统中嵌
入恶意代
码,删除
篡改账户
文件,中
断企业网
络;
目标:账
户文件与
企业网络
使用;
动机:谣
言年终奖
要降低,
报复企
业;
攻击:利
用管理员
的合法权
限向服务
器中放置
逻辑炸
弹,并且
定时启
动;当谣
言确实时
辞职,两
周后逻辑
炸弹爆
炸;
目标:删
除文件,
中断企业
网络
ptg7481383
SabotageCases 245
hehadsettogoofftwoweekslater,deletedbillionsoffilesanddisrupted 
serviceonthousandsofserversthroughouttheUnitedStates.Priortothe 
logicbomb’sdetonation,theinsiderpurchasedputoptionsofthecompany 
stock,expectingthesubsequentdetonationofthelogicbombtodrivethe 
firm’sstockpricelower.Althoughthestockpricedidnotdrop,thevictim 
organizationestimatedthattheattackwouldcostmorethan$3million 
innetworkrepairs,andcouldhaveaffectedmorethan1billionsharesof 
itsstock.Aforensicsinvestigationconnectedtheinsidertotheincident 
throughvirtualprivatenetwork(VPN)access,andthroughcodesnippets 
bothonhishomecomputerandontheorganization’snetwork.Theinsider 
wasconvictedandsentencedtomorethaneightyearsinprison.
Sabotage Case 4
Asystemadministratorandseveralofhiscolleagueswerelaidoffbyafinan-
cialfirm.Overaperiodoffourdaysafterreceivingthebadnews,theinsider
contactedmanagementatthevictimorganizationandthreatenedthem.He
statedthatifhedidnotreceiveasignificantlylargerseverancepackageand
goodemploymentrecommendations,hewouldrecruithisfriendsfroman
undergroundInternethackingringtoattackthevictimorganization.Healso
claimedtohaveopenedbackdoorsthroughoutthevictimorganization’s
systemstofacilitatesuchanattack.Theorganizationcontactedlawenforce-
mentandconsensuallyrecordedphonecallsbetweentheinsiderandthe
victim,capturingtheinsider’sdemands,threats,andintent.Hewasarrested
beforetheattacksevercametofruition,wasconvicted,andwassentencedto
15monthsofimprisonmentandthreeyearsofsupervisedrelease.
Sabotage Case 5
Asystemadministratorforaretailcompanywasterminatedoverissueswith
aserverforwhichhewasresponsible.Followinghistermination,herecruited
membersofanonlinehackinggrouptohelphimattackhisformeremploy-
er’ssystems.Herelayedpasswordsandotheraccesscontrolinformationto
theundergroundgroup,andprovideddetailedinstructionsonhowtouse
thosecredentialstobreakintohisformeremployer’snetwork.Overaperiod
ofoneweek,theinsiderwasabletoorganizethegroupandexecuteacoor-
dinateddenial-of-serviceattackagainsttheretailerthatlastedfromtheday
beforeThanksgivinguntiltheSundayafterThanksgiving—commonlyrecog-
nizedasthebusiestshoppingdaysoftheyear.Personnelattheorganization
detectedproblemsinthenetworkthatwereobstructingonlinesalesand
promptlyrespondedtotheincident.Theinsiderwasconvicted,sentencedto
18monthsofimprisonment,andorderedtopay$64,000inrestitution.
动机:被
解雇,不
满,要求
大额补偿
金和就业
推荐;
攻击:威
胁雇佣黑
客攻击组
织网络,
声称已在
系统中布
置后门;
目标:解
雇补偿金
与就业推
荐机会
动机:因
解雇不
满,报复
攻击:系
统管理员
雇佣黑
客,告知
登陆认证
信息,攻
击原单位
网络,造
成感恩及
销售日
DOS
目标:企
业的节日
销售服
务;
ptg7481383
Chapter8. CaseExamples
246
Sabotage Case 6
Aself-employedcontractorwasasystemadministratorforamilitarybranch,
andinthatcapacityhehelpedtooverseethedailyoperationofacomputer
systemusedtotrackandplotthelocationsofvariousmilitaryvehicles.When
thevictimorganizationrejectedhisproposalforfollow-onworkanddecided
toawardtheworktoanotherfirm,hebecamedisgruntledanddecidedto
takeactiontomakethenewsystemadministrator“lookbad.”Hesabotaged
theorganization’ssystemsbyplantinglogicbombsonfiveserverssettodet-
onateafterheleft.Threeofthefiveserversweresubsequentlydamagedand
wentoffline.Anothersystemadministratorsearchedforsimilarmalicious
codeanduncoveredtheadditionallogicbombs;theadministrator’sactions
preventedthemaliciouscodefromaffectingtheothertwotargetedcomput-
ers.Thevictimorganizationthentookextensivestepstosecureandrestore
thenetworkanditsdata.Theinsiderwasconvicted,orderedtopay$25,000
inrestitutionanda$10,000fine,andsentencedtomorethanayearinprison
followedbyaperiodofsupervisedrelease.
Sabotage Case 7
Aninspectoratamanufacturingplantcomplainedtomanagementabout 
thelackofsupportgiventoinspectorstodotheirjob,sayingthatinspec-
torswerepressuredtoapproveworkregardlessofquality.Despitethefact 
thatanindependentevaluatordeterminedthathisclaimswereunfounded, 
theinsiderthreatenedtosuethecompanyandofferedhissilenceforacash 
settlement.Thisextortionattemptwasdeclinedbythecompanyandno 
furtheractionwastakenuntilyearslaterwhennewspaperarticlesbegan 
appearingthatdivulgedthecompany’sproprietaryinformation.After 
receivingananonymoustipthattheinsiderwasresponsiblefortheleaks, 
theorganizationstartedaninvestigation.Workingwithlawenforcement, 
theorganizationfoundevidencethattheinsiderhadbeendownloading 
itsconfidentialinformation,whichwasoutsidehisareaofresponsibility,
formorethantwoyears.Theinsiderhaddownloadedmassivenumbers 
ofproprietarydocumentsusingaUSBremovablestoragedriveandstored 
thedataathisresidence.Theinvestigationalsofoundevidenceofthe 
insider’semailcorrespondencewithreportersdiscussingtheproprietary 
documents,articles,andmeetings.Theentireincidenttookplaceover 
threeyearsandthevictimorganizationestimateditslossat$5millionto 
$15million.Thetrialendedwithacontinuanceagreementbetweenthe 
insiderandthevictimorganizationthatdirectedtheinsidertocooper-
atewithlawenforcementtoretrieveleakeddocumentsandnotleakany 
further  organizationinformation.
动机:合
同终止,
不满报
复,要让
新合作方
看上去看
糟;
攻击:个
体经营的
承包商利
用管理员
权限,放
置了逻辑
炸弹;
目标:组
织网络;
动机:诉
求不被企
业接受,
因此不
满;
攻击:偷
偷下载了
产权文
档,利用
USB拷贝,
并发邮件
与记者交
流;
目标:企
业产权文
ptg7481383
SabotageCases 247
Sabotage Case 8
Amanufacturingfirm’ssystemadministratorbeganemploymentasa 
machinist.Overaten-yearperiod,theinsidercreatedthecompany’s 
networksupportingthecriticalmanufacturingprocessesandhadsole 
authorityforsystemadministrationofthatnetwork.Duringthistime 
theinsidercentralizedtheonlycopyofthesourcecodeforallofthecom-
pany’scriticalproductionprogramsonasingleserver,andconvinced 
managementtoinstitutepoliciesmandatingthispractice.Thecompany 
eventuallyexpanded,openingadditionalofficesandplantsnationally 
andinternationally.Theinsiderbegantofeeldisgruntledathisdiminish-
ingimportancetothecompany;launchedverbalandphysicalassaultson 
coworkers;sabotagedprojectsofwhichhewasnotincharge;andloaded 
faultyprogramstomakecoworkerslookbad.Hereceivedaverbalwarn-
ingandtwowrittenreprimands,wasdemoted,andfinallywasfiredasa 
resultofhisactions.Afewweekslater,alogicbombexecutedonthecom-
pany’snetwork,deleting1,000criticalmanufacturingprogramsfromthe 
company’sserver,theoneonwhichtheinsiderhadcentralizedthecom-
pany’sproductionprogramsearlier.Noothercurrentcopyofthesoftware 
wasavailabletorecoverfromtheattack,sincehehadalsorequestedand 
received,throughintimidation,theonlybackuptape,violatingcompany 
policyandamplifyingtheimpactofhisattackevenfurther.Theestimated 
costofthedamageexceeded$10million,leadingtothelayoffofapproxi-
matelyeightyemployees.Theinvestigationrevealedthattheinsiderhad 
actuallytestedthelogicbombthreetimesonthecompany’snetworkafter 
hourspriortohistermination.Theinsiderwasconvictedandsentencedto 
41monthsofimprisonment.
Sabotage Case 9
AcontractorwasemployedintheITdepartmentofanenergy-management 
facility.Inresponsetoanemployeedispute,thecontractor’semployer 
suspendedhisaccesstoitssystems,butfailedtonotifytheenergymanage-
mentfacilityofthesuspension,andhisfacilityaccesswasnotdisabled. 
Afewdayslater,onaSundayevening,hegainedaccesstotheenergy 
productionfacility,usedahammertobreaktheglasscaseenclosingthe 
“emergency poweroff” button, and hitthe button.As a result, some of the 
computersystemswereshutdown,includingcomputersthatregulated
theexchangeofelectricitybetweenpowergrids.Thedayfollowingthe 
shutdown,theinsideremailedabombthreattohissupervisor.Theemail 
promptedtheevacuationof500employeesforsixhours.Torestorethesys-
tem,thevictimorganizationhadtotransfercontroltoanotherfacilityand 
动机:因
公司改变
感觉重要
性降低不
满,破坏
公司活
动,最终
导致被解
雇;
攻击:放
置逻辑炸
动机:中
止合同后
报复
攻击:合
同中止但
特殊权限
忘记收
回,导致
了物理攻
击和邮件
威胁;
ptg7481383
Chapter8. CaseExamples
248
utilize20computerspecialistsforapproximatelysevenhours.Employee 
securityaccesscodes,aswellascomputeraccess,system,andvideosur-
veillancelogs,wereusedtoidentifytheinsider.Theinsiderwasconvicted, 
orderedtopay$34,000in restitution, andsentencedtosixmonthsofhouse 
arrestandfiveyearsofprobation.
Sabotage Case 10
Aninformationsystemsconsultantatalargemanufacturerranseveral 
differentpassword-crackingprogramsonthecompany’snetworkfive 
differenttimesoveraten-monthperiod.Initially,hestoredthecracked 
passwordsinafileonthecompany’sserver.Laterheinstalledamore 
sophisticatedpassword-crackingprogramonthecompany’ssystem.This 
programenabledhimtoautomaticallytransferallaccountsandpasswords 
thatcouldbecrackedtoaremotecomputeronaperiodicbasis.Fivethou-
sandpasswordsforcompanyemployeesweresuccessfullytransferred.The 
companydiscoveredtheunauthorizedactivity,whileperformingremote
accessmonitoringaftertheconsultanthadbeenterminated.Itnoticedthat 
theformerconsultanthadobtainedunauthorizedaccesstoitsnetwork 
andcreatedanadministratoraccount.Thispromptedaninvestigationof 
theformerinsider’spreviousonlineactivity,uncoveringhisunauthor-
izedactivitywhileemployed.Theincident-relatedimpactwas$10,000, 
theorganization’scostofassessingthedamage,verifyingsystemsecurity, 
andrestoringintegritytoitscomputersystems.Theinsiderwascon-
victed,orderedtopay$10,000,andsentencedtothreeyearsof  probation 
and250hoursofcommunityservice.
Sabotage Case 11
Asystemadministratorwhoworkedforacontractortoagovernmentagency
wasreprimandedbyhisgovernmentsupervisorforfrequenttardiness,
absence,andunavailabilityforwork.Afterfindingouthewasabouttobe
terminated,theinsiderconstructedandplantedalogicbombonthegovern-
mentorganization’sservertodeletecriticalfiles.Heplacedthelogicbomb
intwodifferentscripts.ThefirstwasinaSolarisscriptthatrotatedlogfiles
whenavolumereachedacertainpoint;ratherthanrotatinglogfilesitwould
executehislogicbomb.Heplacedthesecondlogicbombinhis  supervisor’s
log-inscript.Thislogicbombwassetuptodisplaya  threateningand
insulting  messagetohissupervisorduringlogin,executethelogicbomb,
andremovealltracesofitselffromthesystem,includinginlogfiles,thus
framinghissupervisorforthemaliciousact.Theinsiderwascaughtafter
arousingsuspicionbycommentstoacoworkerafter  plantingthelogicbomb.
信息系统
顾问密码
窃取员工
密码;
没有描述
动机;
因工作效
率低、缺
勤以及工
作不适用
被上级训
斥,当发
现要被解
雇时,系
统管理员
放置了逻
辑炸弹;
ptg7481383
SabotageCases 249
Theorganizationheededwarningsbythecoworker,shutdowntheservers,
discoveredtheproblem,removedthedestructivecode,andreestablishedsys-
temsecurityandintegritybeforethelogicbombexecuted.Fortunately,the
logicbombneverexecuted.Theinsiderwassentencedto15monthsinprison,
threeyearsofsupervisedrelease,and$108,000inrestitution.
Sabotage Case 12
Adatabaseadministratorandprojectmanageratagovernmentagency 
becameincreasinglydisgruntledwhenhermalecoworkersbegantoover-
ridehertechnicaldecisionswhereshewastheexpert.Shefiledcomplaints 
withHRoverwhatsheconsideredahostileworkenvironment,butshe 
wasnotsatisfiedwiththeirresponse.Aftershefiledacomplaintagainst 
hersupervisor,herperformancereviews,whichhadbeenstellar,went 
downhill.Hersupervisorthendemotedherbyremovingherprojectman-
agementresponsibilities.Againshecomplained,buthersupervisorstarted 
filingcomplaintsagainstherwithhumanresourcesforfailuretofollow 
instructions.ShenextfiledacomplaintwiththeEEOCfordiscrimination 
basedonhernationalorigin,race,andgender.Sheeventuallyresignedand 
transferredtoanothergovernmentagencybecauseshewasfrustratedby 
theorganization’slackofresponsivenesstohercomplaints.
Twomonthsfollowingherresignation,shefoundoutherEEOC  grievance
againsttheorganizationhadbeendenied.Thelaststrawwaswhenshefound
outthattheorganizationonlyforwardedhernegativeperformancereviewsto
theneworganizationwhereshewasnowemployed.Sheconnectedfromher
computerathometoherpreviousorganization.Sheusedanotheremployee’s
usernameandpasswordtologintothesystem.Nextsheaccessedacritical
systemusingadatabaseadministrator(DBA)accountpassword,whichhad
notbeenchangedsincesheresigned,anddeletedcriticaldatafromthesystem.
Shedroppedcriticaltablesfromthedatabase,unawarethatthedatabaseback-
upshadbeenfailingfortwoweeks.  Recoveryeffortsrequired115employees
workingatotalof1,800hourstoreenterthedatamanually;thesystemswere
downforthreedays.Remoteaccess,database,andInternet  serviceprovider
(ISP)logsconnectedtheinsidertotheincident.Theinsiderwasarrested,con-
victed,orderedtopay$35,000inrestitution,andsentencedtofivemonthsof
homedetention  followedbythreeyearsofsupervisedrelease.
Sabotage Case 13
Agovernmentclaimsrepresentativehadaconfrontationinanonlinechat 
roomthatwasunrelatedtohiswork.Becausehehadaccesstoacritical 
首先因同
事推翻自
己的决定
不满,投
诉得不到
满意的回
答,投诉
到上级却
被降级,
投诉到
EEOC却被
拒绝。
辞职后得
EEOC
绝了其要
求,于是
登陆原单
位数据库
删除记
录;
使用同事
的账户登
录系统,
关键数据
库密码并
未更换。
ptg7481383
Chapter8. CaseExamples
250
U.S.governmentdatabase,hewasabletochangethechatroom  moderator’s 
statusinthedatabasesothatsheappearedasdeceased.Theinsiderwas 
apparentlygettingrevengeonthemoderatorforkickinghimoutofthe 
onlineforum.Theincidentwasdetectedwhenthemoderatortriedtoopen 
abankaccountandwasinformedthatshewaslistedasdeceasedinthe 
governmentdatabase.Theactioncausedthemoderatorenormousincon-
venienceinfinancialtransactionsthatweredisruptedduetoherdeceased 
status.Theinsiderwasconnectedtotheincidentbythevictim,whoiden-
tifiedtheinsiderbythepictureheusedinthechatroom.Theinsiderwas 
apologeticandstatedhedidnotrealizetheextentofthedamagehewould 
becausingbyhisactions.Theinsiderwasconvicted,sentencedtooneyear 
ofprobation,andfined.
Sabotage Case 14
Ane-commercedeveloperdecidedtomovehisfamilytoadifferent
state.Asamatteroforganizationalpolicy,hecouldnolongerwork
asafull-timeemployee,sohewashiredasaconsultant.Hetraveled
acrossstatelinestoworktwodaysaweekandtelecommutedthreedays
aweekfromhome.Therelationshipbetweentheorganizationandthe
insiderdeterioratedduetohisdisgruntlementoverhisperceivedinade-
quatebenefitsafterbecomingaconsultant.Finally,theorganizationtold
himhisemploymentwouldbeterminatedinapproximatelyonemonth.
Afteraweekandahalf,heloggedinremotelyfromhome,deletedthe
softwarehewasdeveloping,aswellassoftwarebeingdevelopedbyoth-
ers,modifiedthesystemlogstoconcealhisactions,andthenchanged
therootpassword.Hethenjoinedatelephoneconference,nevermen-
tioningwhathehaddone.Afterthetelephoneconferenceended,he
reportedthathewashavingproblemsloggingin,againtoconcealhis
actions.Attheendofthedayheannouncedhisresignation.Thesabo-
tagewasdetectedwhentheorganizationnoticedthemissingsoftware.
Forensicauditsrevealedthattheserverhadbeenaccessedfromthe
insider’sISP’sdomain.Theinsider’sattackcosttheorganizationmore
than$25,000,including230staffhoursandassociatedcosts.Theinsider
wasconvicted,sentencedtothreeyearsofprobation,andorderedtopay
morethan$25,000inrestitution.
Sabotage Case 15
Aconsultantforacompanythatmanagedclientdataandbusiness 
operationsforothercompanieshadaverbalcontractwiththeorganization 
andwasitsprincipalsoftwaredeveloper.Herepeatedlymadedemands 
为了报复
仲裁人将
其踢出在
线论坛,
利用自己
的权限访
问政府数
据库将仲
裁人的信
息标记为
“已
故”,从
而导致受
害人在处
理许多金
融业务时
不便。
ptg7481383
SabotageCases 251
overthecourseofayearforpartialownershipofthecompany.The 
organizationfinallyinformedhimthatinfivemonthshewouldbereduced
topart-timestatus,loweringhiscompensationandbenefits.Thedayafter 
hisdemotiontopart-timestatus,theinsider,duringworkhours,remotely
loggedintotheorganization’scomputersystem.Heremovedcritical 
codefromthesystem,preventingemployeesandauthorizedusersfrom 
accessingsoftwarehehadcreatedthatwasusedtomanageclientdataand 
businessoperations.Theorganizationdetectedtheattackwhencustomers 
reportedtheirinabilitytoaccessthesystem.Theorganizationconnected 
theinsidertotheattackwhenanemployeecontactedhimfortechnical 
supportandherevealedthathehadtakentheprogramdowninorderto 
acquire20%ofthecompany.Theowneroftheorganization,accompanied 
bycorporatecounsel,contactedtheinsiderviatelephone.Headmittedthat 
hehadtakendownthecomputersystem,intendingtodisrupttheorgani-
zation’sbusinessoperations,andindicatedthathewouldnotcauseany 
moredisruptionsiftheorganizationmethisdemands.Threedayslater,the 
organizationhadnotmettheinsider’sdemands,soheremotelyaccessed 
thesystemandmodifiedpasswords,preventingemployeesandauthorized 
usersfromaccessingthecomputersystem.Hewasconvicted,orderedto 
pay$10,000inrestitution,andsentencedtosixmonthsofhomedetention 
followedbytwoyearsofprobation.
Sabotage Case 16
TheinsiderworkedforanISPthatprovidedwiredandwirelessInternet 
servicetoresidentialandbusinesscustomers.Aspartofitsservice,the 
organizationprovidedcommunicationservicesininterstateandforeign 
commerceandcommunication.TheISP’stechnologyusedwirelessradio 
(Wi-Fi)signalsbetweenradiotowersanditscustomers’wirelessaccess 
points.Radiotowersandaccesspointswereoperatedbycomputersatthe 
organization’sfacilities.
TheinsiderlefttheISPoverbusinessandfinancialdisputesandwentto
workforadirectcompetitor.Inhisattackonhisex-employer’snetwork,
theinsiderusedadministratoraccountstotakecontroloftheISP’snet-
work.Hereprogrammed110oftheISP’scustomers’wirelessaccess
pointstocutofftheirInternetservice.Heexecutedhiswrittenprograms
andcommandsontheradio-towercomputers.Theexecutioncausedthe
radio-towercomputerstosendcommandstocustomers’accesspoints,
whichpreventedcustomersfromaccessingtheInternet.Thedisconnected
servicesincludedtheserviceofonecustomerwhowasrelyingonelec-
tronicmailfornewsofanorgandonor.Unfortunately,norecoveryplan
因为被降
职成兼职
身份,福
利与工资
都有所降
低,因此
在被降职
的第二
天,他在
工作时间
内远程登
陆了组织
的计算机
系统,移
除关键代
码导致雇
员和授权
用户无法
访问软
件。
他的目标
是要求组
20%的股
份,
ptg7481383
Chapter8. CaseExamples
252
forremoteaccesstocustomerconfigurationshadeverbeenconceived.
Unabletoremotelyrepairthenetwork,theISPdispatchedtechniciansto
thepremisesofthesubscriberswholostInternetaccess.Servicingallcus-
tomerstooktheISPthreeweeks,leavingsomecustomerswithoutInternet
accessforthatentireperiod.Theinsider’sactionalsocausedtheISP’s
accesspointstorepeatedlybroadcastradiosignalsthatinterferedwiththe
signalsofanotherISP.
Intotal,morethan170customers(includingindividuals,families,and 
businesses)lostInternetservice,someofthemforaslongasthreeweeks, 
andcollectivelycausedmorethan$65,000inlosses.Theinsiderwascon-
victed,orderedtopay$65,000inrestitution,andsentencedto24monthsof 
imprisonmentfollowedbyperiodsofsupervisedreleaseandcommunity 
service.
Sabotage Case 17
Asystemadministrator,fearinglayoffs,embeddedmaliciouscodewithin
scriptsonhisorganization’sservers,whichwereresponsibleforman-
agingprescriptionbenefitplans.Theincidentspannedayearandtwo
monthsfromthecreationofthemaliciouscodetoitsdetection.Themali-
ciouscode,atimedlogicbomb,wassettoexecuteonhisnextbirthday,
approximatelysixmonthsinthefuture.Hadhebeensuccessful,thecode
wouldhavewipedoutcriticaldataonmorethan70serversandcaused
widespreadfinancialdamage.Italsowouldhavecausedpotentialhealth
riskstotheorganization’scustomers.Evenaftersurvivingthelayoffs,
theinsiderdidnotremovethemaliciouscode;infact,hemodifieditone
monthlater.Themaliciouscodecontainedaprogrammingerrorandfailed
toexecuteonhisbirthdayasscheduled.However,heallegedlycorrected
theprogrammingerrorsixmonthslater,settingthecodetoexecuteonhis
nextbirthday.
Fortunately,afewmonthsbeforetheintendedexecutiondate,another 
systemadministratorinvestigatingasystemerrordiscoveredthemalicious 
codeanddisabledit.Theinsiderwasconvicted,orderedtopay$81,200in 
restitution,andsentencedto30monthsofimprisonment.
Sabotage Case 18
Anemployeeofacompanythatsetupanewwirelessnetworkfor
amajormanufacturerwasontheinstallationteam,andthereforehad
detailedknowledgeofthemanufacturer’ssystems.Hewasremoved
ptg7481383
SabotageCases 253
fromtheteambyhisemployer,apparentlyundernegative  circumstances.
Theinsider,posingasanauthorizedtechnicalsupportprovider,used
passwordinformationobtainedfromhispreviousemployertoaccess
60ofthemanufacturer’scomputerkioskslocatedinthevisitors’lobby.
Basedonhisfamiliaritywiththemanufacturer’scomputersystemand
security,hewasabletousethekioskstodeletefilesandpasswords
fromwirelessdevicesusedbythemanufactureracrossthecountry.
Themanufacturerwasforcedtoremoveandrepairthedevices,caus-
ingwidespreadshutdownoffacilitiesanddisruptionofitsprocesses.
Themanufacturersustainednearly$30,000indamagesincurredby
removalandrepairofthedevicesandshuttingdownthefacilitiesfor
sevenandahalfhours.Theinsiderwasconvicted,sentencedtooneyear
of  probation,andorderedtopay$30,000inrestitution.
Sabotage Case 19
Aprogrammeratatelecommunicationscompanywasangrywhenit
wasannouncedthattherewouldbenobonuses.Heusedthecomputer
oftheprojectleader,whosatinacubicleandoftenlefthiscomputer
loggedinandunattended,tomodifyhiscompany’spremierproduct,
aninter-networkcommunicationinterface.Hismodification,consist-
ingoftwolinesofcode,insertedthecharacteriatrandomplacesin
thesupportedtransmissionstreamandduringprotocolinitialization.
Themaliciouscodewasinsertedasalogicbomb,recordedinthecom-
pany’sconfigurationmanagementsystem,andattributedtotheproject
leader.Sixmonthslater,theinsiderleftthecompanytotakeanotherjob.
Sixmonthsafterthat,thelogicbombfinallydetonated.Theincidentwas
initiallydetectedbycustomers,whoreportedthattheycouldnotuse
thecompany’sservices.Softwaredevelopersattheorganizationdiscov-
eredthemaliciousinsertion,removedthelogicbomb,andreissuedthe
code.Theleaddevelopersuspectedthattheinsiderwasresponsiblefor
theincident,andidentifiedtheinsiderastheperpetratorthroughaudit
logs.Theinsiderwasconvicted,orderedtopay$16,000inrestitution,
sentencedtosixmonthsofhomedetention,andrequiredtoperform
communityservice.
Sabotage Case 20
Amarkettrendproductanalysisorganizationfailedtodisableaformer
applicationdeveloper’saccountsorchangeaccountpasswordsupon
termination.Onemonthaftertermination,heremotelyloggedintothe
ptg7481383
Chapter8. CaseExamples
254
organization’ssystems,modifieditsWebsite(includingtheinsertionof
pornographicimages),changedsystempasswords,andsentemailsto
customerssayingthattheiraccountshadbeenhackedandtheirpass-
wordsstolen.Theemailsincludedtheclient’susernameandpassword.
Theincidentinvolvedtwoseparateattacks,whichweremorethana 
monthapart.WeblogsshowedtheIPaddressusedtolaunchtheattack
wasassociatedwiththeinsider’swife’sISPaccount.Theorganiza-
tionspent$53,000andmorethan330hoursrepairingthedamage.The
insiderwasconvicted,orderedtopaymorethan$48,000inrestitution,
andsentencedtofivemonthsofimprisonmentfollowedbytwoyearsof
supervisedprobation.
Sabotage Case 21
AnITworkerwaslocatedinthenetworksupportdepartmentofa 
telecommunicationscompanythatadministeredanemergency911
system.OneFridaynight,theinsiderdeletedtheentiredatabaseand
softwarefromthreeserversintheorganization’snetworkoperationscen-
ter(NOC)bygainingphysicalaccessusingacontractor’sbadge,which
helaterclaimedtohavefound.TheNOC,whichwasleftunattended,
wassolelyprotectedviaphysicalsecurity;allmachinesintheroomwere
leftloggedinwithsystemadministratoraccess.Themotivationofthis
particularinsiderwasabitunusual:Anewbosswasstartingworkon
Monday,andonFridaynighthedecidedhewould“playthehero”to
gainfavorableattentionfromthenewbossonMondaymorning.Obvi-
ously,theimpactswerehuge,sincehebroughtdownthe911systemson
aFridaynight.
AlthoughtheNOCsystemadministratorswereimmediatelynotifiedof 
thesystemfailureviaanautomaticpagingsystem,therewerenoauto-
matedfailovermechanisms.Theorganization’srecoveryplanreliedsolely 
onbackuptapes,whichwerealsostoredintheNOC.Unfortunately,the 
insider,realizingthatthesystemscouldbeeasilyrecovered,tookallof 
thebackuptapeswithhimwhenheleftthefacility.Inaddition,thesame 
contractor’sbadgewasauthorizedforaccesstotheoff-sitebackupstorage 
facility,fromwhichtheinsidernextstolemorethan50additionalbackup 
tapes.Theinsiderturnedhimselfinandphysicalaccesslogsconnectedhim 
totheincident.Hewasconvicted,orderedtopaymorethan$200,000in 
restitution,andsentencedtofiveyearsofprobation,includingsixmonths 
ofhomedetention.
ptg7481383
SabotageCases 255
Sabotage Case 22
AnemployeeworkinginatechnicalsupportroleatanISPwascaughtwith
unauthorizedsoftwareonhiscomputer,specificallyacreditcardnumberver-
ificationprogramandanetwork sniffer.2Asaresult,theISPsuspendedhis
Internetaccess.Angeredbythis,herecruitedafriend,anoutsider,tohelphim
retaliate.Boththeinsiderandhisfriendwereactivemembersofahacking
group,andregularlyattendedtheorganization’smeetings.TheyusedIRC
channels3tocommunicatebackandforthwitheachotherandtorelayinfor-
mationunderassumedhackernamesinanattempttomasktheiridentities.
Theoutsiderobtainedrootaccesstotheorganization’ssystemviaabuffer
overflowattack.Theoutsideraccessedcompanysystems,perusedemail,
monitoredthenetwork,andranasniffer,whichemailedhimresultsevery
morning.TheoutsiderobtainedmultipleuserIDsandpasswords,whichhe
usedtoattacktheorganization’ssystems.Thetwowereabletogatherenough
informationabouttheorganization’ssystemsthattheysuccessfullydefaced
theorganization’sWebsite.Acoworkeroftheinsiderdiscoveredthathewas
attendingorganizedhackermeetings.Theinsiderrespondedbythreatening
hiscoworker’shealthviaIRCchat.Accesslogsconnectedtheinsiderandout-
sidertotheincident.Theinsiderwasarrested,convicted,orderedtopaya 
$4,000fine,andsentencedtooneyearofimprisonment.
Sabotage Case 23
Acomputertechnicianwithprivilegedaccessatanetwork  communications 
companywasfiredonlyamonthafterstartinghisjobbecauseherefused
togivehisSocialSecuritynumbertothehumanresourcesdepartment,and 
hefailedtodisclosepriorcriminalconvictions.Beforeleavingtheorganiza-
tion,hestolePersonallyIdentifiableInformation(PII)for8,000employees 
andpostedittoaWebsitehehadestablishedtosmeartheorganization’s 
image.TheWebsitethreatenedtopublishmoreinformationandlinkit 
toundergroundsitesknowntofacilitateandengageinidentitytheftand 
fraud.Healsoprotestedoutsidetheorganization’sofficesandusedhis 
picketingsigntoadvertisehisWebsite.
Hesentemailstotheorganization’sexecutives,directingthemtohis 
Website—usinganISPaccountthatwasregisteredunderthenameof 
2.  Network sniffer(alsoknownasasniffer):acomputerprogramorapieceofhardwarethatcan 
interceptandlogtrafficpassingthroughanetwork.
3.  Internet Relay Chat (IRC) channel:functionallysimilartoamultiuserchatinstance.
ptg7481383
Chapter8. CaseExamples
256
theorganization’schairman.TheIPaddressassociatedwiththeaction 
was  connectedtoanISPaccountregisteredtotheinsider’swife.The 
organizationobtainedatemporaryrestrainingorderdirectingtheinsider 
tostoppublicizingitsemployees’PII.Afteraprocessserverattemptedto 
deliveracopyoftherestrainingordertohim,theinsiderpostedathreatto 
killtheprocessserveronhisWebsite.Healsothreatenedtheorganization’s 
assistantgeneralcounsel(includingpostingadetailedmaptoherhomeon 
thesite)andthechairmanofthevictimorganization.Hewasconvictedand 
sentencedto46monthsofimprisonment.Afterhisrelease,hehadseverely 
limitedaccesstocomputersandwasrestrictedfrom  communicationwith 
the  victimsofhisthreatsaswellaswitnesses.
Sabotage Case 24
Aprogrammerinalogisticscompanywasterminatedastheresultofareor-
ganizationwithinthecompany.Thecompanyfollowedproperprocedures
byescortinghimtohisofficetocollecthisbelongingsandthenoutofthe
building.TheITstaffalsofollowedthecompany’ssecuritypolicybydis-
ablinghisremoteaccessandchangingpasswords.However,theyoverlooked
onepasswordthatwasknowntoonlythreepeopleintheorganization.The
terminatedinsiderusedthataccounttogainaccesstothesystemthenight
ofhisterminationandtodeletetheprogramshehadcreatedwhileworking
there.Theorganizationdetectedtheincidentwhenoneoftheserversand
severalfinancialpackagesfailed.Theinsiderhadinstalledseveralbackdoors
andwasoneofonlytwopeoplewhoknewthepasswordtotheaccountused
intheattack.Restorationofthedeletedfilesfrombackupfailed.Although
theinsiderhadbeenresponsiblefor  backups,companypersonnelbelieve
thatthebackupswerenotmaliciouslycorrupted.Thebackupshadsimply
notbeentestedtoensurethattheywereproperlyrecordingthecriticaldata.
Asaresult,theorganization’soperationsinNorthandSouthAmericawere
shutdownfortwodays,causingmorethan$80,000inlosses.Theinsider
wasconvicted,orderedtopay$80,000inrestitution,andsentencedtoone
yearinprisonfollowedbysixmonthsofhomeconfinement.
Sabotage/Fraud Cases
Table8-2providesanindexofsabotage/fraudcasesintheCERTinsider 
threatdatabase.
ptg7481383
Sabotage/FraudCases 257
Table 8-2 Sabotage/FraudCases
Case #
Industry or Government
Sector Description
1 Banking and finance DBA works with Internet underground
for two years to commit fraud using
employee data
2 Information
technology
Sole security administrator for small
firm holds company hostage for more
pay and launches attacks from its
network
3 Information
technology
VP of engineering quits, takes source
code and backups, and demands
$50,000 for its return
Sabotage/Fraud Case 1
ADBAresponsibleforaverylargedatabasecontainingpersonalemployee 
informationforaninsurancecompanybecamefrustratedovertimeby 
whatheperceivedtobeunfairlylowpay.Hetookrevengeagainstthe 
organizationoveratwo-yearperiod.Hedownloadedpersonalinforma-
tionassociatedwithemployeesfromthedatabasetoremovablemedia, 
resultinginthecompromiseof60,000employeerecords.Hesolicitedbids 
forthesaleoftheinformationovertheInternetbyusingmessageboards 
toadvertisetheavailabilityoftheinformationtoindividualswhomhe 
hopedwouldbeabletofraudulentlyusetheinformation.Healsolever-
agednewsgroupsdedicatedtocreditcardfraudtopostemployeecredit 
cardnumbersandencouragedthemalicioususeofthesecreditcardsor 
othersobtainedinthenamesofvictimemployees.Lawenforcementeven-
tuallycapturedtheinsiderwhenanundercoveragentposedasapotential 
buyeroftheinsider’sstoleninformation.Hewasconvicted,orderedto 
pay$3,000inrestitution,andsentencedtothreeyearsofprobationwith 
required  participationinamentalhealthprogram.
Sabotage/Fraud Case 2
Thesolesecurityadministratorforasmalltelecommunicationsfirmquit 
hisjobwithnoadvancenotice.Duringhistenurewiththefirm,hehad 
expressedfeelingsofdissatisfactionduetoinsufficientgratitudeand 
因为不满
于长期的
低薪资,
DBA为了报
复单位,
将自己所
掌握的组
织员工保
险信息出
卖给诈骗
组织,这
其中就包
括信用卡
诈骗组
织,以此
获利。
ptg7481383
Chapter8. CaseExamples
258
compensationforhiswork,andalsohadaseriesofconflictswith  coworkers. 
Hehadalengthyhistoryofpiratingmaterialonlineandhadcommitted 
priorelectroniccrimesrelatedtounauthorizedsystemandnetworkaccess. 
Followinghistermination,amanagerattheorganizationcalledhimat 
hometorequestadministrativepasswordssincehehadnotturnedthem 
overtoanyonewhenhequithisjob.Herefusedtodisclosetheadministra-
tivepasswordsuntilhereceivedadditionalpaytowhichhefeltentitled. 
Heturnedthemoverthreedayslater,afterlockingtheorganizationout 
ofalladministrativefunctions.Foramonthafterward,heusedbackdoor 
accountshehadcreatedpreviouslytoremotelyaccesstheorganization’s 
systemsanddeletefilesthathehadcreatedduringhisemployment.He 
alsochangedtheDNSrecordsfortheInternet-facingserverstopointto 
anotherservernamedtoslandertheorganization,andlaunchedoffensive 
attacksfromwithintheorganization’snetwork.Forinstance,heusedthe 
victim’snetworktorunnetworkscanningtoolsagainstmilitarynetworks. 
Hewasconvicted,orderedtopaya$3,000fine,andsentencedtotwoyears 
ofsupervisedprobation.
Sabotage/Fraud Case 3
Avicepresidentofengineeringwhowasresponsibleforoversightofall 
softwaredevelopmentinhiscompanywasengagedinalong-running 
disputewithuppermanagement.Thisdisputewascharacterizedbyver-
balattacksbytheinsiderandstatementstocolleaguesaboutthedegree 
ofupsethehadcausedtomanagement.Heengagedinpersonalattacks 
onceortwiceaweekandononeoccasion,inarestaurant,screamedper-
sonalattacksattheCEOofthecompany.Afinalexplosivedisagreement 
promptedtheinsidertoquit.Whennoseverancepackagewasoffered, 
hecopiedaportionofasoftwareproductunderdevelopmenttoremov-
ablemedia,deleteditfromthecompany’sserver,andremovedtherecent
backuptapes.Hethenofferedtorestorethesoftwareinexchangefor 
$50,000.Unfortunately,themostrecentversionofthesoftwarewasnever 
recovered.Theinsiderwasconvicted,sentencedtofiveyearsofprobation, 
andorderedtopayrestitution.
Theft of IP Cases
Table8-3providesanindexoftheftofintellectualpropertycasesinthe 
CERTinsiderthreatdatabase.
不满、冲
突、类似
的犯罪历
+无通知
离职;
离职时未
修改管理
员密码,
通过后门
进入系统
删除自己
创建的文
件,并且
修改DNS
录,并且
故意发起
攻击军事
网络,陷
害原单
位。
工程部的
副主席与
上层领导
层陷入了
长期的争
论中,具
有个人攻
击表现
(口头
上)
辞职时拷
贝了大量
组织关键
数据,然
后删除,
以此作为
要挟换取
经济利
益。
ptg7481383
TheftofIPCases 259
Table 8-3 TheftofIPCases
Case #
Industry or Government
Sector Description
1 Chemical Product development director is caught
stealing IP when laptop he returned
upon termination is examined
2 Defense industrial
base
Former systems engineer modies the
company’s software slightly and sells it
abroad for new employer
3 Government Large downloads from the network
trigger investigation that leads to
former contract programmer
4 Information
technology
Insiders from multiple high-tech
companies steal IP and start company
funded by foreign government
5 Information
technology
Company’s IP is stolen by nephew
of an employee of a trusted business
partner’s trusted business partner
6 Information
technology
Trio of insiders conspire to steal IP, give
it to foreign manufacturer, and receive
commissions from that company’s sales
Theft of IP Case 1
Theinsiderworkedasachemistandlateraproductdevelopmentdirector 
atapaintmanufacturingplant.Hemadeabusinesstripabroadtowork 
withoneofhisorganization’ssubsidiaries,andacoworkernoticedthathe 
wasunusuallyinterestedinacompetitorbasedinanothercountry.Afew 
weeksafterthetrip,theinsiderresignedabruptly.Thisraisedsomesus-
picionathisorganization.Theyinvestigatedthecompanylaptophehad 
returnedandnoticedthathehaddeletedallofthetemporaryfiles.Upon 
furtherexamination,theydiscoveredahiddenfilethatcontained,among 
otherthings,aprohibiteddatacopyprogramand44GBofunauthorized 
datathatincludedtheorganization’sintellectualproperty.Uponexecut-
ingasearchwarrant,authoritiesconfiscatedaUSBdrivefromtheinsider’s 
luggageashewasattemptingtoleavethecountry.Thedrive  contained 
IPbelongingtotheorganization,includingformulasforproductsthatthe 
三个内部人合
作偷窃IP,卖
给国外生产商
换取佣金;
ptg7481383
Chapter8. CaseExamples
260
insiderhadnotworkedonandthushadnolegitimatereasonto  possess. 
TheauthoritiesalsonoticedthathisLinkedInprofilestatedthathewas 
nowemployedbyasimilarcompanyinanothercountry.Theduration 
oftheincidentwasapproximatelyfivemonths,butthemajorityofthe 
tradesecrettheftoccurredinthetwoweekspriortohisresignation.He 
wasconvicted,sentencedto15monthsofimprisonmentandthreeyears 
ofsupervisedrelease,andorderedtopaymorethan$30,000inrestitution.
Theft of IP Case 2
Aseniorsystemsengineeratavisualsimulationcompanyresigned;athis 
exitinterviewhefalselystatedthathehadreturnedallproprietaryinfor-
mationasrequiredbytheIPagreementhehadsignedasaprecondition 
toemployment.Afterhemovedabroad,amonthafterhisresignation,he 
agreedtoserveasanindependentconsultanttohisformeremployerand 
continuedtoaccessthecompany’sproprietaryinformation.Overathree-
monthperiodwhileservingasaconsultant,hecompiledandcoercedothers 
tocompileproprietarysourcecodeindirectviolationofcompanypolicy. 
Beforeterminatinghisconsultancywiththecompany,heacceptedajob 
withacompetitorbasedoutsidetheUnitedStates.Forayearafterleaving 
thecompany,hemadeseveralproductdemonstrationstovariousforeign 
agentsandcustomersusingtheinformationhestole.Duringseveralofthe 
presentations,heslightlymodifiedthestolenintellectualpropertytomake 
itappearasthoughhisnewemployerhaddevelopedit.Hewaseventu-
allyarrestedwhenanindividualatoneofhisdemonstrationsnoticedthat 
theproducthewasdisplayingbelongedtohisformeremployerandnoti-
fiedtheauthorities.Hewasconvicted,butthecasematerialdoesnotstate 
whethertheIPwasreturnedtothevictimcompanyorrecoveredfromthe 
competitor.Theinsiderwasorderedtopaya$10,000fineandsentencedto 
twoyearsofimprisonmentfollowedbyaperiodofprobation.
Theft of IP Case 3
Theinsiderwasformerlycontractedasaprogrammerbyagovernment 
organizationthatmaintainedanauthoritativemedicaldatabase.The 
organizationnotifiedhimthathisaccesstoasystemunderdevelopment 
wasbeingdisabledandthathisfurtherresponsibilitieswouldbelimited 
totestingactivities.Afterhisprotestsweredenied,hequittheorganiza-
tion.Then,threetimesoveratwo-weekperiod,heusedabackdoorinto 
thesystemwithadministratorprivilege(whichhepresumablyinstalled 
beforeleaving)todownloadsourcecodeandpasswordfilesfromthe 
developmentalsystem.Theunusuallylargesizeoftheremotedownloads 
ptg7481383
TheftofIPCases 261
raisedredflagsintheorganization,whichresultedinaninvestigationthat 
tracedthedownloadstotheformercontractor’sresidence.Hewascon-
victed,orderedtopay$10,000inrestitution,andsentencedtofivemonths 
ofimprisonmentfollowedbyaperiodofprobation.
Theft of IP Case 4
The“lead”insiderandanaccompliceworkedasengineersattwodiffer-
enthigh-technologycompanies.Inaddition,theleadinsiderworkedattwo
otherhigh-technologycompanies.Fromthefourcompanies,theindividu-
alsstolevariousIPandstartedacompanyfundedbyaforeigngovernment
tosellproductsbasedonthestoleninformation.Theyattemptedtorecruit
otherinsiderstostealinformationandworkfortheircompany.Theresultant
investigationrevealedthatbothinsiderspossessedIP,includingphysical
documents,intheirhomesandoffices.Unfortunately,reportsofthecrimedo
notspecifytheexacttimeframeoftheinsiders’employmentinthecompa-
niesoroftheseriesofthefts.Bothindividualswereconvictedandsentenced
tooneyearinprison.Withtheinsiders’cooperation,authoritiesseizedIP
belongingtoallfourcompaniesthatwasintheinsiders’possession.
Theft of IP Case 5
Theoutsidelegalcounselforahigh-techcompanywaspreparingto
representthecompanyincivillitigation.Theoutsidecounselwasprovided
withdocumentscontainingthecompany’stradesecrets,whichwereneces-
sarytopreparethelegalcase.Thelegalfirmhadacontractwithadocument
imagingcompanyforcopyingdocumentsforitscases.Anemployeeofthe
documentimagingcompanybroughtinhisnephewtohelphimcopythe
company’sinformation,includingthetradesecretdocuments,duetothe
amountofworkrequired.Thenephew,auniversitystudentnotofficiallyon
thepayroll,convertedscannedTIFF images4oftradesecretdocumentation
associatedwithanti-piracytechnologytoPDFformatandtransmittedthem
totheleaderofanonlinecommunitywhosepurposewastopiratetelecom-
municationservices.Theforumadministratororiginallyrefusedtopostthe
information,statingitwastoosensitivetobereleased,buteventuallydid
sounderpressurefromthenephewwhohadstolenit.Thenephew’sgoal
wastohelpthehackercommunitycrackthehigh-techcompany’spremier
product.Attorneysfortheotherorganizationinvolvedinlitigationwiththe
victimorganizationdiscoveredtheinformationonlineandnotifiedthe  victim
4.  TIFF images:TaggedImageFileFormat(or.tif)isafiletypeoftenusedinimagemanipulation 
programs.
ptg7481383
Chapter8. CaseExamples
262
organization.Thenephewwasconvicted,orderedtopay  approximately
$146,000inrestitution,and  sentencedtohome  confinementandprobation.
Theft of IP Case 6
Aseniorengineer,hiswife,andanotheraccompliceallworkedforanauto
partsmanufacturer.Theinsider’swifequitherjobasavicepresidentofsales,
andconspiredwiththeaccompliceinsidetheorganizationtosetupanew
company.Thetriointendedtostealproprietaryinformationfromtheauto
partsmanufacturerintheUnitedStates,provideittoamanufacturerbased
outsidetheUnitedStates,andthenreceivecommissionsonsalesmadebythe
manufacturer.Whilestillemployedbytheautopartsmanufacturer,theengi-
neerwasabletocopyhundredsoffilestoCDs,includingproprietarydesign
andmanufacturingprocessinformation.Hethenrelayedthisinformationto
hiswife,whoproceededtoforwardittotheexternalmanufacturer.Thetheft
wasdetectedandreportedbythesupplierstotheexternalmanufacturer,
whentheyreceivedemailabouttheproprietarymanufacturingprocesses.
Theprimaryinsider—theseniorengineer—wasconvictedandsentencedto
sixmonthsofimprisonmentfollowedbyperiodsofhousearrestandproba-
tion.Theconspiratorswerealsoconvictedandimprisoned.
Fraud Cases
Table8-4providesanindexoffraudcasesintheCERTinsiderthreat 
database.
Table 8-4 FraudCases
Case #
Industry or Government
Sector Description
1Banking and finance Loan officer is recruited to steal identity
information from her customers as part
of a six-person identity theft ring
2Banking and finance More than $4 million in risky loans
result from ring of coworkers who
modify credit histories for pay
ptg7481383
FraudCases 263
3Banking and finance Foreign-currency trader covers up
trading losses for five years
4Commercial facilities Insider intentionally opens infected
email attachment, installing malicious
code that sends confidential
information to his company’s
competitor
5Defense industrial
base
Computer help desk attendant at a
military contractor steals more than
$8 million worth of equipment using
fake email addresses
6Emergency services Police communications operator
creates 195 illegal driver’s licenses due
to lack of role-based access controls
7Food Group shares their passwords so that
they can work more efficiently
8Government–Federal Supervisor uses his authority and
privileged access to grant asylum
to foreign nationals who had been
denied asylum in the United States
9Government–Federal After being promoted, insider retains
old role and new role in a system,
enabling her to enter and approve of
fraudulent transactions
10 Government–State/
Local
Insider with multiple roles is able to
authorize payments of more than
$250,000 to his wife
11 Government–State/
Local
Manager instructs subordinate to
reformat backup tapes, destroying the
evidence against him
12 Health care Subcontractor changes address of
medical provider and has checks sent
to her accomplice
ptg7481383
Chapter8. CaseExamples
264
Fraud Case 1
Theinsiderwasaloanofficerinafinancialinstitution.Theincidentwas 
partofamassiveidentitytheftringcomposedofsixindividuals.Theystole 
identitiesfromatleast25people,andthenusedtheidentitiestodefraudten 
financialinstitutionsand25retailersinmultiplestatesforatotalof$335,000 
overafour-yearperiod.Theringleader,anoutsider,carefullyrecruitedpar-
ticipants,eachwithaspecificroleinthescheme.Thisparticularinsiderwas 
recruitedtostealpersonalandfinancialinformationofcustomersapply-
ingforamortgagewithhercompany,andanotherinsider,anemployeeat 
anescrowfirm,stolefinancialinformationofher  company’sclients.The 
insider’spartinthecrimeoccurredovera  ten-monthperiod.Theinforma-
tionwasusedbytwomembersofthecrimeringwithequipmenttocreate 
counterfeitdriver’slicenses.Theremainingconspiratorsusedthelicenses 
toopennewcreditaccountswithbanksandretailers,purchasedgoods 
andserviceswiththenewaccounts,anddrainedthecashfromexisting 
checkingandsavingsaccountsofthevictims.Theincidentwasdetected 
byaprobationofficer,whodiscoveredequipmentforcreatingfalseiden-
tificationdocumentsatthehomeofoneofthecoconspirators.Theinsider 
wasconvicted,orderedtopay$200,000inrestitution,and  sentencedto 
18monthsofimprisonment.
Fraud Case 2
Theinsidermaintainedtheinformationintheconsumercreditdatabase 
ataconsumercreditreportorganization.Inexchangeformoneyfroman 
externalcollaborator,sheconspiredwithcoworkerstoartificiallyinflate 
thecreditscoresofspecificconsumerstoenablethemtosecureloansfrom 
creditinstitutionsandlenders.Overfourmonths,sheandherinternal 
conspiratorsmodifiedordeletedcredit-historydatafor178consumers. 
Thepurposewastostrengthentheircreditworthinessandcauselenders 
toissueloanstotheseconsumers.Shereceivedadvancepaymentforthe 
modificationandpassedthepaymentontocoworkerstomakethealter-
ationsinthedatabase.Shewasexperiencingfinancialdifficulties,which 
motivatedhertoparticipateinthescheme.Morethan$4millionofrisky 
loansresultedinthiscase.Itcosttheorganization$5,000torestorethe 
integrityoftheinformationinthedatabase,buttheorganizationalsohad 
topaymorethan$675,000tocreditors.Theinsiderwasarrested,convicted, 
orderedtopaya$3,000fine,andsentencedtofivemonthsofimprisonment 
followedbyfivemonthsofhomedetentionandthreeyearsofsupervised 
release.Shefullycooperatedwithauthorities,whichledtothesentencing 
ofhertwococonspirators.
ptg7481383
FraudCases 265
Fraud Case 3
Aforeign-currencytraderinafinancialinstitutionwasresponsiblefor 
collectingandtradingassetsfortheorganizationinordertogenerateprof-
its.Hisannualbonuswasafunctionofhowmuchprofitwasproduced 
fortheorganizationbyhistrades.However,hestartedlosingmoneyon 
trades.Fearingjob-relatedconsequences,heexecutedacomplexfraud 
schemethatinvolvedconvincingotheremployeesnottotrackhistradesor 
validatethem,exploitingthefactthattheorganizationdidnot recordtrad-
ingphonecalls,andusingremoteaccesstotheorganization’scomputing 
facilitiestocontinuethefraud.Theschemelastedfiveyears.Whileinitially 
mostofhisfraudoccurredatwork,heincreasinglyfounditeasiertocon-
ducthisillicitactivitiesfromhomeinthemiddleofthenightbecausehe 
didnothavetoworryaboutanyoneintheofficeorathomelookingover 
hisshoulder.
Atonepoint,theinsiderthreatenedtoquitwhenmanagersbecame 
suspiciousandpressedhimregardinghispractices.Aninternalaudit, 
combinedwithexternalobservation,detectedtheinsider’sillicitactivities, 
specificallylargetransactionshehadmade.Afterhisarrest,heclaimed 
tohavehaddifficultykeepingtheschemealive,andtohavedeveloped 
adrugabuseproblemalongtheway.Hesaidthatgrouptrading(trading 
byateamoftraders),ratherthanindividualtrading,canhelpmitigatean 
organization’srisks,becauseitiseasiertodetectillegalorsuspicioustrad-
ingpracticeswhentherearemultipleteammemberstradingfromthesame 
account.Hedidnotdirectlyprofitfromthescheme,butacquired$650,000 
inbonusesbymakingitappearthatthebankwasprofitinginsteadof 
losingvastsumsofmoney.Hewasconvicted,orderedtopay$700million 
inrestitution,andsentencedtomorethansevenyearsofimprisonment 
followedbyfiveyearsofprobation.Theinsiderwasrequiredtopaythe 
victimorganization$1,000amonthduringprobation.
Fraud Case 4
Asalesmanforaninformationanalysisproviderwasrecruitedbyan 
outsideremployedbyacompetingfirmtorelayhiscompany’sprivate 
communications.Theoutsidersenttheinsideranemailmessagecontain-
inganattachmentinfectedwithavirus.Theoutsiderofferedtheinsider 
$1,000foreachofthecompany’scomputershehelpedtoinfectwiththe 
virus.Theinsiderdeliberatelydouble-clickedontheinfectedattachment, 
andasaresultinstalledthemaliciousprogram,akeystrokelogger,onsev-
eralmachinesonhiscompany’snetwork.Overaperiodofthreeweeks, 
ptg7481383
Chapter8. CaseExamples
266
thekeystrokeloggerperiodicallysentconfidentialinformationtothe 
outsider,whousedittolurecustomersawayfromthevictimorganization. 
Theinsiderandaninternalaccomplicewereconvictedandordered topay 
$5,000inrestitution.
Fraud Case 5
Acomputerhelpdeskattendantemployedbyamilitarycontractor 
executedaschemewherebyhewouldfraudulentlyrequestreplacement
equipmentpartsfromasupplierandthensellthemforasmuchashecould 
get.Thesupplierwouldsendreplacementpartsexpectingthattherecalled
originalswouldbereturned.Heusedfakeemailaddresses,whichhecre-
atedonthemilitarysystemsforwhichhewasresponsible,torequestthe 
replacementparts.Heprovidedhishomeaddressfortheshipmentsinthe 
email.Theschemeworkedperfectlyand,ofcourse,theoriginalequipment 
wasneverreturnedtothesupplier.Over20months,hereceivedshipments 
of500productswitharetailvalueofmorethan$8million.Hesold90of 
thoseproductsthroughanInternetauctionsiteformorethan$500,000. 
Headmittedthatheneededmoneytocareforhiselderlyparents.He 
wasconvictedandorderedtopaymorethan$8millioninrestitution,and 
wassentencedtomorethanfouryearsinprisonfollowedbytwoyearsof 
supervisedrelease.
Fraud Case 6
Theprimaryresponsibilityoftheinsider,apolicecommunications 
operator,wastocommunicateinformationfordriver’slicenses,suchas 
licensevalidityandvehicleregistration,tolawenforcementofficersinthe 
field.Shewasrecruitedbyanoutsideacquaintanceand,formorethantwo 
andahalfyears,sheprovideddriver’slicenseinformationinreturnfor 
payment.Thefraudescalatedwhenshestartedusingotherfunctionsinthe 
systemtoissuefakedriver’slicensestopeoplewhowerenotabletoobtain 
legitimatelicenses.Fortunately,aconfidentialinformantledtoherarrest 
andconvictionforfraudulentlycreatingapproximately195illegaldriver’s 
licenses.Shewasconvictedandsentencedto37monthsinprison.
Fraud Case 7
Twotemporarydataentryclerksandonepermanentemployeeofan 
agriculturalproductsfirmmanipulateddatatofraudulentlyissuepay-
mentstotheirrelatives.Theemployeeswerepartofagroupthatopenly 
sharedtheirpasswordstoenhanceproductivity;itwas“moreefficient” 
ptg7481383
FraudCases 267
tosharepasswordstoovercomeseparationofdutiesconstraintsinthe 
systems.Overafive-monthperiod,clerkswereabletouseprivileged 
accountstosubvertthebusinessprocessgoverningvendorpayment. 
First,theyenteredvaliddataintothedatabaseusingtheirownaccounts. 
Thentheyusedtheprivilegedaccountsforwhichtheyhadbeengiventhe 
passwordtomodifythevendor’snameandaddresstothatofafriendor 
relative,issuedthecheckfromthesystem,andthenmodifiedthedataback 
totheoriginal,validvendorinformation.Thefraudwasdiscoveredwhen 
anaccountantinthegeneralledgerdepartmentnoticedthatthenumberof 
checksissuedwaslargerthannormalandfurtherinvestigationrevealed
theirregularitiesinthehandlingofthechecks.Themaliciousinsiderswere 
identifiedbythenamesoftheirrelativesontheaccount.Intheend,the 
insidersembezzledalmost$70,000.Theprimaryinsiderwasconvicted 
andsentencedtoeightmonthsofimprisonmentfollowedbythreeyearsof 
supervisedrelease,includingcommunityserviceandfines.
Fraud Case 8
Theinsidersupervisedindividualsprocessingasylumapplicationsforthe 
U.S.government.HefraudulentlyalteredU.S.immigrationasylumdeci-
sionsusinghisorganization’scomputersysteminreturnforpaymentsof 
uptoseveralthousanddollarspercase.Hewouldapproveanasylumdeci-
sionhimself,requestthatoneofhissubordinatesapprovethedecision,or 
overturnsomeoneelse’sdenialofanasylumapplication.Anoutsider,who 
waslikelyanon-U.S.native,recruitedtheforeignnationalswhowished 
toacquirepoliticalasylum.Toconcealhisactivity,theinsiderusedhis 
subordinates’computersandcredentials.Severalforeignnationalseither 
admittedinanintervieworpleadedguiltyinacourtoflawtolyingontheir 
asylumapplicationsandbribingpublicofficialstoapprovetheirapplica-
tions.Theinsiderreceived$50,000forgrantingpoliticalasylumfor20to30 
foreignnationals.Thefraudwasdetectedbythedirectoroftheinsider’s 
officeandwasreportedtolawenforcement.Theinsiderwasconvictedand 
sentencedto21monthsofimprisonment.
Fraud Case 9
Asupervisorinadepartmenthandlingdisabilityclaimsusedherown 
accounttomodifyclaimsanddirectmonthlydisabilitypaymentstoher 
fiancéoveralmosttwoyears.Theorganizationfailedtoupdateheraccess 
rightswhenshechangedpositions,enablinghertomodifydataandalso 
toapprovethechanges.Bothpositionsusedthesameapplicationbutdif-
ferentrolesforentering,approving,andauthorizingpaymentsformedical 
ptg7481383
Chapter8. CaseExamples
268
anddisabilityclaims.Whenshewaspromoted,shewasauthorizedforher 
newaccesslevel,butadministratorsneglectedtorescindherprioraccess 
level.Asaresult,sheendeduphavingfullaccesstotheapplication,with 
nooneelserequiredtoauthorizetransactions(payments)fromthesystem. 
Shealsorecruitedacoworkertoincreasethedisabilityratingonherfiancé’s 
claim,whichincreasedtheamountofthemonthlychecks.Thecoworker 
detectedtheincidentwhensherecognizedtheinsider’sfiancé’snameand 
reportedthathewasnotdisabled.Theinsiderwasconvicted,orderedto 
pay$615,000inrestitution,andsentencedto33monthsofimprisonment 
followedbytwoyearsofsupervisedreleaseand50hoursofcommunity 
service.
Fraud Case 10
Arequisitionofficerinacitywarehouseconvincedhissupervisorthat 
heneededprivilegedaccesstotheentirepurchasingsystem.Heusedhis 
legitimate,butexcessive,accessprivilegestomodifythecity’sdatabaseto 
addafakevendor,createpurchaserequisitions,andmodifytheinventory 
system.Overaperiodoftwoyears,heentered78purchaseordersforthe 
fakevendor,and,althoughnosupplieswereeverreceived,healsoautho-
rizedpaymenttothevendor.Hewasawareofapprovalprocedures,and 
allofhisfraudulentpurchasesfellbeneaththethresholdforindependent 
approval.Thebankaccountforthevendor,whichwascreditedmorethan 
$250,000aspartofthescheme,wasownedbytheinsider’swife.Thefraud 
wasaccidentallydetectedbyafinanceclerkwhonoticedirregularitiesin 
thepaperworkaccompanyingoneofthepurchaseorders.Theinsiderwas 
convicted,orderedtopaya$600fineand$10,000in restitution(theorgani-
zation’sinsurancedeductible),andsentencedtotwoconsecutivesentences 
of36monthsofimprisonmentfollowedbyfiveyearsofprobation.
Fraud Case 11
Acomputerinformationresourcemanagerinanorganizationthat  operated 
astatelotterymodifiedcomputerrecordsandfraudulentlyclaimedprizes 
forlotteryticketsfor18months.Tocarryoutthescam,hepurchaseda 
ticketasusual,andthenmodifiedittobeawinnerinthelotteryagency’s 
database.Hepurchasedregularinstantticketsbutphysicallydamaged 
themsothatretailershadtouseaspecialprogramtovalidatethemdirectly 
againstthecorruptedagencydatabase.Theincidentwasdetectedwhen 
asuspiciousretailermailedthemangledticketstoadistrictmanager, 
ptg7481383
MiscellaneousCases 269
whoconfirmedthattheywerenotwinners.Theinsiderwasnotinitially 
suspected,untilhestartedbehavingstrangely.Consequently,hewas 
placedonadministrativeleave.Beforeheleftonadministrativeleave,he 
deletedahistorylogthatmayhavecontainedevidenceofhiscriminalact. 
Healsoinstructedoneofhissubordinatestoreformatthebackuptapes, 
claimingthattheywouldn’tbeusefulunderanewbackupdataformatthat 
wasbeingimplemented.Thesubordinatecompliedwiththisrequestand 
theorganizationlostmuchoftheevidenceofhistamperingwithsystem 
securitycontrols.Hefraudulentlywonalmost$63,000fromthestatelot-
terysystem(heused141ticketsandclaimedprizesfor126ofthem).He 
wasconvicted,orderedtopaythe$63,000restitution,fined$25,000,and 
sentencedto60daysinjailandthreeyearsofprobation.
Fraud Case 12
Theprimaryinsiderwasasubcontractorworkingforanorganizationthat 
handledstategovernmentemployeehealthinsuranceclaims.Usingthe 
medicalidentitynumberofanunsuspectingpsychologist,shechanged 
thenameandaddressassociatedwiththepsychologisttoaninternal 
accomplice’snameandaddress.Overtwoandahalfmonths,shefiled 
40fakeclaimsandsentthepaymentstothebogusmedicalproviderand 
address.Oneofherinternalaccomplicesgrantedhertheincreasedaccess 
sheneededtoperpetratethefraud.Anotheraccomplicewasresponsible
forcashingthechecksanddistributingthemoney.Auditorsdiscoveredthe 
schemewhentheybeganquestioningwhyapsychologistwassubmitting 
paymentclaimsfortreatingbrokenbonesandopenwounds,andadmin-
isteringchemotherapy.Theyalsonoticedthatthenameassociatedwith 
thepsychologistwasthenameofoneoftheirsubcontractors.Duringthe 
investigationitwasdeterminedthattheprimaryinsiderhadacriminalhis-
toryforfraud.Shewasarrestedonaseparatefraudchargeandaccepted 
apleabargainafteroneofheraccomplicesnamedherastheringleaderof 
theincident.
Miscellaneous Cases
Table8-5providesanindexofmiscellaneouscasesintheCERTinsider 
threatdatabase.
ptg7481383
Chapter8. CaseExamples
270
Table 8-5 MiscellaneousCases
Case #
Industry or Government
Sector Description
1 Banking and finance Former employee eavesdrops” on
executives emails regarding pending
employee terminations three years
following termination
2 Education Student gains access to his
professor’s university and personal
account and changes his grade
3 Education Student installs malicious program
that steals personal information for
37,000 students
4 Government Contractor “breaks” 40 organiza-
tion passwords in order to prove his
complaints about lack of security
5 Information
technology
Millions of customer records
are compromised by a system
administrator at a trusted business
partner’s trusted business partner
6 Information
technology
System administrator’s customized
login software catches former
employee’s unauthorized access
Miscellaneous Case 1
Thevicepresidentoftechnologyatafinancemarketinformationpublisher
wasdismissedafterfiveyearsduetoadisagreementwiththeorganization.
Heoversawthecompany’scomputernetworkandinternalemailsystem.
Threeyearsaftertermination,hewentbackintohisformercompany’s
emailsystemtoeavesdropontopexecutives’emailsaboutemployees’job
status.Hespiedonemailtrafficfromhishomeoverafive-monthperiod,
curiousaboutwhichemployeeswerebeingterminated.Heintercepted
theemailsofthehumanresourcesdirectorandhigh-levelexecutivesthat
discussedemployees’termination.Henotifiedthoseemployeesoftheir
possibletermination.Theemployeeswhoreceivedtheemail  warning
notifiedtheirsupervisors,whoinitiatedaninvestigation.Thevictim
前雇员在被解雇
后窃听管理层邮
件三年,主要是
与雇员解雇相关
的邮件
合同方破解了
40个组织密码
以证明其缺乏
安全的投诉的
合理性
因与组织
意见不
同,攻击
者被开除
后三年,
窃听组织
人力资源
部与领导
层的邮件
往来,发
现其中可
能要解雇
的员工信
息,并发
邮件警告
该员工。
被警告的
员工报告
了监管
者,通过
雅虎的远
程日志与
ISP的记录
最终确定
了攻击
者。
ptg7481383
MiscellaneousCases 271
organizationspentmorethan$100,000investigatingthecase.Remote
accesslogfilesaswellasrecordsfromYahooandtheinsider’sISPcon-
nectedhimtothecrime.Theinsiderwasconvicted,sentencedtooneyear
ofprobationwithsixmonthsofhousearrest,andorderedtopay$30,000in
restitutionanda$2,000fine.
Miscellaneous Case 2
Auniversitystudentusedseveralmethodsforgainingaccessto 
unauthorizedauthenticationcredentialsforoneofhisprofessorsover 
aperiodofabouttwomonths.First,hedecryptedthepasswordfileona 
departmentalcomputersystemandobtainedthepasswordforhispro-
fessor’saccount.Usingthatpassword,hewasabletogainaccesstothe 
professor’spersonalaccountonYahoo.com.Thestudentalsowroteand 
installedaprogramintheprofessor’scomputeraccountthatwouldrun
whenheloggedin,capturinghisuserIDandpasswordfortheuniversity’s 
administrativecomputersystem.Thestudentobtainedpersonalinforma-
tion,includinggrades,regardingotherstudentsandtriedtochangehis 
gradefortheclasshetookwiththeprofessor.Fortunately,thegradefile 
thathemodifiedwasabackupfile;theprofessorstoredfinalgradeson 
hispersonallaptop.Universityofficialsstartedaninvestigationwhenthe 
professorreceivedanemailthathisaccounthadbeencompromised.The 
insidereventuallyconfessedtouniversityofficials,andwassubsequently 
convictedandsentencedtofourmonthsofimprisonment.
Miscellaneous Case 3
Acomputersciencemajoratauniversitywroteamaliciousprogram 
toaccessadatabaseonaserverthatwasusedasaportalforenrollment 
services.Theattackallowedthestudenttosteal8,000namesandSocial 
Securitynumbersalongwith37,000personalrecords.Theuniversitywas 
alertedofproblemswhen,onseveraloccasions,themaliciousprogram 
inadvertentlyshutdowntheuniversityserver.Theinsiderwasconvicted, 
orderedtopay$170,000inrestitution,andsentencedtoprobationwith 
communityservice.
Miscellaneous Case 4
Adisgruntledsoftwaredevelopercomplainedaboutthelackofsecurity 
inthesystemsoftheorganizationwithwhichhewascontractedtopro-
videservices.Whenhiscomplaintswentunresolved,hedownloadedthe 
passwordfilefromoneoftheorganization’sUNIXserverstohisdesktop. 
大学学生
为了修改
自己的课
程分数,
想办法获
取了课程
教授的访
问权限,
偷偷修改
分数,虽
然最后修
改的是备
份数据,
但是也是
一次内部
威胁。
ptg7481383
Chapter8. CaseExamples
272
Next,hedownloadedapasswordcrackerfromtheInternetandproceeded 
to“break”approximatelyfortypasswords,includingtherootpassword. 
Fortunately,hedidnodamage,buthedidaccesspartsoftheorganization’s 
networkforwhichhewasnotauthorized.Theinsiderwasdiscoveredwhen 
hebraggedtothesystemadministratorthatheknewtherootpassword. 
Theinsiderwasconvicted,orderedtopaya$5,000fine,andsentencedto 
probationandcommunityservice.
Miscellaneous Case 5
Asystemadministratorwasemployedbyamarketingfirmthatwas
contractedbyanotherorganization,oneoftheworld’slargestprocessors
ofconsumerdata.Asaresultofthecontractualrelationship,hewasgiven
accesstothecontractingorganization’sFTPserversothathecouldperi-
odicallydownloadsanitized,aggregatedinformationfromtheconsumer
dataorganization’scustomers.Thecustomersincludedbanks,credit
cardcompanies,andphonecompanies.Hefoundseveralunprotected
filesontheFTPservercontainingencryptedpasswordsfortheoriginal
customerdatabases.Heusedapassword-crackingprogramtodiscover
thepasswordstothecustomerdatabasesbelongingtotheconsumerdata
organization’scustomers(approximately200largecompanies).Hepro-
ceededtocopythepersonaldataformillionsofAmericanstodozensof
CDs.HebraggedinonlineIRCchannelsabouthisaccesstoconfidential
andpersonaldata,andwasaskedatonepointbyanotherindividualin
thechatroomtoprovidedataonanFBIagentwhowasactivelyinvesti-
gatinghim.Heprovidedtheinformationwithinminutes.Theongoing
FBIinvestigationofthatindividualledbacktotheinsider,whowasfound
withdozensofCDsandothermediacontainingmillionsofcustomer
recordsinhisapartment.Therewasnoevidenceofbroad-scaledistribu-
tionofthedata;ratherheappearedtobestealingtheinformationtobrag
aboutitinIRCchatrooms.Theinsiderwasconvicted,orderedtopay
$2.7millioninrestitution,andsentencedto45monthsofimprisonment
followedbyaperiodofsupervisedrelease.
Miscellaneous Case 6
Theinsiderwasformerlyemployedasacontractsoftwaredeveloperand 
testerbyatelecommunicationsorganization.Hewasterminatedforpoor 
performanceandwassubsequentlyemployedbyasubsidiaryoftheorga-
nization.Overaperiodofaboutamonth,heaccessedupto16ofhisformer 
employer’ssystemsonadailybasisduringworkhours.Theinsidergained 
accesstoatleast24useraccounts,readelectronicmail,reviewedsourcecode 
ptg7481383
Summary 273
forhispreviousproject,anddeletedtwosoftware  modificationnoticesfor 
theproject.Theactivitywasdetectedwhenasystem  administratorlogged 
inonemorningandwasnotifiedbyhercustom-writtenloginsoftwarethat 
herlastloginwasonehourearlier.Thissetoffimmediatealarms,asshe 
hadinfactnotloggedinforseveraldays.Shehadpreviouslytakensteps 
toredirect loggingofactionsbyheraccounttoauniquefileratherthanthe 
standardshellhistoryfile.Therefore,shewasabletotracetheintruder’s 
stepsandsawthattheintruderhadreadanotheremployee’semailusing 
heraccount,andthendeletedthestandardhistoryfileforheraccountso 
thattherewouldbenologofhisactions.Theloginwastracedtoa  computer 
atthecompanysubsidiary.Theinsiderwasconvictedandsentenced 
totwoconcurrenttermsofprobation,aswellasunspecifiedfinesand 
penalties.
Summary
ThischapterpresentedavarietyofcasesfromtheCERTinsiderthreat 
database.Wechosecasesthatexhibiteddifferentcharacteristicsandfrom 
whichdifferentlessonscanbelearned.Youmaywishtoreferbacktothis 
chapterperiodicallytotestyourownorganization’scountermeasures 
againstthesecasesbyaskingthequestion:Couldthishappentous?
ptg7481383
This page intentionally left blank
ptg7481383
275
Chapter  9
Conclusionand 
MiscellaneousIssues
Thischapterwrapsupthebookbycoveringtwomiscellaneousissuesthat 
wementionedbrieflybutdidnotcoverindetailearlier:insiderthreatsfrom 
trustedbusinesspartners,andmaliciousinsiderswithtiestotheInternet 
underground.Weconcludewithafinalsummary,whichcouldserveasa 
handyreferenceshouldyouneeda“cheatsheet”forfuture  discussionson 
insiderthreat.
Insider Threat from Trusted Business Partners
Trusted bu si ne ss p ar tn er ( TB P) :anyexternalorganizationorindividual 
anorganizationhascontractedtoperformaservicefortheorganization. 
ThenatureofthisservicerequirestheorganizationtoprovidetheTBP
authorizedaccesstoproprietarydata,criticalfiles,and/orinternalinfra-
structure.Forexample,ifanorganizationcontractswithacompanyto 
performbillingservices,itwouldhavetoprovideaccesstoitscustomer 
data,therebyestablishingatrustedbusinesspartnership.However,the 
TBPconceptdoesnotincludecasesinwhichtheorganizationissimplya 
customerofanothercompany.Forexample,whenanorganizationusesa 
bank,itissimplyaclientofthebank.Thiscustomer–vendorrelationship
wouldnotbeconsideredaTBPrelationship.
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
276
Trustedbusinesspartnerscanbeindividualsorotherorganizations.1For 
example,whenanorganizationoutsourcesitscustomerhelpdesksup-
portservicetoanoutsidecompanyitentersintoaTBPrelationshipwith 
thatcompany.Inthiscase,theorganizationmustgrantaccesstoitscus-
tomerdatabasetotheoutsidecompany.Ontheotherhand,TBPsalso 
includeindividualconsultants,temporaryemployees,andcontractors, 
includinganyformeremployeesoftheorganizationwhoarethenhiredas 
consultantsorcontractors.
UseofTBPsiscommonintoday’sbusinessenvironmentforweathering 
theupsanddownsoftheeconomywithoutimpactingthepermanent 
workforce,andmaximizingprofitsbyoutsourcingappropriatefunc-
tions.Thatiswhyitisimportantthatyoureadthissectionandcarefully 
considerthepotentialinsiderthreatriskposedbythosecontractorsand 
businesspartnersthatyouprovideauthorizedaccesstoforyoursystems, 
information,andnetworks.
AfewexamplesofeachtypeofTBPfollow,inordertohelpyouto 
understandthedifference.First,wepresentafewexamplesoforganiza-
tionalTBPrelationships.Thefirstexampleisespeciallyimportantasitisan 
insiderthreatfromanITservicesprovider—anemergingthreatintoday’s 
cloudcomputingenvironment.
Acompany—theTBP—providedITandinformationsecuritysolutionsfor 
itscustomers.Oneofitsemployeeswasaninformationsecurity  analyst 
whousedhisaccesstothecustomers’networkstosteal637,000creditcard 
numbers.HethenadvertisedthestolendataforsaleonanInternetsite 
usedformarketingstolencreditcardinformation.Fortunately,hesoldthe 
majorityofthecreditcardnumberstotwoundercoverinvestigators;only 
318creditcardnumbersweresoldtoindividualsthatwantedtoperpetrate 
creditcardfraud.Theinsiderwasarrestedandsentencedto50monthsof 
imprisonment.
Afinancialinstitutionwashavingproblemswithitscomputersystem,so 
itcontractedwithacompanytorepairit—theTBP—andsuppliedtheTBP 
withpasswordsforitssystems.Thesepasswordsalsoprovidedaccessto 
othercriticaltransactionsystems.Oneoftheemployeesatthecontracted 
organizationwashavingfinancialdifficulties,andabusedhisaccessto 
thefinancialinstitution’ssystemstoinitiatefraudulenttransactions.He 
accessedtheAutomatedClearingHouse(ACH)systemandperformed 
unauthorizedtransactions.Hethenusedthemoneyreceivedfromthe 
1.  MaterialfromthissectionincludesportionsfromajointCyLabandCERTProgramarticletitled 
SpotlightOn:InsiderThreatfromTrustedBusinessPartners,”authoredbyRobertWeiland,Andrew 
Moore,DawnCappelli,RandyTrzeciak,andDerrickSpooner[Weiland2010].
ptg7481383
InsiderThreatfromTrustedBusinessPartners 277
falsifiedtransactionstopayforconstructionprojectsonhisproperties, 
twomortgages,carloans,overseasvacations,andotherdebts.Themoney 
wastransferredtohispersonalaccounts,hiswife’saccounts,andhis 
business’saccounts.Cashier’scheckswerealsopurchasedwithfraudu-
lentfunds.Thefraudwasdetectedandreportedbytheinsider’sbusiness 
partnerattheTBPwhenhenoticedlargedepositstothebusinessaccount. 
Hecontactedthevictimorganization,whichthenconductedaninvestiga-
tionusingACHdataandsystemlogs.Thevictimorganizationstatedthat 
thefraudwouldhavelikelygoneundetectedhaditnotbeenreportedby 
theTBPitself.Theinsiderwassentencedtofiveyearsinprisonandfive 
yearsofsupervisedrelease,andhadtorepaymorethan$1.8millionin 
restitution.
Nextaretwoexamplesofindividualswhoweretrustedbusinesspartners 
ofthevictimorganization.
Acontractor—theTBP—wasformerlyemployedasahelpdeskand 
networktechnicianbythevictimorganization.Whileworkingforthe 
company,hehadsystemadministratorandremoteaccesstothenetwork, 
inordertoperformmaintenanceandtotroubleshootproblemsfrom 
home.Hewasatemporaryemployeehopingtobehiredintotheorganiza-
tionfull-time,buthisapplicationforfull-timeemploymentwasrejected
becausehehadreceivedapoorperformancereviewfromhissupervisor, 
whocharacterizedhimasvolatile,angry,inflexible,andnotateamplayer. 
Theinsider,whowastryingtogainfullcustodyofhisdaughter,alsohad 
financialissues.Duetocutbacksattheorganizationandrulessurrounding 
temporaryemployment,hewasinformedthathisemploymentwouldbe 
terminatedintwomonths.Afterlearningofhispendingtermination,he 
wroteseveralemailstotheorganization’shumanresourcesdepartment, 
threateningtosuetheorganizationforunfairlaborpractices.Asaresult
oftheemails,hewasimmediatelyterminated.Heusedbackdoorshehad 
previouslycreatedtoaccesstheorganization’snetworkandremoved
accesstosystems,changedadministrativepasswords,deletedsystem 
eventlogging,andmodifiedaccountsassociatedwithindividualswho 
wereinvolvedwithhistermination.Theinsider’sactionswerediscovered 
thefollowingdaywhenemployeescouldnotaccessthesystem.Fortu-
nately,theinsiderhadfailedtodeleteallofthelogsthatconnectedhimto 
theincident.Headmittedresponsibilityfortheincident,  acknowledged 
thathemadeamistake,andwantedtohelpminimizedamages.
Acontractorwasemployedasaprocesscontrolsengineerbyamanu-
facturingorganization.Hebecameangrywithhissupervisorandfeared 
thathisjobwasinjeopardy,sohedisclosedtheorganization’stechnical 
drawingstoanotherorganizationviaemailandfaxoverthecourseofone 
month.Theinsiderwasarrested,convicted,orderedtopay$1.3millionin 
restitution,andsentencedto27monthsinprison.
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
278
Overview of Insider Threats from Trusted Business Partners
AccordingtoarecentstudybythesecuritycompaniesRSAandInteractive
DataCorporation(IDC),whichsurveyedC-levelexecutives,“Contractors
andtemporarystaffrepresentthegreatestinternalrisk[to]organizations.”2
Thepurposeofthissectionistoraiseawarenesstothethreatfromtrusted
businesspartners;however,itisworthnotingthatcontractorsaccountforless
than10%ofthecasesintheCERTdatabase.Wearenotsayingthatyoushould
notbeconcernedaboutcontractors;onthecontrary,weadviseyoutoconsider
insiderthreatriskfromallindividualsandorganizationsthathaveautho-
rizedaccesstoyoursystems,networks,andinformation.Itisconcerningthat
C-levelexecutivesdonotrecognizetheriskposedbytheirownemployees.
Table9-1showsthebreakdownofTBPcasesbysector,includingthe 
percentagesofallindividualaswellasorganizationalTBPcases.
Table 9-1 BreakdownofTr ustedBusinessPartnerCases
Sector
Percentage of All
Individual TBP Cases
Percentage of All
Organizational TBP
Cases
Banking and finance 11% 13%
Commercial facilities 11% 6%
Defense industrial
base
3% 9%
Education 6% 3%
Energy 3% 3%
Food 3% —
Government 19% 22%
IT 33% 19%
Manufacturing — 3%
Not a member of a
critical sector
— 6%
Public health 11% 13%
Water — 3%
2.  Seewww.rsa.com/solutions/business/insider_risk/wp/10388_219105.pdf.
ptg7481383
InsiderThreatfromTrustedBusinessPartners 279
Table 9-2 BreakdownofTr ustedBusinessPartnerCasesbyTypeofCrime
Type of Crime Percentage
Fraud 26%
IT sabotage 41%
Theft of IP 20%
Miscellaneous 14%
WewillleaveittoeachsectortointerprettheinformationinTable9-1. 
However,wedorecommendthatthesectorswiththehighestpercentages 
seriouslyconsidertheirbusinessprocessesandtechnicalmeasuresfor 
contractorsand/ortrustedbusinesspartners.
Table9-2showsthebreakdownofTBPcasesbytypeofcrime.Itis 
importantthatyouunderstandthemeaningofthistableinyourstrategy 
for  mitigatinginsiderthreatsfromTBPs.
Fraud Committed by Trusted Business Partners
YouareatriskoffraudcommittedbyTBPswhenyouhirecontractors 
forpositionsrequiringaccesstoPersonallyIdentifiableInformation(PII), 
sensitivecustomerinformation,orfinancialinformation.Likewise,ifyou 
outsourcebusinessfunctionsrequiringthatlevelofaccess,youputyour-
selfatriskofinsiderfraud.Inaddition,anysystemsthatmanipulate 
sensitiveinformationprovideanopportunityforTBPs—contractorsor 
employeesatoutsourcedoperations—toacceptpaymentsfromoutsiders 
forillicittransactions.Insummary,youneedtoconsidereverythingyou 
readinChapter4,InsiderFraud,whenyouhirecontractorsoroutsource 
applicable  businessfunctions.
Forexample,considerthefollowingcase:
Aclaimsprocessoratacompanycontractedbyaninsurancecompanyused 
authorizedaccesstodivertmillionsofdollarsthroughfalsified  insurance 
claimstoapersonaladdress.Theinsidergotawaywiththecrimebecause 
therewasnosysteminplacetodouble-checktheeditedclaims.
ThiscaseisverysimilartothetypesofcaseswediscussedinChapter4.The 
onlydifferenceisthattheinsiderworkedforatrustedbusinesspartner, 
ratherthanatthevictimorganization.Notehowthissituationcompli-
catesthemitigationstrategyforthistypeofcase!Ifthevictimorganization 
performedthisfunctionin-house,itcoulddesignitsbusinessprocess 
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
280
tomitigatethisthreat,andimplementauditingcontrolstodetectany 
malfeasance.Sincethisfunctionwasoutsourced,thevictim  organization 
couldconsiderseveralcountermeasures.
ReviewtheTBP’sbusinessprocess.
Implementseparationofdutiesbyonlyoutsourcingthedataentry 
process,retainingtheapprovalprocessin-house.
PerformauditingfunctionsagainsttheTBP’sdata.
Thebottomlineisthatwhileitmightappearthatoutsourcingbusiness 
functionswillresultincostsavings,besuretofactorintheinsiderthreat 
riskfromyournew“insiders”attheTBPbeforemakingyourfinal  decision.
IT Sabotage Committed by Trusted Business Partners
RecallfromChapter2,InsiderITSabotage,thatthiscrimeiscommittedby 
technicallyprivilegeduserswhoseekrevengefornegativework-related 
events;thecrimeoftenissetuppriortotermination,butcarriedoutfol-
lowingtermination.YouareatriskofinsiderITsabotagebycontractors 
whoareonyourITstafforthosehiredascontractprogrammers.Inaddi-
tion,ifyousubcontractwithafirmforanytypeofITsupportorservices, 
youareexposingyourselftoinsiderthreatsfromthefirm’sstaff.Thisis 
particularlyimportantinacloudtypeofenvironment.
Considerthefollowingcase:
AcontractorwasemployedasaprogrammerandUNIXengineerbythe 
victimorganization,amortgagecompany.Theorganizationnotifiedthe 
insiderthathiscontractwouldbeterminatedforascripterrorhehadmade 
earlierinthemonth,buttheinsiderwaspermittedtofinishoutthedayat 
work.Subsequently,heplantedalogicbombinascriptthatwouldhave 
disabledmonitoringalertsandlogins,deletedtherootpasswordsfor4,000 
oftheorganization’sservers,anderasedalldata,includingbackupdata, 
onthoseserversbyoverwritingitwithzeros.Thescriptwasdesignedto 
remaindormantforthreemonthsandtogreetadministratorswithalogin 
messagethatread,“servergraveyard.”Fivedayslater,anotherengineer 
attheorganizationdetectedthemaliciouscode.Theinsiderwassubse-
quentlyarrested,butdetailsregardingtheverdictwereunavailableatthe 
timeofthiswriting.3
ThiscaseisverysimilartotheITsabotagecasesdescribedinChapter2.In 
fact,themitigationstrategiesdescribedinthatchapterapplyequallywell 
3.  Becausenoverdictwasknown,theinsider’sactionsdescribedinthiscasearealleged.
ptg7481383
InsiderThreatfromTrustedBusinessPartners 281
tobothcontractorsandemployees.Forexample,theorganizationshould 
nothaveallowedtheinsidertoaccessthenetworkafterbeingfired.Italso 
couldhaveimposedtargetedmonitoringoftheinsider’sonlineactivities 
onceitdetermineditwasgoingtofirehim.Itisunclearhowtheorganiza-
tiondetectedthelogicbomb,soitisactuallyquitepossiblethatitmight 
havehadcountermeasuresliketheseinplace,whichiswhyitwasableto 
detectthelogicbombandpreventitsdestructiveeffects.
Inourinsiderthreatassessments,wefindthatcontractorsaretypicallynot 
handledwithnearlyasmuchcareintheterminationprocessaspermanent 
employees.Afterall,areasonwhymanyofyouhirecontractorsistoavoid 
dealingwithalloftheemployeeissues,right?However,contractorshave 
feelings,too!AndasweseeintheseTBPcases,theyhavetheabilityand 
havebeenknowntoretaliateagainstwhattheyperceiveasunfairnessjust 
likepermanentemployeeshave.Therefore,youneedtoconsiderallofthe 
issuesdiscussedinChapter2forcontractorsaswellasemployees.
Theft of Intellectual Property Committed by Trusted Business
Partners
InChapter3,InsiderTheftofIntellectualProperty,wenotedthatIPis 
usuallystolenbyscientists,engineers,programmers,andsalespeoplewho 
useauthorizedaccesstostealinformationastheywalkoutthedoor.The 
sametypeofpatternappliestocontractorshiredinthosetypesofposi-
tions,aswellassubcontractorshiredforthosetypesofwork.Considerthe 
followingcase:
Twoengineersworkedataninternationalmanufacturingcompanywith 
locationsintheUnitedStatesandChina,amongothercountries.The 
companymanufacturedequipmentforthevictimorganization,andalso 
hadacontractwithaChinesecompanytomanufactureanewpieceof 
equipmentthatitwasstrugglingtodesign.Thevictimorganizationhad 
itsowntrade-secretversionoftheequipmentthattheinsiders’organiza-
tionneededtodesigntofulfillthecontractwiththeChinesecompany.The 
insidersscheduledavisittothevictim’smanufacturingplantunderthe 
pretenseofinspectingtheirownequipmentforpotentialrepairs.Thevic-
tim’splanthadrestrictedaccessbehindseveralsecuredoors,andsigns 
statingthatcameraswereprohibited.Visitorswererequiredtosigninand 
out,andbeescortedatalltimes.Thevictimorganizationalsoaskedvisi-
torstosignanondisclosureagreement;however,theinsidersfalselystated 
thattheyhadalreadysignedonethepreviousyear.Whileoneinsider 
keptalookout,theotherinsiderproceededtotakeseveralpicturesofthe 
trade-secretequipmentwiththecameraonhiscellphone.Aftertheyleft 
thevictim’sfacility,oneinsiderdownloadedtheimagesfromhiscamera 
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
282
andemailedthemfromhispersonalaccounttohisworkemail.Later,he 
proceededtosendtheimagesfromhisworkaccounttoothercoworkersin 
anotherplantwhoweretaskedwithactuallymanufacturingtheirversion 
ofthetrade-secretequipmentfortheChinesecompany.
ThiscaseissomewhatsimilartothecasesrelatedinChapter3.The  insiders 
usedauthorizedaccesstostealthetradesecretsfromtheirclient.Thecoun-
termeasuresdescribedinChapter3applyhereaswell:Itisimportantto 
identifyyourmostvaluableIP,andtargetyourcountermeasuresonpro-
tectingit.Youcan’tpossiblywatcheverythingeveryonedoesonadaily 
basis;therefore,youneedtofocusyourattentiononwhat’smostimpor-
tant.Inthiscase,theorganizationobviouslyhadextensivecontrolsfor 
protectingitstradesecrets;however,itdidnotrecognizethethreatposed 
byitsTBPs,andallowedthemtoaccesstheareaunescorted,eventhough 
allvisitorshadtobeescortedatalltimes.
Open Your Mind: Who Are Your Trusted Business Partners?
Bynowyouprobablyunderstandthatyouneedtoincludecontractorsand 
companiesyoudobusinesswithwhendesigningcountermeasuresfor 
insiderthreatrisk.Butbeforeyoustopreading,areyousureyouhaven’t 
forgottenanyone?Isthereanyoneelseyouprovideauthorizedaccessto 
yoursystems,information,ornetwork?
Thereasonweaskisbecausewehavetwocasesinvolvingadifferenttype 
oftrustedbusinesspartner:prisoners.Thisisaperfectexampleofhowyou 
havetoopenyourmindtotheexpandingcomplexityofinsiderthreatfor 
yourorganization.
Aninmateataprisonwasincarceratedbecausehewaspreviously
involvedinahackingandphishingscamandhadalsoengagedin
creditcardfraud.Theprisonaskedhimtowriteaprogramandcreate
aninternal,closednetworktelevisionstation.Theinmatewasleftunsu-
pervisedandalteredthesystempasswordsandlockedeveryoneoutof
theprison’snetwork.Theprisonhiredexternalconsultantstorepairthe
damage,andtheinmatewasputintosegregationaspunishment.Itis
unknownwhetherchargeswerefiledagainsttheinmateinrelationto
theincident.
Thiscaseclearlyillustratesanewangleoninsiderthreats!InChapter6, 
BestPracticesforthePreventionandDetectionofInsiderThreats,we 
indicatedthatyoushouldconsidertheincreasedriskthatisposedby 
potentialemployeeswithacriminalhistory.Providingauthorizedaccessto 
a  convictedhackerobviouslyposesadditionalriskofinsiderthreat.
ptg7481383
InsiderThreatfromTrustedBusinessPartners 283
Thenextcasealsoinvolvesaprisoner,butnotonewithknownhackingskills.
Aninmateataprisonwasservingtimeforpossessionofchild 
pornography.Theprisonpermittedinmatestousecomputersforlegal 
research.  Computersusedbytheinmatescouldaccessonlyalegal 
researchprogram,whichwasupdatedthroughCD-ROMs.Thecomputer 
accessedbytheinmatewasathin client,meaningthatitdidnotrunpro-
gramsorstoredataitself,butaccessedthoseprogramsanddataovera 
networkfromacentrallegalresearchcomputerserverthatwasstored 
inanotherpartoftheprison.Thecomputeraccessedbytheinmatewas 
connectedthroughtheprison’snetworktotheInternetsolelysothatit 
couldobtainupdatesfortheoperatingsystem.Theinmatediscoveredand 
exploitedanidiosyncrasyinthelegalresearchsoftware,andwasableto 
obtaintheusernameandpasswordtoacriticalmanagementprogram.He 
unsuccessfullyattemptedtologintothatprogramandalsounsuccess-
fullyattemptedtosendtwoemailsoutsideoftheprison.Healsousedthe 
Internettodownloadtwoshortvideofiles,photographsoftwoprison 
employeesandtwofellowinmates,andapubliclyavailableaerialshot 
oftheprisonitself.Theinmatewasalsoabletoconfiguretheprison’snet-
worktoprovidehimselfandotherinmatesaccesstoadditionalprograms 
andcomputerfilesfromtheprison’snetworkandtoobtainPIIfor1,100 
currentandformerprisonemployees.Theincidentwasdiscoveredwhen 
prisonpersonnelfoundapieceofpapercontainingtheusernameand 
passwordfortheprison’smanagementcomputerprogram.Theduration 
oftheincidentwasfivemonths.Theinmatewasconvictedandsentenced 
toanadditional18monthsofimprisonmentfollowedbythreeyearsof 
supervisedrelease.
Thiscasedidnotinvolvean“insider”withknowntechnicalskills,butit 
certainlyreinforcesthenotionthatyouneedtoidentifypotentialinsider 
threatriskandimposecontrolsaccordingly.
Recommendations for Mitigation and Detection
Thissectionsummarizesasetofrecommendationsfororganizations 
concernedaboutmaliciousactsbytrustedbusinesspartners.
Recommendation 1: Understand the policies and procedures of the
trusted business partner.
Youestablishpoliciesandprocedurestoprotectyourownsys-
tems,information,andnetwork.Whenyouconsiderenlisting
thesupportofatrustedbusinesspartner,youshouldensure
thattheTBP’spoliciesandproceduresareatleastaseffectiveas
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
284
your  safeguards.Thisincludesphysicalsecurity,staffeducation,
personnel  backgroundchecks,  securityprocedures,termination,and
other  safeguards.
Recommendation 2: Monitor intellectual property to which access is
provided.
Whenyouestablishanagreementwithatrustedbusinesspartner,you 
alsoneedassurancethattheintellectualpropertyyouprovideaccessto 
isprotected.Youneedtogetassurancesthataccesstoanddistribution 
ofyourdataismonitored.Youshouldverifytherearemechanismsfor 
loggingthedisseminationofyourdata.Youshouldalsobeawareof 
proceduresthatthetrustedbusinesspartnerhastoinvestigatepossible 
disclosureofyourinformation.
Recommendation 3: Maintain access rights management.
When  contractingwithatrustedbusinesspartnertohandlesensitive 
data,itisimportantforyoutoknowhowdataisgoingtobemanaged. 
Inanumberofcases,thetrustedbusinesspartnercouldnothandlethe 
fullworkloadittookonandsubcontractedtoanotherorganizationor 
broughtintemporaryemployeesinordertobeabletoprocessthejob. 
Youshouldbeawareofthesearrangementsandensurethedatawillbe 
handledbymeansacceptabletoyou.
Recommendation 4: Understand the personnel policies and procedures
of the trusted business partner.
Whencontractingwithatrustedbusinesspartner,youshouldinsist 
thatthepartnerorganization’semployeesareinvestigatedandcleared 
tohandledatainwayssimilartoyourownemployees.Inafewcases, 
thetrustedbusinesspartneremployedworkerswithcriminalback-
groundsorconnectionstotheInternetunderground.Youshouldnot 
compromiseyoursecurityrequirementsinordertohaveajobaccom-
plishedfaster.
Recommendation 5: Anticipate and manage negative workplace issues.
Whenyoudecidetohireconsultants,contractors,ortemporary
employees,theyshouldbemadeawareofyourpoliciesandprac-
ticesforacceptableworkbehavior.Negativeworkplaceissueshave
beenknowntotriggerillicitinsideractivity;itisimportantthatpoli-
ciesandproceduresformanagingsucheventsconsiderpermanent
employees,contractors,consultants,andtemporaryemployees.Itis
alsoimportantthatyoudonotprovidefalsehopefortheseemploy-
eesregardinglikelihoodofbeinghired.Ifyouindicateyoumight
hireacontractororconsultantfull-timebutthendecidenottodoso,
ptg7481383
InsiderThreatfromTrustedBusinessPartners 285
youshouldperformanassessmentoftheindividual’sinsiderrisk.
Youshouldremovetheindividual’saccessandchangeanyshared
accountsthataccesswasprovidedinordertomitigateriskswhen
theindividualisinformedheorshewillnotbehired.Ithasproven
riskytoretaintheservicesof  disappointedordisgruntledtemporary
workers.
Recommendation 6: Deactivate access following termination.
Whenanemployee,consultant,orcontractoristerminatedorsus-
pended,allaccessthatthepersonhadshouldbedisabled.Whenyou
are  drawingupanagreementwithatrustedbusinesspartner,you
shouldmakecertainthetrustedbusinesspartnerperformsrigor-
ousterminationproceduresaswell.Inanumberofcasesinvolving
contractors,accesswasnotdisabledimmediatelyaftertermination
andtheinsiderwasabletoexploitthataccessinthecommissionof
hiscrime.
Recommendation 7: Enforce separation of duties.
Anumberofinsidersexploitedthefactthatcertainactionscouldbe 
performedinsuchawaythatcircumventednormalseparationof 
dutiescontrols.Businessprocessesshouldenforceseparationofduties, 
regardlessofthespeedorpriorityrequired.Whiledifferentlevelsof 
controlsmaybeassociatedwithdifferentprioritytasks,noprocesses 
shouldbeleftwithout  protectionsagainstpossibleexploitationbya 
disgruntledorgreedyinsider.
Recommendation 8: Create clear contractual agreements that specifi-
cally state that the TBP is also responsible for protecting organizational
resources.
Contractswithatrustedbusinesspartnershouldincluderestrictions
onhowtheTBPhandlesandsharesyourinformation.Thisshould
includerestrictionsontheTBP’sabilitytosubcontractwithother
organizationsontasksinvolvingyoursensitive  informationand
systems.Thereshouldbestandardtermsandconditionsthatallow
youtoapplythesamepoliciesandprocedurestocontractors,sub-
contracts,andconsultantsthatyouapplytoyourownemployees,
includingmandatoryflow-downprovisionsfromprimecontrac-
torstosubcontractors.Also,contractsshouldinclude  notification
requirementsforbreachesandterminationofkeyemployees.
Youshouldmakeyoursecurityrequirementsclearandalso
develop  consequencesthatwillincentivizetheTBPto  protectkey
resources.
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
286
Malicious Insiders with Ties to the Internet
Underground
Inthissection,wefocusoninsiderthreatcasesinwhichtheinsiderhad 
relationshipswiththeInternetundergroundcommunity.Let’sstartby 
definingwhatwemeanbytheInternetunderground.4
AswetoldyouinChapter4,theFBIdefinesorganizedcrimeas“...any 
grouphavingsomemannerofaformalizedstructureandwhoseprimary 
objectiveistoobtainmoneythroughillegalactivities.”5Whereastheword 
underground“...describesanactivitythatissecretandusuallyillegal.”6
Initially,weintendedtoanalyzeinsidercrimesinvolvingeithertheInternet 
undergroundororganizedcrimeduetoanticipatedsimilaritiesbetween 
thecases.However,afterreviewingcasesfromtheCERTdatabase,we 
realizedthatorganizedcrimeandtheInternetundergroundproducevery 
differenttypesofinsiderthreat.Weincludedmaliciousinsiderswithcon-
nectionstoorganizedcrimeinChapter4becausethosecasestypically 
involvedfraud.However,asyouwillseeinthissection,crimesinvolving 
theInternetundergroundarenotlimitedtofraud.
WeusethefollowingdefinitionofInternetunderground:
Internet underground: a collection of individuals with shared goals where
there is some degree of hierarchical structure and the primary communica-
tion mechanism or agent of electronic crime involves the Internet. Further,
it may demonstrate some degree of pseudoanonymity and/or secrecy, which
may be useful for organizing and carrying out electronic crimes.
BoththeInternetundergroundandorganizedcrimearesomewhatcovert 
intheiroperations.Back-roomconversationsarereplacedbyshort-lived 
IRCchatserverswhilecrimebossesandanorderedhierarchyofleader-
shipisreplacedbyaforumadministratorandalooselycohesivesetof 
followers.Interestingly,however,therearetiersoforganizationinthe 
Internetundergroundcommunity.Whilethenormseemstobealooser 
typeoforganization,manyofthetop-tierundergroundorganizationsare 
highlyprofessional,extremelyorganized,andruninafashionnotvery 
4.  MaterialfromthissectionincludesportionsfromajointCyLabandCERTProgramarticletitled 
“SpotlightOn:MaliciousInsiderswithTiestotheInternetUndergroundCommunity,”authoredby 
MichaelHanley,AndrewMoore,DawnCappelli,andRandallTrzeciak[Hanley2009].
5.  SeeFederalBureauofInvestigation—OrganizedCrime—GlossaryofTermsformoreinformation 
(www.fbi.gov/about-us/investigate/organizedcrime/glossary).
6.  SeedefinitiononCambridgeDictionariesathttp://dictionary.cambridge.org/.
ptg7481383
MaliciousInsiderswithTiestotheInternetUnderground 287
differentfromtraditionalorganizedcrime.Theseareinterestingfacetsof 
theproblemtobearinmindaswecontinueourdiscussionoftheInternet 
undergroundcommunity.
Thegoalofthissectionisnottorecommenddetectionmethodsfor  locating 
employeesandcontractorswhomightbeinvolvedwiththeInternet 
underground.Thatwouldbeprohibitivelyexpensiveandwouldlikely 
haveafairlyhighfalse-positivedetectionrategiventhatseveraltoolsand 
forumsintheundergrounddohavelegitimateuses.Instead,thissection 
demonstrateshowmotivatedinsiderscouldusetheInternetunderground 
communityanditsresourcesasaforcemultipliertoamplifytheimpact 
oftheirattacksagainstyou.Also,thebestpracticesdetailedinChapter6 
mighthaveeliminatedtheorganizationalandtechnicalvulnerabilitiesthat 
theinsidersinthesecaseswereabletoexploit.
Snapshot of Malicious Insiders with Ties to the Internet
Underground
ThemajorityoftheseincidentswereITsabotagecases,whichfollow
thepatternswedescribedinChapter2.Therefore,theproactivemea-
sureswehavedescribedthroughoutthisbookforpreventionandearly
detectionofinsiderITsabotageareapplicabletomanyofthesecases.As
inmostITsabotagecases,themajorityoftheseinsidersheldtechnical
roles,suchassystemadministrators,databaseadministrators(DBAs),
computertechnicians,andtechnologyarchitects;manyofthemwerefor-
meremployeesorcontractorsatthetimeoftheattack.Theywereoften
consideredtobeamongthemosttechnicalindividualsintheirorganiza-
tions;specialcareshouldbeusedwhenemployingtechnicallyskilled
individualswithknownorsuspectedconnectionstoInternetunder-
groundcommunities.
Onlyafewoftheinsiderswereinpositionsthatwerepurely  managerial 
ornontechnical.Inaddition,alloftheseinsidersweremale;however, 
recallourcautioninChapter2thattechnicalpositionsarehighlymale-
dominated.Therefore,youshouldnotfocusonmaleemployeesinyour 
mitigationefforts.Someoftheseinsiderswerecharacterizedbyfellow 
employeesandtheirorganization’sleadershipasthemosttechnically 
valuableemployeesintheorganization.
Mostoftheseinsidersweremotivatedbyrevengeagainsttheiremployer, 
althoughafewhadmotivatorssuchaslookingforrecognition,proving 
someideologicalpoint,orsupportinganundergroundmovement.
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
288
Range of Involvement of the Internet Underground
Thecaseexamplesinthissectionreflectvaryingdegreesinwhichinsiders 
wereinvolvedwiththeInternetundergroundcommunity.Atthelowend 
isasystemadministratorwhoworkedforamarketresearchfirm.Heused 
hislegitimateaccesstostealPIIhefoundonserversthatbelongedtoone 
ofhisemployer’sbusinesspartners.Therewasnoevidencethathedis-
tributedthestolendataviatheInternetunderground;rather,heappeared 
toenjoythethrillofcollectingitandbraggingaboutitinonlineIRCchat 
rooms.
MostoftheinsidersintheCERTdatabaseusedtheirtiestotheInternet 
undergroundtogeneratesupportfortheirattack.Oneinsiderhadaccessto 
tradesecretsrelatingtoanti-piracytechnologyusedbyanorganizationto 
protectitsprimarybusinessservice.Hestoletheinformationandactively 
distributeditthroughoutthehackercommunitytopromotepiracyofthe 
organization’sservices.Inanothercase,asystemadministratorforaretail
clothingfirmwasterminatedoverissueswithaserverforwhichhewas 
responsible.HethenengagedtheInternetundergroundcommunityfor 
assistanceinorganizingandexecutingadenial-of-service attack7against 
hisformeremployerusingpasswordsandaccessmechanismsheprovided 
tothem.
The Crimes
Mostattackstargetedtheorganizationdirectly.Forexample,insid-
ersdeletedcriticalfiles,disruptedsystemoperations,anddenied
access.  Othersusedtheirorganization’ssystemsfortheirownillicit
activities—forexample,runningsniffersandportscansofgovernmental
systems.Onetargetedanunsuspectingoutsiderbychangingherstatus
todeceasedinacriticalgovernmentdatabase.Otheremployeesorcon-
tractors  transmittedproprietaryinformationtohackersites,collectedPII,
andbrokeintosystemsanddefacedWebsitesforfun.Someprovided
informationtooutsiderswhousedittocommitcybercrimes,including
onepersonwhopostedinstructionstoanonlinehackergrouponhowto
breakintohisorganization’ssystems,andanotherwhopostedemploy-
ees’PIItoaWebsite.
7.  Denial-of-service attack:atypeofcyberattackinwhichalargeamountoftrafficisdirectedata 
serverinanattempttodisableit.
ptg7481383
MaliciousInsiderswithTiestotheInternetUnderground 289
Use of Unknown Access Paths Following Termination
Inthecasesthatfollow,proceduresforensuringsecureseparationof 
employeesattheconclusionoftheiremploymentwerenotsufficientto 
preventaninsiderattack.Insiderswereabletoexploitaccessthatwasnot 
disabledupontermination,allowedtocopydatabeforeleavingthefacility 
forthefinaltime,orabletoaccesspreviouslycreatedprivilegedbackdoor 
accountsusedtoattacktheorganizationaftertermination.
Asystemadministratorforaretailcompanywasterminatedoverissues 
withaserverforwhichhewasresponsible.Followinghistermination, 
herecruitedmembersofanonlinehackinggrouptohelphimattack 
hisformeremployer’ssystems.Herelayedpasswordsandotheraccess 
informationtotheundergroundgroup,andprovideddetailedinstruc-
tionsonhowtousethosecredentialstobreakintohisformeremployer’s 
network.Hewasabletoorganizethegroupandexecuteacoordinated 
denial-of-serviceattackagainsttheretailerthatlastedfromtheday 
beforeThanksgivinguntiltheSundayafterThanksgiving—commonly 
recognizedasthebusiestshoppingdaysoftheyear.
Attacks Involving the Internet Underground
AttacksinvolvingtheInternetundergroundusedsomeofthefollowing 
technicalmethods:
Exploitationofunpatchedvulnerabilities
Organizeddistributeddenial-of-service(DDoS)attacksbythe 
Internetundergroundcrime
Changeofalladministrativepasswords
ModificationofDNSservertopointtomalicioussite
Useofhackingtechniquesthatwereaccumulatedfromvarious 
undergroundforumsandWebsites
DownloadingofemployeePIItoremovablemediaandthenposting 
thePIIonundergroundsites
Downloadingoffilestoahomecomputer
Exfiltrationofcopyrightedsourcecode,whichwasthensoldonthe 
“blackmarket”andeventuallymadeavailableonundergroundfile 
sharingsites
Theftoftradesecretsbyscanningphysicaldocumentsand 
transmittingtotheInternetunderground
Unauthorizeduseofacoworker’saccountorcomputer
Maliciousmodificationofdata
Creationanduseofbackdooraccountsandunknown 
accesspaths
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
290
Acomputertechnicianwasfiredshortlyafterstartinghisjobbecause
herefusedtogivehisSocialSecuritynumbertothehumanresources
departmentandhefailedtodisclosepriorcriminalconvictions.Before
leaving,hestolePIIfor8,000employeesandpostedittoaWebsitehe
hadestablishedtosmeartheorganization’simage.TheWebsitethreat-
enedtopublishmoreinformationandlinkittoundergroundsites
knowntofacilitateandengageinidentitytheftandfraud.Theinsider
hadbeenwiththeorganizationforonlyashorttimebuthadbeengiven
systemadministratoraccesstothesystemsheattackedwithinhisfirst
fewweeksattheorganization.
Asystemadministratorwasfiredafteraconfrontationwithhisman-
ageroverthepossibilityofbeinglaidoff.Themanagerhadsuggested
thatsincethesystemswereperformingwell,theemployee’shelpmay
nolongerbeneeded.Outragedbythis,heimmediatelycreatedasetof
backdooraccountswithfullaccesstoallnetworkedmachineswithin
hiscontrolandplantedamaliciousprogramthatwoulderasehard
drivesoncommand.Thedayafterhistermination,heremotelytrig-
geredtheexecutionofthatprogramandwipedoutseveraldevicesat
theorganization.Severalmonthsaftertheinitialattack,heattackedthe
organizationasecondtimebyredirectingtheorganization’sdomain
namefortheirexternal-facingWebsitetoaWebsitethathostedpor-
nographicimages,racialslurs,anddefamatorystatementsagainsthis
formeremployer.Duringtheinvestigation,itwasdiscoveredthatdur-
inghisemploymenthehadbrokenintoothersiteswhileatwork,and
hadaccumulatedawealthofhackingmaterialfromvariousunder-
groundforumsandWebsitesthatmayhavehelpedhimlaunchhis
attackagainsthisformeremployer.Inaddition,investigatorsfound
diskloadsofpornography,passwords,hackingtools,creditcardinfor-
mation,andmusic  downloads.
Thesolesecurityadministratorforasmalltelecommunicationsfirm
quithisjobwithnoadvancenotice.Whilehewasemployedhehad
expressedfeelingsofdissatisfactionduetoinsufficientgratitudeand
compensationforhiswork,andalsohadaseriesofconflictswith
coworkers.Hehadalengthyhistoryofpiratingmaterialonlineandhad
committedpriorelectroniccrimesrelatedtounauthorizedsystemand
networkaccess.Foramonthfollowinghisdeparture,heusedbackdoor
accountshehadcreatedpreviouslytoremotelyaccesstheorganization’s
systemsanddeletefilesthathehadcreatedduringhisemployment.
HealsoredirectedtheInternet-facingWebserverstopointtoanother
servernamedtoslandertheorganization,andlaunchedotheroffen-
siveattacksfromwithintheorganization’snetwork,suchasusingthe
victim’snetworktorunnetworkscanningtoolsagainstgovernment
militarynetworks.
ptg7481383
MaliciousInsiderswithTiestotheInternetUnderground 291
Aswehavementionedpreviouslyinthisbook,youshoulddevelopa 
formalemployeeterminationprocess.Theprocessshouldinvolve
Disablingofaccountsandaccesspaths
Adebriefingregardingnondisclosureorintellectualproperty  agreements
Communicationtotherestoftheorganizationthatthetrust  relationship
withtheformeremployeehasbeenterminated,andthattheemployee 
shouldnotbeallowedphysicalorelectronicaccessfromthatpoint 
forward
PleaserefertoChapter6formoredetailsregardingemployeetermination 
procedures.
Oneadditionalitemofnotepertainstothelasttwocasesdescribedinthis 
section,bothofwhichredirectedexternalDNSregistrationstositesmeant 
todisreputeandslanderthevictimorganization.Authorizationtomain-
tainDNSregistrationfallsunderaspecialcategoryofhighlyprivilegedbut 
infrequentlyusedfunctionsthatrequirespecialdocumentation.Because 
thesefunctionsareusedinfrequently,accesstothemmaygounnoticedand 
beforgottenwhenanadministratorleavestheorganization.Thisleaves 
apotentialaccesspathforadisgruntledinsidertoexploitformonths,if 
notyears,aftertheseparationtakesplace.Asuggestedcountermeasureis 
tomaintainaninventoryofprivilegedfunctionsandalistofemployees 
whohaveauthorizationtoexecutethosefunctions.Aregularreviewofthis 
inventoryfornecessarychangesbasedonjobfunctionoremploymentsta-
tuscanhelpmitigatetheriskofitemssuchasthisthatmayslipthroughthe 
crackswithseriousconsequences.
Insufficient Access Controls and Monitoring
Thefollowingincidentsdemonstratetheconsequencesofinsufficient 
accesscontrolsandmonitoringofaccesstohighlysensitiveinformation 
andmaterials,especiallywhentrustedbusinesspartnersareinvolved.
Authorization to maintain DNS registration falls under a special category
of highly privileged but infrequently used functions that require special
documentation. Because these functions are used infrequently, access
to them may go unnoticed and be forgotten when an administrator leaves
the organization.
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
292
Adocumentimagingfirmwascontractedbyalawfirmthatwasworking 
foratelecommunicationsproviderasoutsidecounsel.Anemployeeofthe 
documentimagingfirmbroughtinhisnephew,theinsiderinthiscase, 
tohelpwithabacklogofcopyingtobecompletedatnight.Thenephew 
scannedimagesoftrade-secretdocumentationassociatedwithanti-piracy 
technologyandtransmittedittotheleaderofanonlinecommunitywhose 
purposewastopiratetheservicesofferedbythetelecommunicationsfirm. 
Theforumadministratororiginallyrefusedtoposttheinformation,stat-
ingitwastoosensitivetobereleased,buteventuallydidsoanywayunder 
pressurefromtheinsider.
ADBAresponsibleforaverylargedatabasecontainingPIIforan 
insurancecompanybecamefrustratedbywhatheperceivedtobeunfairly 
lowpay.HelashedoutattheorganizationbydownloadingPIIformore 
than60,000peoplefromtheorganization’sdatabasetoremovablemedia. 
Heusedmessageboardstoadvertisetheavailabilityoftheinformation 
toundergroundindividuals,andsolicitedbidsfortheinformation.He 
alsoleveragednewsgroupsdedicatedtocreditcardfraudtopostcredit 
cardnumbers,suggestingthattheinformationhewasprovidingbe 
usedtoobtainadditionalcreditcardsinthenamesofthevictims.Law 
enforcementeventuallycapturedtheinsiderwhenanundercoveragent 
posedasapotentialbuyerofhisstoleninformation.
Acommonthemeinthesecasesislargelyunrestrictedaccessto  proprietary 
databytheinsiders,duetopoordatahandlingpoliciesandpracticesand 
lackofgranularaccesscontrols.Interestingly,thefirstcaseinvolvesa 
trustedbusinesspartneraswellastheInternetunderground!Inthefirst 
example,companytradesecretswereleftlargelyunsecuredinthehands 
ofathird-partyorganization(thedocument-imagingcompany)contracted 
bythetrustedbusinesspartner(thelawfirm).Tradesecretsshouldbe 
protectedappropriately,giventheirvalue.Contractsshouldspecifyphysi-
calandelectronicsecurityrequirements,aswellaspersonnelsecurity 
requirementsforanyonewithaccesstotheinformation.
Thesecondcaseinvolvesaninsiderwithuncontrolledandunmonitored 
accesstoproprietarydata.AlthoughitisdifficulttocontrolaccessbyDBAs, 
countermeasuresshouldbeconsideredforcriticalorganizationaldata.For 
example,a“twosetsofeyes”policycouldbeimplementedandtechnically 
enforced,wherebytwoDBAstogetherarerequiredtoperformsensitive 
functions.Otherpossiblesolutionsinvolvedelegationmodelsthatuse 
technicalmeasurestolimitthecontrolthatanyoneaccounthasoverthe 
environment,orcryptographiccontrolsthatrequiretheuseofspecifically 
trusteddevicesthatcannotberemovedfromacontrolledareatoperform 
sensitive functions. These techniques limit the insider’s capacity to misuse 
accesstosystemsordatawithouthavingatleastoneaccomplice.
ptg7481383
FinalSummary 293
Conclusions: Insider Threats Involving the Internet Underground
ThethreatofinsideractionsassociatedwiththeInternetundergroundis 
veryreal.Asshowninthecaseexamplesinthischapter,thesecrimesoccur 
primarilyoutofrevengethatstemsfromunmetexpectationsanddisgrun-
tlementoversalaryorotherwork-relatedissues.Manyoftheattacksoccur 
off-site,aftertermination,usingaccessandpriorknowledgetheemployee 
orcontractorhadaspartofhisjobrole.
Further,nearlyallattacksinvolvedtheuseofatleastoneformofcompro-
misedaccount,suchasanauthorizedthird-partyaccountorabackdoor 
accountcreatedspecificallyfortheexecutionoftheinsider’sattackplans. 
Finally,mostoftheinsidersintheCERTdatabasewereconsideredtobe 
highlytechnicalandwereworkinginsomekindofprivileged  technical 
rolefortheorganization.
Ofcourse,itisnotalwaysreadilyapparentthatemployeeshave
connectionswiththeInternetunderground.Youcaninstitutemeasures
toblockcertainillicitcommunicationchannelsattheworkplace,ormoni-
torandinvestigatetheiruse.Inaddition,itisimportantthatmanagers
oftechnicalemployeesexercisegoodmanagementpractices,including
attemptingtomaintainadegreeofawarenessofemployees’morale,and
suspiciousbehaviorsbothatworkandoutsidetheworkplace.
Sincemostoftheseinsiderswerehighlytechnical,chancesaregood
thattheycouldhaveattackedalone,withoutenlistingassistancefrom
the  Internetunderground.Inmostcases,theirassociatessimplyhelped
themtoamplifytheirattack.Therefore,implementingthebestpractices
describedinChapter6ofthisbookcouldhavecorrectedmanyofthe
vulnerabilitiesthattheinsidersinthesecaseswereabletosuccessfully
exploit.
Final Summary
Younowshouldunderstandwhatwemeanbymaliciousinsiderthreat. 
Thisisnotmeanttobeanauthoritativedefinition,butitisimportantthat 
youunderstandthateverythingyoureadinthisbookwasgroundedby 
thisdefinition:
A malicious insider threat is a current or former employee, contractor, or
business partner who has or had authorized access to an organization’s
network, system, or data and intentionally exceeded or misused that access
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
294
in a manner that negatively affected the confidentiality, integrity, or
availability of the organization’s information or information systems.
Next,wewillturnourattentionto,amongotherthings,unintentional 
insider threats. However, everything we presented in this book pertains to 
intentionalmaliciousinsiderthreats.
Wecoveredthreemaintypesofinsiderthreatsinthebook.
IT sabotage:aninsider’suseofinformationtechnology(IT)todirect 
specificharmatanorganizationoranindividual.
Theft of intellectual property (IP):aninsider’suseofITtosteal 
proprietaryinformationfromtheorganization.Thiscategoryincludes 
industrialespionageinvolvinginsiders.
Fraud:aninsider’suseofITfortheunauthorizedmodification, 
addition,ordeletionofanorganization’sdata(notprogramsorsys-
tems)forpersonalgain,ortheftofinformationthatleadstoanidentity 
crime(e.g.,identitytheft,creditcardfraud).
Wecategorizedtheminthiswaybecauseeachtypeofcrimehasa  prevalent 
patternthatiscommonacrossthemajorityofthecases.Everytypeof 
insidercrimeisverydifferent:who,what,where,why,when,andhow! 
Herearespecificsregardingthosedifferences.
InsiderITsabotageistypicallycommittedbytechnicaluserswith 
privilegedaccess,suchassystemadministrators,DBAs,andprogram-
mers.Themotivationinthesecrimesisusuallyrevengeforanegative 
workplaceevent,andthecrimesareoftensetupwhiletheinsideris 
stillemployed,butareexecutedfollowingtermination.
InsidertheftofIPisusuallycommittedbyscientists,engineers, 
programmers,andsalespeople.Theseinsidersusuallystealthe 
informationtheyworkedon,andtakeitwiththemastheyleavethe 
organizationtoeitherstarttheirownbusiness,takewiththemtoanew 
job,orgivetoaforeigngovernmentororganization.
Insiderfraudisusuallycommittedbylower-levelemployeessuch
ashelpdesk,customerservice,anddataentryclerks.Thecrimesare
motivatedbyfinancialneedorgreed,andtheytypicallycontinuefor
alongperiodoftime.Manyoftheseinsidersarerecruitedbyoutsid-
erstostealinformation.Collusionwithotherinsidersisverycommon
incrimesinvolvingmodificationofinformationforpaymentfrom
outside.
ptg7481383
FinalSummary 295
Youshouldalsonowrecognizetheexpandingcomplexityofinsiderthreat:
Collusionwithoutsiders
Trustedbusinesspartners
Mergersandacquisitions
Culturaldifferences
Foreignallegiances
TheInternetunderground
WecoveredcollusionwithoutsidersinthetheftofIPandfraudcrimes.We
discussedtrustedbusinesspartnersandinsiderswithtiestotheInternet 
undergroundatlengthinthebeginningofthischapter.Andweexplained 
howinsidersstoleintellectualpropertyforthebenefitofaforeigngov-
ernmentororganizationinChapter3.Wedidnotdiscussmergersand 
acquisitionsorculturaldifferencesmuchatall,however.Thereasonfor 
thatisthatwehavenotdoneresearchspecificallyinthoseareasyet.We
recognizethemasbeingimportantissues,andthereforewanttoraiseyour 
awarenesstothem.Weareexploringresearchpotentialsinbothareas,so 
keepaneyeonourWebsiteforpossiblefuturereportsonthosetopics.
Thecrimeprofilesandmanycaseexamplesinthisbookshouldhave 
convincedyouthatmaliciousinsideronlineactivityisverysimilarto 
whatinsidersdoeverydayinthecourseoftheirnormaljobs.Thatiswhy 
preventionanddetectionaresocomplex.However,mitigationstrategies 
rootedinthecrimeprofilesthatinvolvetheentireorganizationworking 
togetherhaveamuchbetterchanceofsuccessthanimplementationof 
broadtechnicalcontrolsalone.Ifthereisonefactyoutakeawayfromthis 
book,itshouldbethis:ITandinformationsecuritypersonnelcannotstop 
insiderthreatsalone!Theyneedthecooperationofmanagement,human 
resources,security,legal,dataowners,andphysicalsecurity.
Every type of insider crime is very different: who, what, where, why, when,
and how!
If there is one fact you take away from this book, it should be this: IT and
information security personnel cannot stop insider threats alone! They
need the cooperation of management, human resources, security, legal,
data owners, and physical security.
ptg7481383
Chapter9. ConclusionandMiscellaneousIssues
296
Weurgeyouonceagaintoperiodicallyrereadthecaseexamples 
throughouthisbook,andaskyourselfthequestion:Could this happen to us?
Learnfromthelessonstheseorganizationshavelearnedinpainfulways!
WehopethatyoureferoftentoChapter6.Thebestpracticesfromthat 
chapterarealsorepeatedontheinsideofthebookcoverforyourcon-
venience.Butmakesureyoupayattentiontothedetails!Unfortunately, 
maliciousinsidersareawareofeveryminuteflawinyourprocessesand 
technologies;therefore,high-levelimplementationofthosepracticesisnot 
goodenough.Thedevilisinthedetails—makesureyouhavetakencareof 
everyissueofconcernthatwasexploitedbyinsidersintheCERTdatabase.
WealsourgeyoutoofferChapter7,TechnicalInsiderThreatControls,to 
yourtechnicalstaffforconsideration.Thesetechnicalcontrolsarebasedon 
ourcases,andshouldassistyourtechnicalsecuritystaffinraisinginsider 
threatalertswithoutexcessiveinformationoverload.Wewouldlovetoget 
feedbackonhowtheywork,andbetteryet,howyoutailorthemforyour 
environment.Youtellus,andwe’llspreadtheword!
Wehavebeendoingthisworkfortenyears,andweurgeyoutotake 
advantageofourexpertiseifyouareextremelyconcernedaboutinsider 
threatsinyourorganization.Wehavevariousproductsandservices 
availableasdescribedinAppendixA,InsiderThreatCenterProductsand 
Services.Also,pleasecontactus!Ourkeytosuccessisbeingintouchwith 
thecommunity,andwehonestlywelcomeyourfeedback,questions,and 
cases.Pleasecontactusatinsider-threat-feedback@cert.org.
KeepaneyeonourWebsiteatwww.cert.org/insider_threat.Wewillput 
newreleasesthere,includinganupdatedbestpracticeguide,scheduled 
forpublicationinearly2012.Thatguidewillcontainatleastfournewbest 
practices,aswellasupdatesformostexistingpractices.
Let’s End on a Positive Note!
Wethoughtitwouldbenicetoendonapositivenote,byprovidingcase 
examplesofinsiderswhoweresuccessfullydetectedintimetoprevent 
theircrimefromhappening.Hopefullythiswillprovidetheincentiveyou 
needtotakeactionbasedonwhatyou’vereadinthisbook!
Fraud:InsiderSellsStolenPIItoPoliceInformantandUndercoverAgent
Acontractorwasformerlyemployedinthehumanresourcesdepartmentofa 
governmentagency.Asafunctionofhisjob,hehadaccesstoadatabaseofPII,
includingnames,datesofbirth(DOBs),andSocialSecuritynumbers(SSNs).
ptg7481383
FinalSummary 297
Theinsider’semploymentwasterminatedforundisclosedreasons.Onthree
occasionsoverasix-monthperiod,theinsidersold40individuals’names,
DOBs,andSSNstoalawenforcementinformant.Subsequently,theinsider
triedtosellaUSBdrivewith1,100SSNsand1,600bankaccountnumbersto
anundercoveragent.Whentheinsiderdownloadedtheinformationremains
undetermined,buttheorganizationbelievesthattheinsiderdownloaded
thePIIpriortohistermination.Theinsiderwasarrested,convicted,ordered
topay$50,000inrestitution,andsentencedto42monthsofimprisonment
followedbythreeyearsof  supervisedrelease.
TheftofIP:InsiderCaughtbeforeIPReleased
Priortotheincident,theinsider,anaturalizedU.S.citizenwhowasa 
programmerataninvestmentbankingfirm,submittedhisletterofresig-
nation.Thedurationoftheincidentwasfivedays;theinsiderusedboth 
on-siteandremoteaccess,outsideofworkhours,tocarryouttheattack.He 
usedaswipecardtoaccessthebuilding,andusedaBashscriptthatcop-
ied,compressed,andmergedsourcecodefiles,thenencrypted,renamed,
anduploadedthemtoanexternalfilehost.Onfourseparateoccasions,he 
uploaded32MBoffilestoafilehostoutsidethecountry.Hedeletedthe 
encryptionprogramandattemptedtoerasetheBashhistory,buttheorga-
nizationretainedbackupcopiesoftheBashhistory.Theinsiderclaimed 
thattheuploadwasaccidentalandthattheintentwastotransferonlyopen 
sourceinformation.Theinformationwasnotpassedtoanythirdparties 
becausetheorganizationhadsafeguardsinplace,includingmonitor-
ingoutgoingemailattachments,disallowingoutgoingFTP,monitoring 
HTTPS,andrequiringtheinsidertosignanintellectualpropertyagree-
ment.TheincidentwasdetectedthroughregularauditingofHTTPStraffic. 
Theinsiderwasarrested,butverdictdetailswereunavailable.8
ITSabotage:LogicBombDetectedbeforeItWentOff
Afterhearinghewasgoingtobeterminated,theinsiderplantedalogic 
bombtodeletetherootcredentialsof4,000oftheorganization’sservers, 
disableallmonitoring,anderaseallofthedata.Fivedaysaftertheinsider 
wasterminated,however,oneoftheorganization’sengineersdetected 
themaliciousscriptandalertedorganizationofficialsbeforeitwasableto 
execute.
8.  Becausenoverdictwasknown,theinsider’sactionsdescribedinthiscasearealleged.
ptg7481383
This page intentionally left blank
ptg7481383
299
Appendix  A
InsiderThreatCenter 
ProductsandServices
Thepurposeofthisbookistoraiseawarenessandassistyouinformulating 
amitigationstrategyforinsiderthreats.Someofyoumightchoosetotake 
advantageofproductsandservicesreadilyavailablefromtheCERTInsider 
ThreatCentertojumpstartyourefforts.Thatisthepurposeofthisappen-
dix.Weprovideanoverviewofproductsandservicescurrentlyavailable 
fromtheCERTProgram.TableA-1identifiesproblemsthatyoumighthave 
withregardtomanaginginsiderthreatrisksandhowour  currentproducts 
andservicescouldhelpsolvethoseproblems.
Table A-1 SolutionstoCurrentProblems
Your Pain Points
Solutions from the
Insider Threat Center
Benefits to Your
Organization
HowcanIbecome 
moreawareofany 
organizationalissues 
impactingmyriskof 
insiderthreat?
Insider threat
workshops
Greater understanding
of the nature and
prevalence of insider
threat concerns
and candidate
countermeasures
Continues
ptg7481383
Appendix A. Insider Threat Center Products and Services
300
Table A-1 SolutionstoCurrentProblems(Continued)
Your Pain Points
Solutions from the
Insider Threat Center
Benefits to Your
Organization
HowcanIget  better 
indicationsand 
warningsofmalicious 
behavioranddetect 
warningsigns?
Insider threat
assessment
More comprehensive
protection, knowing
that you are watching
for the attack patterns
of previous malicious
insiders
HowdoImake 
thebestuseofmy
existingtools?
Customized, tactical
countermeasure
guidance based
on new operational
controls from the
CERT insider threat
lab
Insider Threat
standards (NIST SP
800-53)
Better situational
awareness and
improved security
posture since tools are
configured and properly
tailored to the unique
systems and concerns
found in the mission
operating environment
Cost savings— analysts’
time is used more
efficiently
WherecanIget 
educationand 
trainingformystaffto 
effectivelydealwith 
anddiagnoseinsider 
attacks?
Insider threat
workshops
Customized insider
threat executive
workshop
Cyberdefense
exercises conducted
on the CERT Exercise
Network (XNET)
Technical security
workforce more skilled
in detecting indications
and warnings of insider
threat
More effective incident
response, reducing
the likelihood that an
insider attack will be
missed, misdiagnosed,
or dealt with
inappropriately
ptg7481383
InsiderThreatWorkshop 301
Aremypoliciesand 
procedures  inhibiting 
detectionand 
preventionofinsider 
threats?
Insider threat
assessment
Customized insider
threat executive
workshop
Strategic action
plan and supported
execution
Stronger ability to
detect and respond
to insider attacks,
which will protect the
organization and avoid
compromises of assets,
information, and
reputation
Otherissuesof 
concern
Sponsored research
by the Insider Threat
C enter
Reduction in
international insider
threat risk, risk in cloud
computing environ-
ment, unintentional
insider threats, etc.
Therestofthisappendixprovidesinformationonthefiveprimary 
productsandservicesoffered:
Insiderthreatworkshop
Customizedinsiderthreatexecutiveworkshop
Insiderthreatexercises
Insiderthreatassessment
Insiderthreatsponsoredresearch
Brochuresdescribingtheproductsandservicesarealsoavailableonour 
Websiteatwww.cert.org/insider_threat.ThankstoCERT  BusinessSer-
vices,CERTInformationServices,andtheCERTInsiderThreatCenterstaff 
forhelpinpreparingthesematerials.
Insider Threat Workshop
Wehavecombinedallofourworkintoatwo-dayworkshoponinsider 
threat.1Theworkshopconsistsofpresentationsandinteractiveexercises 
inwhichparticipantsareledthroughportionsoftheCERTinsiderthreat 
assessmentinstrument,whichwasdevelopedtoenableorganizations 
toassesstheirinsiderthreatrisk.Theassessmentaddressestechnical, 
1.  Wealsoofferhalf-dayandone-dayversionsoftheworkshop.
ptg7481383
Appendix A. Insider Threat Center Products and Services
302
organizational,personnel,security,andprocessissues.Thepurposeof 
theexercisesistoassistparticipantsinassessingtheirownorganization’s 
vulnerabilitytoinsiderthreatinspecificareasofconcern.Toreinforcethe 
principlestaughtintheworkshop,wewillalsopresenttechnicaldem-
onstrationsofmonitoringtechniquesthatcouldhavedetectedmalicious 
activityinactualinsiderthreatcases.Ourgoalisthatparticipantsleavethe 
workshopwithactionablestepsthattheycantaketobettermanagetherisk 
ofinsiderthreatintheirorganization.
Who Should Attend?
Thetargetaudienceismanagers,leaders,directors,andchief  executives
acrossallfacetsoftheorganizationincludingIT,HR,legal,physicalsecurity,
andoperations.Theworkshopwillbenefitteamleaders,projectmanagers,
businessmanagers,financemanagers,securityofficers,riskofficers,C-level
managers,andanyoneelseresponsibleforcreating,implementing,  enforcing,
andauditingpracticesandproceduresthroughouttheorganization.
Topics
Topicsincludethefollowing:
Overviewofinsiderthreats
InsiderITsabotage
Insidertheftofintellectualproperty
Insiderfraud
Bestpracticesforpreventionanddetection
Objectives
Theworkshopobjectivesincludethefollowing.
Attendeeswillleavetheworkshopwithactionablestepsthattheycan 
taketobettermanagetheriskofinsiderthreatintheir  organization.
Attendeeswillunderstandthebestpracticesthatcanbeimplemented 
topreventinsiderincidentsordetectthemasearlyaspossible.
Attendeeswillknowwhat“observables”theyshouldbelookingfor
withintheirorganizationsthatcouldindicateapendinginsiderattack.
Attendeescancompareourlistoftechnicalmethodsagainsttheir 
organizations’technicalcontrolstoidentifygaps.
ptg7481383
303InsiderThreatExercises
Customized Insider Threat Executive Workshop
Thisworkshopisconductedwiththeexecutivemanagementteaminyour
organization.Itdiffersfromthepublicworkshopinseveralways.First,itis
streamlinedforanexecutiveaudience.Second,theworkshopmaterialscan
betailoredtoincludeactualmaliciousinsiderincidentsthatoccurredinyour
organization.Toprepareforthecustomizedworkshop,youprovideuswitha 
numberofinsiderincidentssothatwecanunderstandyourthreatlandscape.
Forthreedayspriortotheworkshop,membersoftheInsiderThreatCenter
willbeon-siteatyourlocation,interviewingstaffmemberswhoarefamiliar
withthesetofinsiderincidents.We treat all customer data as confidential.
Theactualworkshopspanstwodays.Thefirstdayconsistsofinteractive
exercises,whichhelpyoutoassessyourvulnerabilitytoinsiderthreat.The
seconddayfocusesonprovidingyouwithactionablestepstobettermanage
yourriskofinsiderthreat.Onthesecondday,wehelptheexecutiveteamin
developingastrategicactionplantoaddresstheriskofinsiderthreatinyour
organization.Thisactionplanisusefulbecauseitiscreatedandendorsed
byseniorleadership,addressestheparticularproblemsfacedbyyour
organization,andconsidersyouruniquecorporateculture.
Thetargetaudiencefortheworkshopisseniorexecutivesanddecision
makerswithinanorganization.However,thecomplexnatureoftheinsider
threatproblemrequiresaholisticapproach.Multipledepartmentsmust
beinvolvedintheoverallstrategy.Thesedepartmentsinclude,butarenot
limitedto,humanresources,informationtechnology,legalandcontract-
ing,physicalsecurity,andsoftwareengineering.Thisinter-departmental
cooperationisthekeytocreatinganeffectivestrategyagainstinsiderthreat.
Insider Threat Exercises
Inourinsiderthreatworkshopswespendasignificantamountoftime 
exploringourcrimeprofiles,withthegoalthatattendeescancompareour 
listoftechnicalmethodsagainsttheirorganizations’technicalcontrolsto 
identifygaps.Toreinforcetheprinciplestaughtintheworkshop,wealso 
presenttechnicaldemonstrationsofmonitoringtechniquesthatcouldhave 
detectedmaliciousactivityinactualinsiderthreatcases.
Ourinsiderthreatexercisesgobeyondlecturesanddemos,providing 
realistictrainingexercisesforcyberdefendersininsiderthreatmitigation. 
Weuserealexamplesfromtheirinsiderthreatdatabasetocreatea  training 
ptg7481383
Appendix A. Insider Threat Center Products and Services
304
platformusingtheCERTXNET2environmentthatshowcasesactual 
tactics,techniques,andproceduresusedbyinsiderstostealcriticalorsen-
sitiveinformation,ortodamageanorganization’simageorinfrastructure. 
Theexercisesteachparticipantshowtodetect,prevent,andrespondto 
crimesbyinsidersandhelpstunetheirfocusfortrendsininsiderbehavior 
highlightedbytheCERTInsiderThreatCenter’spreviousbodyofwork.
Theseinteractive,team-basedexercisesre-createcomplexactualinsider 
threatscenariosandchallengeparticipantstoprepareforandrespondto 
insiderthreatincidents.Theyincludevariousinjectsfromtheteamsrun-
ningtheexercisetosimulateincidents.Theseexercisescanbeconducted 
withinanorganizationtobetterequipitsdefensesagainstmaliciousinsid-
ers,orcanbeusedincyberflagexercisestorecognizethemostsophisticated 
teamamongmultiplecompetingorganizations.
Todate,wehavecreatedtwoexercisesthatwehaveofferedatindividual 
customersitesandinconjunctionwithinformationsecurityconferences.
Thefirstexerciseinvolvestheparticipantsdetectingandrespondingtoa 
maliciouscodeinfectionontheirenterprisenetworkanddetermininghow 
themachineswereinfected(bymaliciousinsiderormalware).Participants 
aregiventheinformationthatthereisaninfectionsomewhereontheirnet-
work,andtheexerciseprogressesviaquizzesthatguidetheparticipants 
towardstrategiesforlocatingthesourceoftheinfection.Participantsare 
provided with familiar network monitoring tools such as Snort, Ntop, and 
Wireshark,aswellasanetflowtoolcalledSiLK.Usingthesetools,theywill 
needtoexamineanetworkthatincludessimulatedusertrafficdesignedto 
modelasmallbusinessorganization.
Thesecondexercisebeginswiththeparticipantsdetectingalargesource 
codeexfiltrationanddetermininghowtheexfiltrationwascarriedout. 
Afterinvestigatingthatattack,theywillencounterseveralotherattacks 
againstinternalsystemsandrespondtothemaccordingly.Theexercise 
isintendedtosurpriseparticipantsbyrevealingtheinsiderasasystem 
administrator,makingitdifficultforthemtotellwhetherchangeswere 
authorizedornot.
Insider Threat Assessment
Theinsiderthreatassessmentenablesyoutogainabetterunderstanding 
ofinsiderthreatandanenhancedabilitytoassessandmanageassociated 
2.  XNETCERTExerciseNetwork:http://xnet.cert.org
ptg7481383
InsiderThreatAssessment 305
risks.Theassessmentinstrumentencompassesinformationtechnology, 
humanresources,physicalsecurity,businessprocesses,legal,manage-
ment,andorganizationalissues.Itmergestechnical,behavioral,process, 
andpolicyissuesintoasingle,actionableframework.
Fortheassessment,membersoftheInsiderThreatCenterstaffwillspend 
threetofivedaysatyourorganization.Duringthattime,wewillreview
documents,interviewkeypersonnel,andobservekeyprocessesandsecu-
rityissues.Wesignnondisclosureagreements,andallcollaborationswill 
remainconfidential.Aftertheon-sitevisit,weprovideyouwithaconfiden-
tialreportthatcontainsthefindingsoftheassessmentandconsiderations 
forpotentialmitigationstrategies.Organizationshaveusedthisreportto 
dothefollowing:
Identifyandimplementshort-termtacticalcountermeasures
Helpguidetheirongoingriskmanagementprocessforimplementing 
long-term,strategiccountermeasures
Justifyfollow-upactionstokeydecisionmakers
Ourresearchhasproventhattheinsiderthreatproblemisquitecomplex, 
andyouneedaninstrumentthathasthefollowingcharacteristics:
Encompassespolicies,practices,andtechnologies
Isempiricallybasedyetadaptabletocurrenttrendsandtechnologies
Focusesonprevention,detection,andresponsestrategies
TheCERTinsiderthreatassessment,whichisbasedonpsychological 
expertiseaswellastechnicalexpertise,helpsyoutobettersafeguardyour 
criticalinfrastructure.Thepurposeoftheassessmentisasfollows:
Enableyoutogainabetterunderstandingofyour  vulnerability
toinsiderthreatandanenhancedabilitytoassessandmanage
associatedrisks
Includetechnical,organizational,personnel,andbusinesssecurity 
andprocessissuesfromallofourpastresearchinasingle,actionable 
framework
Benefitallindividualsinvolvedintheinsiderthreatvulnerability 
assessmentprocess:informationtechnology,humanresources,physi-
calsecurity,dataandbusinessprocess“owners,”andalllevelsof 
organizationalmanagement
ptg7481383
Appendix A. Insider Threat Center Products and Services
306
Insider Threat Sponsored Research
Alloftheproductsandservicesofferedherehaveevolvedfromsponsored 
researchprojectswehaveundertakeninthepast.Wearealwaysseek-
ingnewresearchanddevelopmentopportunitiestoassistgovernment 
andprivateindustryorganizationswiththeirspecificareasofconcern. 
Forexample,wewouldliketoinvestigateinternationalinsiderthreat 
risk,insiderthreatriskincloudcomputingenvironments,anduninten-
tionalinsiderthreats.Wealsoareactivelydeveloping,pilot-testing,and 
transitioningnewinsiderthreatcontrolstothecommunity.
Ifyouareinterestedindiscussingpotentialcollaborations,pleasecontact 
usatinsider-threat-feedback@cert.org.
ptg7481383
307
Appendix  B
DeeperDiveinto 
theData
WeareconstantlyminingtheCERTinsiderthreatdatabasefornewand 
usefulinformation,sometimestosupportspecificresearchanddevelop-
mentactivities,sometimesbasedoncuriosity,andsometimesattherequest
ofsomeoneoutsideofourteam.Frequentlywhenweholdworkshopsor 
giveconferencepresentationsweareaskednewquestionsthatwehavenot 
yetexploredinthedata.Weoftentakethosequeriesbackwithus,askour 
databaseexpertstofindtheanswers,andprovidetheanswerstotheper-
sonwhoasked.Wealsotrytoincorporatethoseanswersintopostsonour 
blog,1inourworkshops,andinnewpublicationsifapplicable.Thepur-
poseofthisappendixistoprovidesomeofthosedetailstoyou,becausewe 
believeitcouldbeusefultoyouindesigningyourinsiderthreat  mitigation 
strategies.
Breakdown of Cases by Critical Infrastructure Sectors
FigureB-1showsthebreakdownofcasesbycriticalinfrastructuresector. 
Asyoucansee,thebankingandfinancesectoraccountsforthe  highest 
numberofcrimesinourdatabase,followedbytheinformationand 
1.  www.cert.org/blogs/insider_threat/
ptg7481383
Appendix B. Deeper Dive into the Data
308
telecommunicationssector.Thosetwosectorstogetheraccountformore 
thanhalfofallofthecasesinourdatabase!Ifyouareapartofoneofthose 
sectors,itisagoodthingyouarereadingthisbook!
Thegovernmentsectorsarenext,followedbypublichealth,andthen 
commercialfacilities.Thisisparticularlyinterestingtousbecausethepub-
lichealthsectordidnotevenshowupinourbreakdownuntilthepastfew 
years.However,itisquitepossiblethatthosecaseswereoccurringbefore, 
butorganizationswerekeepingthemquiet.Morerecently,inlightofthe 
databreachlaws,organizationsnolongerhavetheoptionofcoveringup 
theftofprivateinformation.
InFigureB-2wedigalittledeeperintothetopsixsectors.Nowwesee 
that,nosurprise,fraudisthemostprevalentcrimeinthebankingand 
finance sector. They are not immune to theft of IP or IT sabotage, however, 
andthereforestillneedtofocusonprotectingassetssuchasmergerand 
acquisitionplans,strategicplans,andearnings.Andasmentionedearlier 
inthebook,nosectorshouldignoretheriskofinsiderITsabotage.
Figure B-1 U.S. cases by critical infrastructure sector
N/A 4%
Postal and Shipping <1%
Transportation 1%
Water 1%
Manufacturing 2%
Public
Health
7%
Banking and Finance
29%
Chemical Industry &
Hazardous Materials 2%
Information and
Telecommunications
22%
Commercial Facilities 6%
Defense Industrial Base 2%
Education 4%
Emergency Services 1%
Energy 1%
Food 2%
Government—Federal
7%
Government—State/Local
9%
ptg7481383
BreakdownofCasesbyTypeofCrime 309
TheITsector,ontheotherhand,hassufferedalargenumberofITsabotage 
attacks,aswellastheftofintellectualproperty.TheftofIPisnosurprise, 
duetothehighlycompetitivenatureandinnovativenatureoftheirbusi-
ness.TheprevalenceofITsabotagealsodeservesattentioninthatsector; 
theconsequencesofthosecrimescanbehighlydamaging!
Thegovernmentsectorhassufferedmostfromfraud,followedbyIT 
sabotage.ItisimportantthatthegovernmentsectorprotectthePIIwith 
whichitisentrustedbyitscitizens.Inaddition,itshouldnotignoretherisk 
ofITsabotage,asthereweresomesignificantcasesinthatsector.
Breakdown of Cases by Type of Crime
Nowlet’stakeanotherlookatthedatainadifferentway:bytypeofcrime. 
Wherearethecrimesoccurring?Thistypeofinformationcouldbeuseful 
inmakingrisk-baseddecisionsregardinginsiderthreatmitigation.
FigureB-3showswheretheinsiderITsabotagecasesareoccurring.As 
mentionedearlier,theITsectorseemstobeathighriskforinsiderIT 
sabotage,accountingforalmosthalfofallofthesabotagecrimesinthe 
Figure B-2 Breakdown of crimes for top six sectors
140
160
180
80
100
120
20
40
60 Theft of IP
Banking and Finance
Information and Telecommunications
Government—State/Local
Commercial Facilities
Public Health
Government—Federal
All Other Sectors
IT Sabotage
0Fraud
ptg7481383
Appendix B. Deeper Dive into the Data
310
database!Thebankingandfinancesectorissecondintermsofpreva-
lenceofITsabotageattacks,followedcloselybycommercialfacilities.Itis 
somewhatreassuringtoseethatmanyofthesectorswhichcouldresultin 
catastrophicharmtoindividualsasaresultofITsabotagehavehadvery 
fewincidents:publichealth,manufacturing,transportation,chemicaland 
hazardousmaterials,food,energy,andemergencyservices.
FigureB-4depictsthetheftofIPcasesbysector.Again,asmentionedearlier, 
theITsectorhasbeenhardhitbytheftofintellectualproperty,accounting 
fornearlyhalfofalltheftofIPcases.IfacompanylosesitsIPtoacompeti-
tor,theimpactscanbedevastating.Theseimpactsareevengreaterwhen 
theIPleavestheUnitedStates,whichhappenedinclosetoone-thirdof 
thetheftofIPcasesinourdatabase.Therefore,wesuggestthattheITsec-
torconsiderincreasingriskmitigationeffortsforthesetypesofcrimes.In 
addition,thebankingandfinance,manufacturing,chemicalindustryand 
hazardousmaterials,andcommercialfacilitiessectorsshouldpayclose 
attentiontoChapter3,InsiderTheftofIntellectualProperty.
Finally,FigureB-5showsthedistributionofallofourfraudcasesbycriti-
calinfrastructuresector.Notsurprising,thebankingandfinancesectorhas 
beenhardesthitbyinsiderfraud,accountingforalmosthalfofallinsider 
Figure B-3 U.S. insider IT sabotage cases by sector
Public Health 4%
N/A 2%
Postal and Shipping 1%
Transportation
3%
Water 1%
Banking and
Finance
11%
Commercial Facilities 9%
Manufacturing 2%
Education 4%
Energy 4%
Information and
Telecommunications
40%40%
Food 2%
Government—Federal 7%
Government—State/Local 7%
DefenseIndustrialBase 3%
Banking and
Finance
11%
Information and
Telecommunications
40%
ptg7481383
BreakdownofCasesbyTypeofCrime 311
Figure B-4 U.S. insider theft of IP cases by sector
N/A 2% Water 1%
Banking and
Finance
11% Chemical Industry &
Hazardous Materials 9%
Manufacturing 10%
Defense Industrial Base 4%
Education 2%
Energy 1%
Food 1%
Information and
Telecommunications
45%
Government—Federal 2%
Government—State/Local 1%
Public Health 3%
Commercial Facilities 8%
Figure B-5 U.S. insider fraud cases by sector
Postal and Shipping <1%
Transportation <1%
Water 1%
Information and
Telecommunications 9%
Manufacturing 0%
N/A 4%
Public
Health
8%
Banking and Finance
47%
Government—
State/Local
11%
Food 3%
Government—Federal 5%
Chemical Industry & Hazardous
Materials 1%
Commercial Facilities 4%
Defense Industrial Base 1%
Education 4%
Emergency Services 0%
ptg7481383
Appendix B. Deeper Dive into the Data
312
fraudcases.Government–state/localissecond,followedbyinformation 
andtelecommunicationsandpublichealth.Someofthesectorshadlittle 
ifanyinsiderfraudcases;however,ifyouareinanyofthosesectorsmen-
tionedyoushouldpaycloseattentiontoChapter4,InsiderFraud.
Tre nd s ov er Ti me
Wearefrequentlyaskediftheinsiderthreatproblemisgettingbetteror 
worse.FigureB-6breaksdowntheincidentsinourdatabasebytheyearin 
whichtheincidentended.Someoftheseincidents,primarilyfraud,went 
onovermanyyears.Accordingtothisgraph,in2009moreinsiderswere 
caughtthaninanyotheryear.Whythedrasticdropin2010?Wecanonly 
becautiouslyoptimisticabout2010forthisreason:Incidentsoftendonot 
becomepublicknowledgeuntilthecasegoestotrial,andthatcanbeyears 
followingthearrestoftheinsider.Inaddition,wegeneratedthisgraphin 
mid-2011whenwewerewritingthebook.Therefore,onlytimewilltell 
whattherealnumberforthe2010barisinourgraph!However,wewould 
Figure B-6 Insider incident end dates over time
5
2
7
11
1996
10
20
30
40
50
60
70
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
11 11
5
2
11
33
6
6
9 9
9
9
13
11 663
14
6
3
3
3
3
10
23
97 7 7
16
36
8
8
5
2
2
2
2
4
21
4
5
4
8
28
11
1
2
1
4
8
5
7
3
10
5
9
3
4
4
4
1
IT Sabotage Fraud Theft of IP Misc. National Security Espionage
ptg7481383
EmployeesversusContractors,CurrentversusFormer 313
liketothinkthatthewidespreadattentionourworkhasgotteninrecent
yearsmightbehelpingtoincreasethesuccessratesforpreventingthese 
crimes,ordetectingthemintheplanningorearlyexecutionstages,before 
thedamagesoccur.
Employees versus Contractors, Current versus Former
FigureB-7showsthenumberofcasesperyearbyemployeetype.Untilthe 
pastyear,thepercentageofincidentsinvolvingacontractorhoversaround 
15%.Asmentionedpreviously,ourexperiencehasshownthatanydatafor 
2010and2011isgoingtochangequiteabitasmoreandmorecasescome 
tolight,andthereforewewillfocusonthepreviousyearsinthisgraph. 
Whetherthenumberoftotalincidentsforaparticularyearishigheror 
lower,thepercentagesstayroughlythesame.Whatisalsointerestingis 
thatthisratiohasstayedthesameoverthecourseoftenyearsofafairly 
tumultuouseconomicenvironment.Thisresultmayindicatethatitisn’t 
likelyforcontractorcrimestoraiseorlowersignificantly.Butwithalmost 
oneinsevenofourinsiderthreatcrimesbeingcommittedbycontractors, 
areyouadequatelyconsideringtheriskposedbythisgroup?
Figure B-7 Insiders versus contractors
35
30
25
20
15
10
5
0'00 '01 '02 '03 '04 '05 '06 '07
All Cases (n =436)
Employee
Contractor
'08 '09 '10 '11
Number of Cases
All Cases by Type of Employee Over Time
ptg7481383
Appendix B. Deeper Dive into the Data
314
FigureB-8showsthepercentageofcasesperpetratedbycurrentandformer 
employees,aswellasemploymenttype(full-time,part-time,orcontractor). 
Insomecases,wewerenotcertainwhethertheincidentwascommittedby 
acurrentorformeremployee,soweindicatedthoseincidentsasunknown. 
Full-timeemployeesaccountforthegreatestpercentageforbothcurrent 
andformeremployees.Part-timeemployeesmadeupaverysmallper-
centageofourcases,andallofthemwerecurrentemployeeswhenthey 
committedtheirillicitactivity.Contractorsaresomewhatinterestinginthat 
morecontractorsattackedfollowingterminationthanwhenemployedby 
thevictimorganization.
FiguresB-7andB-8providesomeinterestingdatapointsforyoutoconsider. 
Doyouusethesamepreventionanddetectioncontrolsforallemployees 
andcontractors,orareyouonlyworriedaboutthemajority—thecurrent, 
full-timeemployeesyouseeonadailybasis?Whatareyourprocedures 
whenacontractorleaves?Canyoubesurethatthecontractor’saccesshas 
beenfullydisabled?Foodforthoughtasyoudecideonthenextstepsafter 
readingthisbook... .
Tec hn ical v ersus N on techn ic al I nside rs
FigureB-9showstechnicalversusnontechnicalinsidersoverthepast 
11years.Notethatonlysixmonthsof2011arerepresentedinthisgraph.
Figure B-8 Comparison by employee type and status
100%
75%
50%
25%
0%
Note:
All Cases n =496
Current Former Unknown
Contractor
Part-Time
Full-Time
Unknown
Comparison of All Sector Cases
By Type and Status of Employee
ptg7481383
What’sNext:OtherThreats 315
Howhaveyouallocatedresourcesforpreventing,detecting,and 
respondingtothreatsposedbytechnicalandnontechnicalemployees? 
Doyoufocusononetypeofemployeeandnottheother?Ourobserva-
tionsindicatethatyoushouldconsiderpotentialinsiderthreatsfromboth 
technicalandnontechnicalemployees.Insiderthreatscouldcomefrom 
anyone.
What’s Next: Other Threats
Wehavemorethan700casesinourinsiderthreatdatabase.Mostofthose 
casesrepresentintentionalinsiderincidentsthatoccurredintheUnited 
States.However,wealsohavebeencollectingcasesforothertypesof 
threatsaswell,forfutureresearchpurposes.Casesinclude
IntentionalinsiderincidentsthatoccurredoutsidetheUnitedStates
Unintentionalinsiderincidents
Externalintrusions
Wehavecollectedveryfewunintentionalinsiderthreatcases.Wesuspect 
thatmostofthesecasesarehandledinternally;thereisnoreasontoattract 
mediaattentionforthesecasesunlesstheyarepartofamoresignificant 
event.OnesucheventwouldbethedisclosureofPersonallyIdentifiable 
Figure B-9 Te ch ni ca l ver su s non te ch ni ca l ins id er thre at s
40
35
30
25
20
15
10
5
020012000 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011
Nontechnical Technical Both
Technical versus Nontechnical Over Time
ptg7481383
Appendix B. Deeper Dive into the Data
316
Information(PII),whichinmostcaseswouldhavetobereportedunderthe 
databreachlaws. Anothersucheventwouldbewhenaninsideruninten-
tionallyprovidesaccesstoanexternalintruder—forexample,byclicking 
onaninfectedattachment,clickingonalinkinaphishingemail,and 
soforth.
Wehavebeensomewhatsuccessfulincollectinginsidercasesthatoccurred 
outsidetheUnitedStates,buthavenotcollectedenoughfromanyone 
countrytoactuallyperformanempiricalanalysis.Therehasbeenahigh 
degreeofinterestovertheyearsinhavingusstudythesimilaritiesanddif-
ferencesinintentionalinsidercrimescommittedincountriesoutsidethe 
UnitedStates.Itismoredifficulttolocateinternationalcasesbecausein 
theUnitedStates,whensomeoneisarresteditbecomesamatterofpub-
licrecord,likewisewhenthatpersongoestotrial.However,outsidethe 
UnitedStatesthisisnotalwaysthecase.Toperformathoroughinsider 
threatstudyoutsidetheUnitedStateswebelieveweneedapartnership 
withinternationallawenforcement,otherorganizationslocatedinthe 
countryofinterest,orglobalorganizations.TableB-1showsthebreak-
downofour45internationalintentionalmaliciousinsiderthreatcasesby 
countryof  origin.
Table B-1 International Malicious Insider Cases in Our Database
Number of Cases Country
18 United Kingdom
4Australia
3 India
2Japan
4Korea
1 Canada
2 China
1 Europe
2France
1 Greece
1 Italy
ptg7481383
What’sNext:OtherThreats 317
1 Romania
1 Russia
1 Singapore
1 Switzerland
1 Thailand
1 United Arab Emirates
StaytunedtoourWebsite,www.cert.org/insider_threat,fornewresearch
intheseareas!
ptg7481383
This page intentionally left blank
ptg7481383
319
Appendix  C
CyberSecurityWatch
Survey
Toproperlyallocateinformationsecurityresourcesandbudgets, 
organizationsneedtoknowtheprevalenceofinsiderthreat,especiallyas 
comparedtooutsiderthreat.
In2004wedecidedthatweshoulddevelopanothermethodfor  measuring 
theprevalenceofmaliciousinsiderincidentsacrosstheUnitedStates. 
Therefore,wepartneredwithCSOMagazineandtheSecretServiceto 
conductthefirstannualCyberSecurityWatchSurvey.Thesurveyhas 
beenasuccessfulmethodforgatheringinformationregardingelectronic 
crimes,techniques,bestpractices,andemergingtrends;therefore,wehave 
continuedtoconductthesurveyonanannualbasis1[CSO2011a].
ThesurveyissentoutannuallytoCSOMagazinereadersandsitevisitors, 
aswellasmembersandpartnersoftheSecretService’sElectronicCrimes 
TaskForces.Resultsfromthe2011surveyareprovidedinthissectionto 
describetheprevalenceandcurrenttrendsofinsiderthreataccordingto 
thatsurvey[CSO2011b].
1.  NotethatinsomeyearsDeloitteandMicrosoftalsoparticipatedinthesurvey.
ptg7481383
Appendix C. CyberSecurity Watch Survey
320
Theoverarchingquestionwealwaysponderishowmanyorganizations 
areactuallyvictimsofinsiderthreats.FigureC-1displaystheresultsofthat 
questionthroughouttheyears.Asyoucansee,thenumberof  organizations 
experiencingamaliciousinsiderincidentpeakedin2006,anddefinitely 
decreasedin2010.Afterthenumberhoveredataround50%forthreeyears, 
wearegreatlyencouragedbythedroplastyear!Weknowfromannual 
surveyresultsthatorganizationsareimplementingthecountermea-
suresrecommendedbyorganizationslikeours,whichmightexplainthe 
decrease.
Notethatthesizeoforganizationswaswellrepresented;38%ofthe 
organizationshavemorethan5,000employeesand37%oforganizations 
havefewerthan500employees.
Oneofthequestionswearefrequentlyaskedisthebreakdownof  insiders 
versusoutsiders.Thee-crimesurveyisanopportunitytoobtaindatato 
answerthatquestion.FigureC-2showsthebreakdowninoursurvey 
results.2
2.  Source:2011CyberSecurityWatchSurvey,CSOMagazine,U.S.SecretService,SoftwareEngineering 
InstituteCERTProgramatCarnegieMellonUniversity,andDeloitte,January2011[CSO2011b].
Figure C-1 Percentageofsurveyparticipantswho  experiencedamalicious 
insiderincident(Source:2011  CyberSecurityWatchSurvey,CSO  Magazine, 
U.S.SecretService,Software  EngineeringInstituteCERT  Programat 
CarnegieMellonUniversity,andDeloitte,January2011.)
2004
41 39
55 49 51
43
2005 2006 2007 2008 2010
60
40
20
0
100
80
ptg7481383
Appendix C. CyberSecurity Watch Survey 321
Again,therewasquiteachangelastyear;insidersaccountedforabout 
one-thirdofallincidentsforthreeyears,andthenlastyeardroppedto 
slightlymorethanone-fourth.Again,weareoptimisticthatourworkis 
havinganimpact,aswedidseemoreorganizationsimplementingour 
suggestedcountermeasuresinlastyear’ssurveyresults.
Sinceinsidersonlyaccountedfor27%ofallelectroniccrimesfor 
organizationssurveyedin2011,youmightreconsiderwhetherit’sreally
worthyourtimetocontinuereadingthisbook.Beforemakingthatdeci-
sion,pleaseconsiderthefollowingkeyquestionfromthesurvey:Which 
crimesweremorecostlyordamaging,thosecommittedbyinsidersorby 
outsiders?FigureC-3showstheresultsofthatquestion.3Ifweomitthe 
responsesof“Unknown,”43%ofrespondentsindicatedthatinsidercrimes 
weremorecostlyordamaging,and57%indicatedthosecommittedby 
outsiders.Thismeansthatmorethan260ofthemorethan607respond-
ingorganizationsbelievethatinsidersweremorecostlyordamagingthan 
outsiders.Butmanyorganizationstargettheirsecuritydefensesalmost 
exclusivelyatthemaliciousoutsiderratherthanthemaliciousinsider.The 
3.  Ibid.
Figure C-2 Insiders  versusoutsiders(Source:2011  CyberSecurity 
WatchSurvey,CSOMagazine,U.S.SecretService,Software 
EngineeringInstituteCERTProgramatCarnegieMellonUniversity, 
andDeloitte,January2011.)
80
71
100
80
60
40
20
0
69 66 73
27
34
31
32
20
29
68
2004 2005 2006 2007 2008 2010
Insiders Outsiders
ptg7481383
Appendix C. CyberSecurity Watch Survey
322
informationcontainedinthisbookwillhelpyouright-sizeyourdefense 
againsttheveryrealinsiderthreat.
One conclusion we can draw from the survey results is that insider threats 
areobviouslyprevalentinorganizationsintheUnitedStates.Nearlyone 
outofeverytwoorganizationsisvictimizedbyatleastonemalicious 
insiderincidentperyear.Why,then,haveweonlybeenabletocollect 
700cases?Theanswerliesinthenextquestionfromthesurvey.
Since2004wehavebeenaskingsurveyrespondentshowtheyhandledthe 
insiderelectroniccrimestheyexperienced.Theresultstothisquestionhave 
beenveryconsistentfromyeartoyear.4Resultsfromthe2011surveyare 
showninFigureC-4.Itmayormaynotsurpriseyoutoseethatmorethan 
three-fourthsofallinsidercrimesarehandledinternally,withno  contactto 
lawenforcementandnolegalaction.
Twoofthetopreasonscitedforchoosingtohandleinsiderincidents 
internallywerethatthevictimorganizationslackedtheevidencetobe 
abletoprosecuteandtheycouldnotidentifytheindividual(s)responsible
4.  Ibid.
Figure C-3 Whichcrimesweremorecostly?(Source:
2011CyberSecurityWatchSurvey,CSOMagazine, 
U.S.SecretService,Software  EngineeringInstitute 
CERTProgramatCarnegieMellon  University,and 
Deloitte,January2011.)
Outsiders
38%
Unknown
29%
Insiders
33%
ptg7481383
Appendix C. CyberSecurity Watch Survey 323
forthecrime.Ourgoalinthisbookistohelpyouwiththesereasonsso 
thatyoucanidentifytheperpetrator,andyouhavesufficientevidenceto 
prosecuteifyouchoosetodoso.
Figure C-4 Howinsider  intrusionsarehandled 
(Source:2011  CyberSecurityWatch  Survey,CSO  
Magazine,U.S.Secret  Service,  Software  Engineering  
InstituteCERTProgramat  CarnegieMellonUniversity,  
andDeloitte,January2011.)
76%
8%
3%
12%
Internally (without Legal Action or Law
Enforcement)
Externally (Filing a Civil Action)
Internally (with Legal Action)
Externally (Notifying Law Enforcement)
ptg7481383
This page intentionally left blank
ptg7481383
325
Appendix  D
InsiderThreat 
DatabaseStructure
Since2001,wehavebeencollectingincidentsofmaliciousinsideractivity
thatoccurredinU.S.organizations.Ineachofthoseincidents,theinsiderwas
found guilty in a U.S. court of law. To date, we have collected more than 700
casesofinsiderITsabotage,fraud,theftofintellectualproperty,andnational
securityespionage.Thisdataprovidesthefoundationforallofourinsider
threatresearch,workinourlab,assessments,workshops,andexercises.
Werecordactualinsiderincidents,providingabehavioralandtechnical 
frameworkforcharacterizinginsideractivityandanalyzingincidentsina 
meaningfulwaythatcanbeusedtoprevent,detect,andrespondtoinsider 
threats.Therecordingofthedetailsofaninsiderincidentiscommonly 
referredtoas“coding.”Thisappendixdescribesthestructureoftheinsider 
threatdatabase,aswellasourdatacollectionandcodingprocess.This 
appendixwillmostlikelybeusefultootherresearchers,asitaddresses 
questionswehavereceivedfromtheresearchcommunityovertheyears.
Data Collection
Incidentsareusuallyidentifiedfrommediareports,althoughsome 
areprovidedtotheCERTProgrambyacollaborativepartneror 
ptg7481383
Appendix D. Insider Threat Database Structure
326
affected  organization.Wethenresearchthecasetocollectasmuchsource 
materialaswecanfind.Themajorityofourcasescomefrompublicsources 
ofinformation,althoughmorethan200caseshavebeenobtainedthrough 
lawenforcementpartnersandvictimorganizations;thosecasesinclude 
confidentialinformationregardingtheinsiderorthevictimorganization.
Thesourcesofinformationwegatherandusetocode1insiderthreat 
casesare
Publicsourcesofinformation
Mediareports,includingDepartmentofJusticeandU.S.Attorney’s 
Officepressreleases
CourtdocumentsobtainedusingLexisNexis,fromlawenforcement, 
ordirectlyfromthecourts
Otherpublications,includingbooks,newsoutlets,policereports,
andorganizationpressreleases
Nonpublicsourcesofinformation
Lawenforcementinvestigations
Victimorganizationinvestigations
Interviewswithvictimorganizations
Interviewswithconvictedinsiders
Interviewswithinvestigatorsandprosecutors
Recently,wereceivedfeedbackfrompractitionersonthefrontlineof 
computernetworkdefensethatwhilemaliciousinsideractivityisofgreat 
concern,ofequalconcernisnonmalicious(accidental)activity,forwhich 
controlsalsoneedtobeputinplace.Inaddition,wehavereceivedfeedback 
fromindividualsoutsidetheUnitedStates,andfromglobalorganizations 
thathavebrancheslocatedoutsidetheUnitedStates.Theywouldliketo 
knowiftheinsideractivityexhibitedinU.S.casesissimilartoordiffer-
entfromactivityinincidentsinorganizationsoutsidetheUnitedStates.In 
addition,theyneedtoknowifthesamecountermeasureswerecommend
arelegalinvariousothercountries,duetostringentemployeeprivacy 
laws.Basedonthisfeedback,wehavebeguncollectingincidentsfrom 
outsidetheUnitedStates,aswellasunintentionalinsiderthreats,suchas 
accidentaldatadisclosureorclickingoninfectedemailattachments.
1.  Code:inthecontextofinsiderthreatcaseresearch,enteringthedetailsofacaseinadatabase 
accordingtoasetofwell-definedcriteria.
ptg7481383
CodingProcess 327
Coding Process
Informationaboutthreeentitiesisneededwhencodinginsiderthreat 
cases:theorganization(s)involved,theinsider(subject),andthedetails 
oftheincident.FigureD-1showstheprimaryrelationshipsamongthese 
threeentities.
Organization Data
Multipleorganizationscanbeinvolvedinasingleincident.An  organization 
thatisnegativelyimpactedbyanincidentisdesignatedasavictim
organization.Incidentsmayalsoinvolveanotherorganization—thevictim 
organization’strustedbusinesspartner.Intheseincidents,themalicious 
insiderisnotdirectlyemployedbythevictimorganization,butisable 
toattacktheorganizationbecauseofauthorizedaccessgrantedtohim 
throughacontractualrelationshipwithhisorheremployer.Chapter9, 
ConclusionandMiscellaneousIssues,containsasectiondevotedtoinsider 
threatsfromtrustedbusinesspartners.
Incidents,particularlythoseinvolvingtheftofIP,mayalsohavea 
beneficiary organization,anorganizationthatknowinglyorunknow-
inglygainsanadvantagefromtheincidenttothedetrimentofthevictim 
organization.Weidentifytheorganizationandanyorganizationalissues 
thatwererelevanttothecase,asshowninTableD-1.Thetablesinthis 
appendixarenotthedatadictionaryfortheinsiderthreatdatabase;they 
areprovidedtogiveyouinsightintothetypeofinformationcollectedfor 
eachincidentandafewsamplevaluesforeachtypeofdata.
Figure D-1 Entitiesneededwhencodinginsiderthreat 
cases
Subject Organization
Incident
HarmsPerpetuates
Grants Access
To
ptg7481383
Appendix D. Insider Threat Database Structure
328
Table D-1 OrganizationInformationCollected
Organization Subcategory Information Collected in the Database
Organization Descriptors Name, address, relation to insider
Organization Type Victim, beneficiary, trusted business partner,
other
Organization Description Description of the organization
Industry Sector Critical infrastructure sector of the
organization
Based in the United
States?
Location of the organization; based in the
United States?
Organization Issues Work environment such as hostile work
environment or culture of mistrust; layoffs,
mergers and acquisitions, reorganizations,
and other workplace events that may have
contributed to an insider’s decision to act
Opportunity Provided to
Insider
Actions taken by organization that may
have contributed to the insider’s decision
to take action (such as demotions or
transfers of employees); failure on the part
of the organization to take action based on
concerning behaviors or other events, actions,
or conditions; or vulnerabilities—for example,
insufficient monitoring of external access
Subject Data
Wecollectanydetailswecanfindabouttheinsider,includingdetails 
regardingplanningactivities.Thesedetailsaregenerallydiscoveredafter 
anincidenthasalreadyoccurred,butareessentialtopreventingfuture 
insiderthreats.Wealsocollectinformationabouttheinsider’saccomplices, 
includingdemographicdata,theaccomplice’srelationshiptotheinsider 
andthevictimorganization,andtheaccomplice’sroleintheincident.
Wedonotmakeanyjudgmentsabouttheinsiderorattempttodiagnose 
hisorherbehavior;wecodeexactlywhatwefindinthesourcematerials.
TableD-2describesthesubjectattributesinmoredetail.
ptg7481383
CodingProcess 329
Table D-2 SubjectInformationCollected
Subject Subcategory Information Collected in the Database
Descriptors Name, gender, age, citizenship, residence,
education, employee title/type/status,
departure date, tenure, access, position
Motives and Unmet
Expectations
Motives (financial, curiosity, ideology,
recognition, external benefit), unmet
expectation (promotion, workload, financial,
usage)
Concerning Behaviors Tardiness, insubordination, absences,
complaints, drug/alcohol abuse,
disgruntlement, coworker/supervisor conflict,
violence, harassment, poor performance,
poor hygiene, etc.
Violation History Security violations, resource
misuse, complaints, deception about
background
Consequences Reprimands, transfers, demotion, HR report,
termination, suspension, access revocation,
counseling
Substance Abuse Alcohol, hallucinogens, marijuana,
amphetamines, cocaine, sedatives, heroin,
inhalants
Planning and Deception Prior planning activities, explicit deceptions
Incident Data
Informationabouttheincidentincludesindividualactionstakentoset 
uptheattack,vulnerabilitiesexploitedduringtheattack,stepstakento 
concealit,howtheincidentwasdetected,andtheimpacttothevictim 
organization.Inaddition,whenavailable,dataiscollectedonactionstaken 
bytheorganizationinresponsetotheincident,andeventsandconditions 
thatmayhavecontributedtoaninsider’sdecisiontocarryoutanattack. 
TableD-3describestheincidentattributesinmoredetail.
ptg7481383
Appendix D. Insider Threat Database Structure
330
Table D-3 IncidentInformationCollected
Incident Subcategory Information Collected in the Database
Case Summary Incident dates, duration, prosecution
Conspirators Accomplices, type of collusion, relationships
to insider
Information Sources Origination, type
Incident Chronology Sequence, date, place, event
Investigation and Capture How identified and caught
Prosecution Result Indictment, subject’s story, sentence, case
outcome
Recruitment Outside/competitor induced, insider collusion,
outsider collusion, acted alone, reasons for
collusion
IT Accounts Used Subject’s, organization’s, system
administrator’s, database administrator’s,
coworker’s, authorized third party, shared,
backdoor
Outcome Data copied/deleted/read/modified/created/
disclosed, used in identity theft, unauthorized
document created, denial of service
Impact Description, financial
How Detected Software, information system, audit,
nontechnical, system failure
Who Detected Self-reported, IT staff, other internal;
customer, law enforcement, competitor, other
external
Log Files Used System files, email, remote access, ISP
Who Responded Incident response team, management, other
internal
Vulnerabilities Exploited Sequence of exploit, description, vulnerability
grouping
ptg7481383
CodingProcess 331
Technical Methods Technical methods used to set up and/or
carry out the attack (e.g., hardware device,
malicious code, modified logs, compromised
account, sabotaged backups, modified
backups)
Concealment Methods Concealment methods used to hide technical
and nontechnical methods
ptg7481383
This page intentionally left blank
ptg7481383
333
Appendix  E
InsiderThreat 
TrainingSimulation: 
MERITInterActive
Whileithaslongbeenunderstoodthatqualitytrainingisimperativeto 
organizationalsuccess,traditionaltrainingtechniquesdonotnecessarily 
resultinsignificantjob-performanceimprovementbecauseofthedifficulty 
ofeffectivelycapturingtherealityofcomplexchallengesandchanging 
prioritiesthatorganizationsface.Trainingonsubjectsinsuchcomplex 
domainsasinsiderthreatisoftendifficulttodesignbecauseitrequiresa 
balanceofpeople,processes,andtechnology.Wehavefacedthedifficulty 
oftransitioningcomplexlessonsaboutinsiderthreattoanaudiencethat 
mightprefertofocusonindividualaspectsoftheproblem,ratherthan 
the“bigpicture.”Thedangerinthisnarrowfocusisthatunintended 
consequencesofdecisionsarefeltthroughouttheorganization.
Traininggamesandsimulationsincomplexdomainsimmersethetraineein
ateam-oriented,role-playingexperiencethatmodelsimportantaspectsof
daily,mission-criticaloperationsinarealisticorganizationalcontext.Research
evidencesuggestssuchimmersioncanincreasecredibility,retention,andjob
performance,particularlyincomplextaskenvironments—environments
characterizedbylimitedinformation,complexfeedbackrelationships,con-
flictinggoals,anduncertaincausal  relationships.  Gamingandsimulation
ptg7481383
Appendix E. Insider Threat Training Simulation: MERIT InterActive
334
arebecomingincreasingly  importantforprovidingtrainingincomplex
socio-technicaldomainsefficientlyandeffectively.
Thisappendixdescribesourdevelopmentofatrainingsimulation,called 
MERITInterActive,forthecomplexsocio-technicaldomainofinsiderthreat 
[Greitzer2008].Thefirstsectionisgearedmoretowardaresearchaudience, 
providingbackgroundontheeffectivenessofvarioustrainingmecha-
nisms.ThesecondsectiondescribestheMERITInterActiveprototype,and 
willbeofmoreinteresttopractitioners.
Aswedescribein[Greitzer2008],MERITInterActive“immersesplayersin 
arealisticbusinesssettingfromwhichtheymakedecisionsabouthowto 
prevent,detect,andrespondtoinsideractionsandseehowtheirdecisions 
impactkeyperformancemetrics.Itprovidesateam-oriented,  role-playing
experienceusingmodel-basedsimulationofcriticalaspectsofinsider 
threatriskmanagementinarealisticorganizationalcontext.Teamorien-
tationiscriticalbecauseorganizationstypicallyidentifytheseproblems 
atanorganizationalenterpriselevelratherthananindividualmanager 
ordepartmentlevel.Roleplayingisalsocrucialbecausesolutionsgener-
allyrequirecollaborationamongmultiplestakeholders;roleplayinghelps 
playersunderstandandacquirethenecessaryskills.”
Background on Effectiveness of Various
Training Mechanisms
Ourresearchbeganwithcollectionandanalysisofempiricaldatafromactual
casesofinsiderfraud,theftofintellectualproperty,andITsabotage.Wesoon
realizedthedangerintrainingpractitionersusingstatisticaldata.Theywere
notgraspingthe“bigpicture”oftheinsiderthreatproblem.Becauseofthis
issue,wecreatedsystemdynamicsmodelsrepresentingthepatterns,trends,
andevolutionofinsiderincidents,toprovideafullerunderstandingofindi-
cators,precursors,andeffectiveproactiveandreactivecountermeasuresin
thefaceofapossibleattack.Someofthosemodelsareoutlinedinthisbook.
Wewerequitesatisfiedwiththereactiontoourmodels,asweseemedtobe
comingclosertoourgoalofraisingawarenessofthepeople,process,and
technologyissuessurroundinginsiderthreat.Atthatpointintime,oneof
ourU.S.DepartmentofDefense(DOD)sponsorsremarkedthatour  material
wascriticaltothemilitarycommandersinIraq,but  unfortunatelywehadno
methodforwidespreaddeliveryofthetraining,asouronlytrainingmech-
anismwasaface-to-faceworkshop.Asaresult,CarnegieMellon’sCyLab
ptg7481383
335BackgroundonEffectivenessofVariousTrainingMechanisms
fundeddevelopmentofMERITInterActive—aproofofconceptforaninsider
threattrainingsimulation.WehavediscussedanddemonstratedourMERIT
InterActiveprototypeatseveralgovernmentandindustrymeetingsandcon-
ferences,andhavereceivedpositivefeedback[Cappelli2006,Moore2007].
TheMERITInterActiveprototypeisbasedonsystemdynamics[Sterman
2000,Forrester1994].RefertoAppendixF,SystemDynamicsBackground,
formoreinformation.Thecombinationofsystemdynamicstocharacterize
thecomplex,feedback-richdomainofinsiderthreat,andaremotelyplayable
game-likeenvironmentforlearnerimmersion,seemstobeamatchmadein
heaven.Inthedomainofinformationsecurity,thepositiveeffectsoftraining
on performance have been demonstrated [Phelps 2006]. Training simulation
techniques can facilitate an organization’s difficult transition from a reactive
toaproactivemanagementculture[Moore2006].Lane[1995]andGroess-
ler[2004]reviewthehistoryoftrainingsimulationanddescribethevalue
ofandrequirementsforusingthesesimulationstoprovidemanagerswith
anintellectuallyandemotionallyrichandengagingeducationalexperience.
Businessmanagementtrainingsimulationpromotesmoreeffectivelearning
bydevelopingcriticalattitudesandboththeskillandconfidenceneededto
transitionlessonslearnedtoan  operationalenvironment.
Thebenefitsofincludinginteractivecontentintrainingcanbeseeninmany
areas.Forexample,atestoflearninginintroductoryphysicsclassescalled
theForceConceptInventory(FCI)foundthatlearningwasapproximately
doubleforthoseclasseswithaninteractivecomponentcomparedtolec-
turealone[Mayo2007].Inaddition,empiricalevidencesuggestsspecifically
thatcomputergamesandsimulationscanbeusedtoenhancelearningand
understandingincomplexdomains[Cordova1996,Ricci1996].Onesimu-
lator,calledtheManufacturingGame,hasbeenusedwithgreatsuccessata 
numberoforganizations.TheManufacturingGameallowsparticipantstosee
firsthandthebenefitsofmovingalow-performingorganizationstuckinreac-
tivemaintenancetoamoreproactivestanceinwhichplannedworkeliminates
themanufacturing-defectgenerators.Thechallengeforparticipantsistoresist
short-termpressurestoeliminatecostsdirectlyandfocusoneliminatingthe
workthatdrivesthecosts.Probablythemostprominentapplicationwasatthe
BritishPetroleumRefineryinLima,Ohio  [Repenning2001].Therefineryput
around80%ofitspersonnelthroughtheManufacturingGameworkshopsover
The combination of system dynamics to characterize the complex,
feedback-rich domain of insider threat, and a remotely playable game-like
environment for learner immersion, seems to be a match made in heaven.
ptg7481383
Appendix E. Insider Threat Training Simulation: MERIT InterActive
336
thecourseofaboutninemonths.TheManufacturingGameworkshopshelped
buildacommoncultureandvisionaroundcreatingamorereliableoperation.
Theworkshopsimprovedtherefinery’sbottomlinebymorethan$10million
annuallybyimprovingoutput,eliminatingwaste,andcuttingcosts.
Anothersimulationgamerelatedtoinformationsecurity,called 
CyberCIEGE,teachesnetworksecurityconceptsthroughaSimCity–styled 
simulation,andhasgarneredpositivefeedback[Cone2006].
The MERIT InterActive Prototype
CyLabfundedustoworkjointlywithastudent-ledteamatCarnegie  Mellon’s
EntertainmentTechnologyCenter(ETC)todevelopa  proof-of-concept,
multimediatrainingsimulationforinsiderthreat.Thisjointeffortusedan
evolutionaryprototypingdevelopmentmethodologythatinvolvedanitera-
tiveprocessofprototypingandrequirementsrefinement.Asshownalong
theleftandbottomsidesofFigureE-1,thedevelopmentoftheinsider
threat  modelsfromouranalysisofcasesintheCERTinsiderthreatdatabase
allowedustoidentifycriticallearningobjectivesandmetricsforthe  training.
TheinsiderITsabotagecasesalsohelpedidentifyfictionalscenariosrepre-
sentativeofapreponderanceoftheactualcasesasabasisforthestoryline
forthegame.Thisisshownalongtherightsideofthe  figure.Researchin
thefirst  semesterinvolveddevelopingthestorylineforthetrainingasan
expansionofthefictionalscenariothatwouldbeespeciallysuitedto  teaching
Figure E-1 Developmentofcase-basedtrainingsimulation
Modeling Training
Simulation
Case
Analysis
Learning
Objectives
Empirical
Data
Scenarios
Development
of Case-Based
Training Simulation
ptg7481383
337TheMERITInterActivePrototype
thelearningobjectives.Thesecondsemesterfocusedonthedevelopmentof
thesystemengineandauserinterfacethatusesstate-of-the-artgraphics,
video,andaudiotechnologiestobringthescenariotolife.
You,asaplayerofMeritInterActive,serveasanewteammanagerforacom-
panythathostsWebsitesandstoresinformationforclients.Asthemanager,
yourteammustmigratethecustomerdatabasetoaWeb-basedonlineser-
viceprovidingclientstheabilitytocustomizetheirservicefasterandmore
easily.Yourmissionistomeetthedeadlineestablishedformigratingthe
databasewhileadequatelymanagingtheteamthroughasetofbusiness
andinformationtechnologyprocesses.Whatyoudon’trealizeisthatoneof
yourteammembersisdisgruntledwiththenewmanagementsituationand
covertlyplanstoexecutealogicbombtodestroytheteam’swork.
Thecorestruggleyouface,whichmakesthegamechallengingandfun,is 
toensuretheteam’sprogresstowardprojectcompletionwhilemitigating 
theriskofinsiderattack.
Asinanyorganization,youworkwiththehumanresources(HR)  department
tomanagepeopleandwiththeinformationtechnology(IT)departmentto
manageIT.Thegamealsoengagesyouinregular(video)meetingswithyour
bosstogetfeedbackonhowwellyouaredoingandtogetadviceonfuture
directionsintermsofbothexecutionofthemigrationandmitigationofthe
riskofinsiderattack.FigureE-2showstheinterfaceforthegame.
Figure E-2 MERIT InterActiveinterface—information  technologyfloor
ptg7481383
Appendix E. Insider Threat Training Simulation: MERIT InterActive
338
Asthegameisplayed,ascenarioevolvesasaninterleavingoftheevents 
generatedbythegameandthemovesyougenerate(actingasnew  manager 
oftheteam).Theeventsincludethefollowing:
Actionsofthemaliciousinsider
Actionsofotherswithintheorganization
Decoyeventsandotherofficehappenings
Themovesincludeyouractionstodothefollowing:
Establishandmaintaingoodrelationswithemployees
Addressdisruptiveevents
Addressmaliciousevents
ImplementproactiveITpolicies,practices,andtechnology
ImplementHRpoliciesandpractices
Thegamehasabroadrangeofpotentialoutcomes,asshowninFigureE-3. 
Ontheleftendoftherange,youfailcompletely:Theattackissuccessful 
andtheprojectisdevastated.Ontherightend,yousucceed:Theinsider’s 
disgruntlementisassuagedandtheprojectmeetsthedeadlinesestab-
lished.Inthemoretypicalsituation,youractionsachievemixedsuccess 
inwhichtheattackissuccessfulandpartiallyrecoveredfrom,theattack 
executionisblocked,ortheinsiderisdisgruntledbuttheattackisdeterred. 
Asthegameproceedsyoumayhavetomakedecisionsthatforceyouto 
misstheprojectdeadlinetosomeextentinordertopreventinsiderattack 
ormitigateinsiderthreatrisk.
Thegoalofthegameistobalancetwogamemeasures:theProgress  Measure 
andtheRiskMeasure.Infact,thecorestruggleyoufaceisbalancingthese 
twomeasures.Themovesyouchoose,asmanagerfortheorganization, 
Figure E-3 Rangeof  game-playingresults
Attack
Successful;
Project
Devastated
Attack
Successful,
but Partial
Recovery
Not
Disgruntled;
Project
Succeeds
Disgruntled,
but Attack
Deterred
Attack
Attempted
but Blocked
ptg7481383
339TheMERITInterActivePrototype
shouldaffectthegamemeasuresinwell-definedways.Forexample, 
ITpolicies,practices,andtechnologiesputinplaceaffecttheamountof 
team resourcesdevotedtoproductdevelopment,inboth  positiveandneg-
ativeways.HRpoliciesandpracticesmayaffecttheteam’smorale,which 
inturnaffectstheteam’sproductivity.Addressingdisruptiveormalicious 
actionsmaytakeresourcesdirectlyawayfromprojectcompletion.The 
events  generatedbythegamearegoingtohavesimilareffectsonthegame 
measures.
Thekeythreadthroughthegamescenarioistheinteractionbetweenthe 
maliciousinsiderandyou,theteammanager.Ofcourse,thereareother 
happeningswithintheworkplace,includingeventsthatdothefollowing:
Contributetocompletingtheteam’sproject
Contributetomakingtheofficeaniceplacetowork,andthus 
improvingmorale
Disruptorinhibitprogressontheproject,orreducemorale,butarenot 
directlytiedtotheinsiderattack
Havenoimpactongameexecution,butimprovetherealismofthe 
charactersandsituation
Theseothereventsareinterleavedwiththekey(insiderthreat)threadand 
providetherealismoftheoverallplayerexperience.Oneadditionalthread 
concernsprogressontheteamproject—thedatabasemigration—thatwill 
reflectachievingkeymilestonesonthatproject(e.g.,productrequirements,
design,andimplementation).
Thekeythreadis,ofcourse,crucialtoteachingtheprimaryinsiderthreat 
lessons.Thekeythreadisbrokenintofourstages:
Stage1:ExpectationEscalation/Management
Stage2:DisgruntlementEscalation/Management
Stage3:AttackSetup/Monitoring
Stage4:AttackExecution/Recovery
Theendofeachstagecanbeviewedasagamecheckpoint.Thesestages 
arebasedontheMERITmodelofinsiderITsabotage,andthereforeform 
adirecttiefromthegametoourresearchandprovideaclearconnection 
for“coaching”youbyexplainingimportantmodelconceptsatthecheck-
points.Thepre-andpost-conditionsofeachstageaswellasexample 
ptg7481383
Appendix E. Insider Threat Training Simulation: MERIT InterActive
340
propertiesandlessonsofeachstagearedescribedinthesidebars.After 
yougothrougheachstage,thecheckpointprovidesvideo-supported 
playerfeedback,evaluation,andscoring.Ourgeneralstrategyisthat 
playersshouldlearnbyfailing,andimproving,inasafeenvironment.So, 
even  perfectperformanceonyourpartinourinitialprototypestillleads 
toenteringStage3(i.e.,aninsiderstartingtosetuptheattack),butgood 
performancecouldpreventtheinsiderfromenteringStage4(i.e.,attack 
execution).TableE-1providesanoverviewofeachstage.
ptg7481383
Table E-1 OverviewofMERITInterActiveStages
Stage Pre- condition Post- conditions
Example Properties of
the Scenario Example Key Lessons
Stage1:
Expectation 
Escalationand 
Management
An insider is
predisposed
to malicious
action.
Worst case: an insider
whose expectations have
been allowed to grow way
beyond what can be sup-
ported
Best case: an insider
whose expectations were
constrained to a level
consistent with a clearly
defined organizational
policy
Expectation escala-
tion is exhibited by
the insider’s height-
ened freedom or
recognition within the
organization, e.g., the
more the insider gets,
the more he wants,
and the more the
organization gives in
return (up to a point).
Management’s communi-
cation with its employees
concerning organizational
policies, appropriate
expectations in light of
those policies, and man-
agement’s consistent
enforcement of organiza-
tional policies can keep
insiders’ expectations from
growing beyond that which
can practically be fulfilled.
Stage2:
Disgruntlement 
Escalationand 
Management
The insider’s
unmet expec-
tations cause
disgrunt-
lement to an
extent that
he starts dis-
rupting the
workplace
(behaviorally).
Worst case: a seriously
disgruntled insider who is
motivated to set up a tech-
nical attack
Best case: an insider who
is given an appropriate
mechanism for dealing
with his disgruntlement
(e.g., employee-assistance
program referral)
Disgruntlement
escalation is exhib-
ited by the insider’s
increased behavioral
disruption within
the workplace in
response to man-
agement action (or
inaction).
Managers need to handle
the initial grievance
appropriately. They can
also play a key role in
providing the insider with
a mechanism to reduce
his disgruntlement level.
Continues
341
ptg7481383
Stage Pre- condition Post- conditions
Example Properties of
the Scenario Example Key Lessons
Stage3:Attack 
Setupand 
Monitoring
An insider is
disgruntled
to an extent
that he starts
setting up
a technical
attack.
Worst case: an insider who
is ready and willing to exe-
cute his technical attack
Best case: an organization
that is aware when the
insider takes technical
steps to set up the attack,
perhaps even preventing
the attack from occurring
Attack setup is exhib-
ited by the insider’s
move toward greater
concealment of his
disgruntlement and
increased technical
actions to set up and
amplify the impacts of
the impending attack.
Given an insider’s desire
to attack, management’s
knowledge of access
paths available to the
insider is essential for
beingable to prevent
an attack. Auditing can
help discover previously
unknown paths, but it
takes time to work. This
delay may be all the
insider needs to attack.
Stage4:Attack 
Executionand 
Recovery
An insider has
a technical
attack set up
and ready to
execute.
Worst case: an insider who
has attacked the organi-
zation’s systems and a
manager whose project is
destroyed
Best case: an organization
that is able to recover quickly
from the attack, minimizing
the operational and financial
impact, because of a proven
disaster recovery plan
If the insider’s desire
to attack upon termi-
nation is moderate
or if risk aversion is
high, discussions
post-termination that
emphasize the orga-
nization’s vigilance
may result in reducing
in reducing the insid-
er’s desire to attack.
Strong backup and recov-
ery plans and procedures
can lessen the impact
due to attack.
Table E-1 OverviewofMERITInterActiveStages(Continued)
342
ptg7481383
343Conclusion
Conclusion
Thecurrentprototypeprovidesacoherent,well-grounded,andengaging
environmentforteachingprimarylessonsformitigatingriskofinsiderIT
sabotage.Ourfutureresearchwillinvestigatetheeffectivenessoftraining
simulationforteachinginsiderthreatconcepts.Wehypothesizethatthose
experiencesthatengagethestudentwithdirect,masteryexperiences,suchas
wouldbethecasewithagamingorsimulationenvironment,wouldincrease
theindividual’sdomainself-efficacytoanextentgreaterthanwouldbethe
casewithjustavicarioustrainingsituation,suchasoftenoccurswithalec-
tureorworkshopenvironment.Ahybridapproachthatutilizesbothdirect
andvicariousexperience,however,shouldproduceevengreaterincreasesin
domainself-efficacythaneitherapproach  individually.
Whiletheparticularmediausedhasgenerallyshownnottosignificantly 
affectthequalityoflearning[Russell2001],theinstructionaldesignstrategy 
canplayalargeroleinparticipantlearningandperformanceimprovement. 
UtilizingBandura’sSocialCognitiveTheory,wewillexaminethenatureof 
therelationshipbetweeninsiderthreattrainingandeffectivenessofinsider 
threatmanagementasmeasuredbypre-andpost-trainingassessments 
ofdomainself-efficacy.Wewillalsoevaluatetheindividualandrela-
tiveeffectivenessofalternativetraditionaltrainingmodalities,bothwith 
andwithouttrainingsimulation.Finally,wewillevaluatetheindividual 
andcomparativeeffectivenessofdifferinginteractivecontentwithinthe 
trainingsimulation.
WhilethefocussofarhasbeenoninsiderITsabotage,thedesignis,tosome 
extent,data-drivenallowingtheimplementationofadditionalscenarios 
withoutnecessitatingchangestothecode.Usingthisapproach,theinitial 
releaseofMERITInterActivewouldincludetheITsabotagescenario,but 
subsequenteffortwouldimplementadditionalscenariosforinsiderfraud 
andinsidertheftofintellectualproperty,basedonthemodelsdescribedin 
thisbook.Futureworkinthisareawillrequireexperimentstodetermine 
howwellgameplayersarelearningimportantinsiderthreatdomainles-
sons.Webelievecontinuedresearchwillproducetrainingsimulationsfor 
insiderthreatthatwillhelpdecisionmakersmakemoreinformed  decisions 
aboutinsiderthreatriskmitigation.
ptg7481383
This page intentionally left blank
ptg7481383
345
Appendix  F
SystemDynamics 
Background
Thisappendixdescribesthesystemdynamicsmodelingmethodforthose 
ofyouwhomightbeinterestedinmoreinformationthanweprovidedin 
thechaptersdescribingourmodels.
Systemdynamicsisamethodformodelingandanalyzingtheholistic 
behaviorofcomplexproblemsastheyevolveovertime.Ithasbeenused 
togaininsightintosomeofthemostchallengingstrategyquestionsfac-
ingbusinessesandgovernmentforseveraldecades.Systemdynamics 
providesparticularlyusefulinsightintodifficultmanagementsituationsin 
whichthebesteffortstosolveaproblemactuallymaketheproblemworse. 
Examplesoftheseapparentlyparadoxicaleffectsincludethefollowing 
[Sterman2000]:
Low-nicotinecigarettes,supposedlyintroducedtothebenefitof 
smokers’health,thatonlyresultinpeoplesmokingmorecigarettesand 
takinglonger,deeperdragstomeettheirnicotineneeds
Leveesanddamsconstructedtocontrolfloodsthatonlyproducemore 
severefloodingbecausetheydisruptthenaturaldispersionanddissi-
pationofwater
Wefoundinourinsiderthreatresearchthatintuitivesolutionstoproblems
withemployeesoftenreducetheproblemintheshorttermbutmakeitmuch
ptg7481383
Appendix F. System Dynamics Background
346
worseinthelongterm.Forexample,employeeterminationmightsolvean
immediateproblem,butitmayalsoleadtolong-termproblemsfortheorga-
nizationiftheinsiderhasthetechnicalmeanstoattackthesystemfollowing
termination.Systemdynamicsisavaluableanalysistoolfor  gaininginsight
intolong-termsolutionsandfordemonstratingtheir  benefits.
Apowerfultenetofsystemdynamicsisthatthedynamiccomplexityof
problematicbehavioriscapturedbytheunderlyingfeedbackstructureof
thatbehavior.Wedecomposethecausalstructureoftheproblematicbehav-
iorintoitsfeedbackloopstounderstandwhichloopisstrongest(i.e.,which
loop’sinfluenceonbehaviordominatesallothers)atparticularpoints
throughtime.Wecanthenthoroughlyunderstandandcommunicatethe
natureofthe  problematicbehaviorandthebenefitsofalternative  mitigations.
Systemdynamicsmodelboundariesaredrawnsothatalltheenterprise 
elementsnecessarytogenerateandunderstandproblematicbehaviorare 
containedwithinthem.Thisapproachencouragestheinclusionofsoft 
(aswellashard)factorsinthemodel,suchaspolicy-related,procedural, 
administrative,orculturalfactors.Theexclusionofsoftfactorsinother 
modelingtechniquesessentiallytreatstheirinfluenceasnegligible,which 
isoftennotthecase.Thisendogenousviewpointhelpsshowthebenefitsof 
mitigationstotheproblematicbehaviorthatareoftenoverlooked,partly 
duetoanarrowfocusinresolvingproblems.
Inourworkwerelyonsystemdynamicsasatooltohelpunderstandand 
communicatecontributingfactorstoinsiderthreatsandimplicationsfor 
variousmitigationstrategiesandtactics.Itistemptingtousethesimulation 
ofthemodeltohelppredicttheoccurrenceofinsiderattacksortheeffectof 
mitigationstrategies,butwhatisthenatureofthetypesofpredictionsthat 
systemdynamicsfacilitates?DennisMeadowsoffersaconciseanswerby 
categorizingoutputsfrommodelsasfollows[Meadowsetal.1974]:
Absoluteandprecisepredictions(e.g.,exactlywhenandwherewillthe 
nextcyberattacktakeplace?)
Conditionalprecisepredictions(e.g.,howmuchwillitcostmy 
organizationifacyberattackoccurs?)
Conditionalimpreciseprojectionsofdynamicbehaviormodes(e.g., 
ifabankmandatesbackgroundchecksforallnewemployees,will 
its  damagesfrominsiderfraudbelessthantheywouldhavebeen 
otherwise?)
Currenttrendsthatmayinfluencefuturebehavior(e.g.,whateffectwill 
currenttrendsinespionagehaveonnationalsecurityinfiveyears?)
ptg7481383
347SystemDynamicsBackground
Philosophicalexplorationsoftheconsequencesofasetof  assumptions, 
withoutregardforthereal-worldaccuracyorusefulnessofthose 
assumptions(e.g.,ifanothercountrysucceedsinhumancloning,how 
wouldthisaffecttheriskofespionagefortheUnitedStates?)
Ourmodels—andsystemdynamicsmodelsingeneral—provideinfor-
mationofthethirdsort.Meadowsexplainsfurtherthat“thislevelof 
knowledgeislesssatisfactorythanaperfect,precisepredictionwouldbe, 
butitisstillasignificantadvanceoverthelevelofunderstanding  permitted 
bycurrentmentalmodels.”
Inthemodelsinthisbook,wehavemodifiedthesystemdynamicscausal 
loopdiagramnotationtobemoresuitableforourreaders.Arrowsstillrep-
resentthepair-wiseinfluenceofthevariableatthesourceofthearrowon 
thevariableatthetargetofthearrow,buttheirlookindicateshowthey 
shouldbeinterpreted.
Roughly,asolidarrowindicatesapositiveinfluence—thatthevalueof 
thesourceandtargetvariablesmovesinthesamedirection.1
Roughly,adashedarrowindicatesanegativeinfluence—thatthevalue 
ofthesourceandtargetvariablesmovesintheopposite  direction.2
Asmentioned,dynamicallycomplexproblemscanoftenbebest  understood 
intermsofthefeedbackloopsunderlyingthoseproblems.Therearetwo 
typesoffeedbackloops:balancingandreinforcing.
Balancingloopsdescribethesystemaspectsthatopposechange, 
tendingtodriveorganizationalvariablestosomegoalstate.Inother 
words,balancingloopstendtomovethesystemtoanequilibriumstate 
eveninthefaceofchange.Thebehaviorofathermostatisanexam-
pleofabalancingloop.Itcontinuallychangestheairflowintoaroom
basedonthetemperatureoftheroom,withthegoalofmaintainingan 
equilibriumtemperature.
1.  Moreformally,asolidarrowindicatesthatifthevalueofthesourcevariableincreases,thevalueof 
thetargetvariableincreasesabovewhatitwouldotherwisehavebeen,allotherthingsbeingequal. 
Andifthevalueofthesourcevariabledecreases,thevalueofthetargetvariabledecreasesbelowwhat 
itwouldotherwisehavebeen,allotherthingsbeingequal.
2.  Moreformally,adashedarrowindicatesthatifthevalueofthesourcevariableincreases,thevalue 
ofthetargetvariabledecreasesbelowwhatitwouldotherwisehavebeen,allotherthingsbeingequal. 
Andifthevalueofthesourcevariabledecreases,thevalueofthetargetvariableincreasesabovewhatit 
wouldotherwisehavebeen,allotherthingsbeingequal.
ptg7481383
Appendix F. System Dynamics Background
348
Reinforcingloopsdescribethesystemaspectsthattendtodrive  variable 
valuesconsistentlyupwardorconsistentlydownward.Inotherwords, 
reinforcingloopscan“spiraloutofcontrol.”Afluepidemicisanexam-
pleofareinforcingloop.Itspiralsoutofcontrolasmoreandmore 
peoplecontracttheflu.
Systemdynamicsmodelsaredescribedasasequenceoffeedbackloops 
thatcharacterizehowtheproblemunfoldsovertime.Eachfeedbackloop 
describesasingleaspectoftheproblem.Multiplefeedbackloopsinteract 
tocapturethecomplexitiesoftheproblemdomain.
Youcandeterminethetypeofafeedbackloopbycountingthenumberof 
negativeinfluencesalongthepathoftheloop.Anoddnumberofnega-
tiveinfluencesindicatesabalancingloop,andaneven(orzero)numberof 
negativeinfluencesindicatesareinforcingloop.
The Security Dynamics Network
TheSecurityDynamicsNetwork(SDN)isalargelyunfundedandloosely 
coordinatedgroupofnationallaboratoriesanduniversitiesapplyingsys-
temdynamicstoexploreissuesofcybersecurity,withaspecificfocuson 
insiderthreat.3TheSDNhasgatheredfivetimesatthememberinstitutions 
since2003andhasmetfrequentlyattheannualConferenceoftheSystem 
DynamicsSociety.Thegrouphasfocusedonthemaliciousinsiderthreat 
andhasbeenasourceofexpertise,information,andinspirationformany 
oftheinsiderthreatmodelsdevelopedinthisbook.TheSDNiscurrently 
beingmergedintoalargerSIGoftheSystemDynamicsSocietyonConflict, 
Defense,&Security.4
TheSDNhasconvenedthreegroupmodelingworkshopsatmember 
institutions,underthecollective(andsomewhatretrospective)titleof 
SystemDynamicsModelingforInformationSecurity(SDMIS).Group 
modelingbringstogetherexpertsfromavarietyofareastobuildmod-
elstogetherinawaythatachievesconsensusforthemodelsdeveloped. 
3.  SDNmembersincludeUniversityatAlbany;AgderUniversityCollege;TECNUN,Universityof 
Navarra;WorcesterPolytechnicInstitute;SandiaNationalLabs;ArgonneNationalLabs;andtheCERT 
ProgramattheSoftwareEngineeringInstitute.
4.  Atthetimeofthiswriting,theWebsitefortheConflict,Defense,&SecuritySIGatwww.ConflictSIG 
.orgwasunderconstruction.
ptg7481383
TheSecurityDynamicsNetwork 349
Webringtechnicalsecurityexpertstogetherwithinsiderthreatexperts 
andbehavioralscientiststobuildmodelsthatcoverthebroadspectrumof 
behavioralandtechnicalaspectsoftheproblem.
First SDMIS Workshop:Thefirstworkshop,inFebruary2003,wasattended 
byasmallnumberoforganizationsandheldatAgderUniversityCollege 
inGrimstad,Norway.Groupmodelingconductedtherefocusedonapar-
ticularinsiderwhoplantedalogicbombinanorganization’ssystemsthat 
hehelpedengineerbecausehefeltthatanewsystemadministratorhired 
abovehimintheorganizationwasincompetent.Thegrouppublished 
anumberofpapersinthe2003SystemDynamicsSocietyConference 
[Melara2003]andinabooktitledFrom Modeling to Managing Security:
A System Dynamics Approach,editedbyJoseGonzalez[Gonzalez2003].
Second SDMIS Workshop:TheSDNgrewnearlytoitspresentsizein
conveningthesecondworkshopheldinFebruary2004attheCERT
ProgramattheSoftwareEngineeringInstituteinPittsburgh.Groupmod-
elingfocusedonidentifyingpatternsacrossasetofsixactualcasesof
insidercompromise:Twoinsidersstoleforfinancialgain,twocreatedand
detonatedalogicbomb,andtwostolesoftwarecriticaltothecompany.
Thecasesvariedwidelyintermsoftheirtechnicalsophisticationand
primarymotivation.Theworkestablishedthe“dynamictrigger”hypoth-
esistoexplainthatthedynamicbehaviorsleadinguptoandtriggering
attackscanenablethedesignofmoreeffectivedefensestrategies.Results
weredocumentedatapublicWebsite,www.cert.org/research/sdmis/,
andinaconferencepaper[Andersen2004].Ourfollow-onwork,incol-
laborationwithoneSDNmember,Dr.EliseWeaver,thenfromWorcester
PolytecnicInstitute,ledtothedevelopmentoftheinsiderITsabotage
model[Cappelli2006].
Third SDMIS Workshop:TheSDNdecidedtofocusonaparticular 
classofinsidercrimes—insiderfraud—inthethirdworkshopheldin 
November2004,againattheSoftwareEngineeringInstituteinPittsburgh. 
Whilethegroupmodeldevelopedwasbasedonrealcasesofinsiderfraud 
fromtheCERTinsiderthreatdatabase,themodelwassetinthecontext 
ofarepresentative(instructional)casethatexhibitedmanyoftheprop-
ertiesoftherealcases.Asinsiderfraudcasestypicallyprogressover 
longerperiodsoftimethanothertypesofinsiderattacks,signaldetec-
tiontheoryandjudgmentanalysiswasincorporatedintothemodeland 
theresultusedinclassroomsettings.InadditiontoapaperattheSociety’s 
2005conference[Rich2005],anumberofjournalpaperswerepublished 
[Martinez-Moyano2006,  Martinez-Moyano2008].
ptg7481383
Appendix F. System Dynamics Background
350
TheSDNhadlimitedsuccessingettingfundingforcollaborationacross 
allmemberinstitutions,butwe’vegottentogethertoshareinformation 
andprogressinGrimstadandAlbany,withNATOsupport.Inaddition, 
individualmemberorganizationshavecontinuedtousesystemdynam-
icseffectivelyfortheirownbodiesofwork.Wehavecontinuedto 
developmodelsofinsiderthreatbasedontheCERTdatabaseofinsider 
crimes,asdescribedinthisbook[Moore2011a,Moore2011c,Moore2008, 
Moore2007].Sandiahasalsorecentlypublishedanemployeelife-cycle 
modeloftheevolutionofinsiderswithinanorganizationbasedoncases 
ofinsidercompromisethatithasidentified[Duran2009].Ofcourse,others 
outsidetheSDNhaverecognizedthevalueofsystemdynamicsmodel-
ingforthisdomain[Foroughi2008]andwelookforwardtoexpandingthe 
networkandthedomainofmodelingasweintegratewiththeConflict, 
Defense,&SecuritySIGoftheSystemDynamicsSociety.
ptg7481383
351
Glossary of Terms
access path: A sequence of one or more access points that lead to a critical
system.
Ambitious Leader: A leader of an insider crime who recruits insiders to
steal information for some larger purpose.
anonymous remailer: A server that receives email messages containing
embedded instructions on where to forward them. The server then
forwards the messages while also masking their originating location.
anti-spam blacklists: A system designed to block spam messages
through a system of IP address filtering. Often functions in tandem
with a content-recognition system.
backdoor account: An unauthorized account created for gaining access
to a system or network known only to the person who created it.
behavioral precursor: An individual action, event, or condition that
involves personal or interpersonal behaviors and that precedes and is
associated with malicious insider activity.
beneficiary organization: An organization that knowingly or unknow-
ingly gains an advantage from the incident to the detriment of the
victim organization.
change controls: Formal processes used to ensure that changes to a prod-
uct or system are introduced in a controlled and coordinated manner.1
1. Wikipedia
ptg7481383
352 Glossary of Terms
code reviews: A process to examine source code, typically by someone
other than the original coder, with the purpose of identifying and
addressing mistakes.
coded: In the context of insider threat case research, the details of a case
entered in a database according to a set of well-defined criteria.
data leakage tools: See data loss prevention (DLP) systems.
data loss prevention (DLP) systems: Refers to systems designed to
detect and prevent unauthorized use and transmission of confidential
information.2 Also commonly called data leakage tools.
denial-of-service attack: A type of cyberattack in which a large amount
of traffic is directed at a server in an attempt to disable it.
digital rights management (DRM): A term for access control technologies
that are used by hardware manufacturers, publishers, copyright
holders, and individuals to limit the use of digital content and devices.
digital watermarking: The process of embedding information into a
digital signal, which may be used to verify its authenticity or the iden-
tity of its owners, in the same manner as paper bearing a watermark
for visible identification.3
domain names: Host names tied to IP resources such as Web sites
(adapted from ICANN/Wikipedia).
economic espionage: The conscious and willful misappropriation of
trade secrets with the knowledge or intent that the offense will benefit
a foreign government, foreign instrumentality, or foreign agent.4
Entitled Independent: An insider, usually with some expectation of own-
ership or entitlement to organization property, acting primarily alone
to steal information to take to a new job or to his own side business.
event correlation: A technique for making sense of a large number of
events and pinpointing the few events that are really important in that
mass of information.5
2. Wikipedia
3. Wikipedia
4. See www.ncix.gov/publications/reports/fecie_all/fecie_2007/FECIE_2007.pdf.
5. Wikipedia
ptg7481383
Glossary of Terms 353
file integrity checker: A tool that partially automates the process of
identifying changes to system files or the addition of malicious code
and flagging them for investigation.6
File Transfer Protocol (FTP): A communication standard used to transfer
files from one host to another over a network, such as the Internet.7
fraud: See insider fraud.
HTTPS traffic: Network traffic that is encrypted via the Secure Sockets
Layer protocol.
identity crime: The misuse of personal or financial identifiers in order
to gain something of value and/or facilitate some other criminal
activity.8
identity management system: A system or technology that supports the
management of identities. It is generally accepted that an IMS will
establish identities, describe identities through one or more attributes,
follow identity activity, and be capable of removing an identity from
the system it manages (adapted from FIDIS).
industrial espionage: The conscious and willful misappropriation of
trade secrets related to, or included in, a product that is produced for,
or placed in, interstate or foreign commerce to the economic benefit of
anyone other than the owner, with the knowledge or intent that the
offense will injure the owner of that trade secret.9
insider fraud: An insider’s use of IT for the unauthorized modification,
addition, or deletion of an organization’s data (not programs or sys-
tems) for personal gain, or theft of information that leads to an identity
crime (e.g., identity theft, credit card fraud).
insider IT sabotage: An insider’s use of information technology (IT) to
direct specific harm at an organization or an individual.
insider theft of intellectual property: An insider’s use of IT to steal
proprietary information from the organization. This category includes
industrial espionage involving insiders.
6. See www.sans.org/resources/idfaq/integrity_checker.php for a discussion of file integrity checkers.
7. Wikipedia
8. This definition comes from the Secret Service Web site: www.secretservice.gov/criminal.shtml.
9. See www.ncix.gov/publications/reports/fecie_all/fecie_2007/FECIE_2007.pdf.
ptg7481383
Glossary of Terms
354
insider trading: The trading of a corporation’s stock or other securities
(e.g., bonds or stock options) by individuals with potential access to
nonpublic information about the company.10
intellectual property: Intangible assets created and owned by an
organization that are critical to achieving its mission.11
Internet relay chat (IRC) channel: Functionally similar to a multiuser
chat instance.
Internet underground: A collection of individuals with shared goals
where there is some degree of hierarchical structure and the primary
communication mechanism or agent of electronic crime involves the
Internet. Further, it may demonstrate some degree of pseudoanonym-
ity and/or secrecy, which may be useful for organizing and carrying
out electronic crimes.
IT sabotage: See insider IT sabotage.
keystroke logger (or key logger): A hardware or software device that
records the exact keystrokes entered into a computer system.
least privilege: Authorizing people only for the resources needed to do
their job.
logic bomb: Malicious code implanted on a target system and configured
to execute after a designated period of time or on the occurrence of a
specified system action.
malicious code: See malware.
malicious insider threat: A current or former employee, contractor,
or business partner who has or had authorized access to an orga-
nization’s network, system, or data and intentionally exceeded or
misused that access in a manner that negatively affected the confi-
dentiality, integrity, or availability of the organization’s information
or information systems.
malware: Code intended to execute a malicious function. Also commonly
referred to as malicious code.
national security espionage: The act of obtaining, delivering, transmit-
ting, communicating, or receiving information about the national
defense with an intent, or reason to believe, that the information
10. Wikipedia
11. While IP does not generally include individuals’ Personally Identifiable Information (PII), which
an organization does not own, it could include a database that the organization developed that
contains PII.
ptg7481383
Glossary of Terms 355
may be used to the injury of the United States or to the advantage of
any foreign nation. Espionage is a violation of 18 United States Code
sections 792–798 and Article 106, Uniform Code of Military Justice.12
network probing: Any number of practices in which a particular network
is either passively surveilled or actively scanned.
network sniffer (also known as a sniffer): A computer program or a
piece of hardware that can intercept and log traffic passing through a
network.
nonrepudiation: Ability to verify a particular user is accessing a system
or performing a particular action; the goal being to make it more
difficult for a user to hide illicit activity.
password cracker: A program used to identify passwords to a computer
or network resource; used to obtain passwords for other employee
accounts.
personal predisposition: A characteristic historically linked to a propen-
sity to exhibit malicious insider behavior.
privileged users: Users who have an elevated level of access to a
network, computer system, or application that is short of full system
administrator access. For example, database administrators (DBAs)
are privileged users because they have the ability to create new user
accounts and control the access rights of users within their domain.
proxies: A proxy server, more commonly known as a proxy, is a server
that routes network traffic through itself, thereby masking the origins
of the network traffic.
remote network administration tools: Tools to allow the administration of
a computer from a location other than the computer being administered.
removable media: Computer storage media that is designed to be
removed from the computer without powering the computer off.
Examples include CDs, USB flash drives, and external hard disk drives.
role-based access: Access required by a person’s duties. Typically, a
person’s access to data/systems should be no greater than what is
required of the person’s role.
rootkit: Software that enables continued privileged access to a computer
while actively hiding its presence from administrators by subverting
standard operating system functionality or other applications.
12. Dictionary of Military and Associated Terms. U.S. Department of Defense, 2005.
ptg7481383
Glossary of Terms
356
separation of duties: The separation of tasks among various individuals.
shared account: An account used by two or more people.
social engineering: A nontechnical form of intrusion that relies heavily
on human interaction and often involves tricking other people to break
normal security procedures.13
Software Development Life Cycle (SDLC): Synonymous with “software
process” as well as “software engineering,” it is a structured method-
ology used in the development of software products and packages.
This methodology is used from the conception phase through to the
delivery and end of life of a final software product.14
software keystroke logger: A software-based method of recording key-
strokes entered from a keyboard.
stressful events: Events that may cause concerning behaviors in individ-
uals predisposed to malicious acts.
system dynamics: An approach to understanding the behavior of
complex systems over time. It deals with internal feedback loops and
time delays that affect the behavior of the entire system.15
technical precursor: An individual action, event, or condition that
involves computer or electronic media and that precedes and is
associated with malicious insider activity.
theft of intellectual property: See insider theft of intellectual property.
thin client: A computer that does not run programs or store data itself,
but accesses programs and data over a network from a central
computer server.
TIFF images: Tagged Image File Format (or .tif) is a le type often used in
image-manipulation programs.
trusted business partner (TBP): Any external organization or individual
an organization has contracted to perform a service for the organiza-
tion. The nature of this service requires the organization to provide the
TBP authorized access to proprietary data, critical files, and/or inter-
nal infrastructure. For example, if an organization contracts with a
company to perform billing services, it would have to provide access
13. Whatis.com
14. Webopedia
15. MIT System Dynamics in Education Project (SDEP)
ptg7481383
Glossary of Terms 357
to its customer data, thereby establishing a trusted business partner-
ship. However, the TBP concept does not include cases in which the
organization is simply a customer of another company. For example,
when an organization uses a bank, it is simply a client of the bank.
This customer–vendor relationship would not be considered a TBP
relationship.
two-person rule: A control mechanism that requires the involvement of
two persons for a particular operation (adapted from Wikipedia).
unintentional insider threat: An insider who accidently affects the
confidentiality, availability, or integrity of an organization’s informa-
tion or information systems, possibly by being tricked by an outsider’s
use of social engineering.
unmet expectation: An unsatisfied assumption by an individual that an
organization action or event will (or will not) happen, or a condition
will (or will not) exist.
victim organization: An organization that is negatively impacted by
an incident.
virtual private network (VPN): A virtual network, built on top of
existing physical networks, that provides a secure communications
tunnel for data and other information transmitted between networks
(NIST SP 800-46).
VPN token: A device, possibly physical, that an authorized user of the
VPN is given to ease authentication.
watermarking: See Digital Watermarking.
ptg7481383
This page intentionally left blank
ptg7481383
359
References
[1] URLs are valid as of the publication date of this book.
[2] AICPA 2002 American Institute for CPA. Consideration of Fraud in a
Financial Statement Audit (AU 316.02). American Institute for CPA,
2002; www.aicpa.org/Research/Standards/AuditAttest/Download
ableDocuments/AU-00316.pdf.
[3] Alberts 2003 C. Alberts and A. Dorofee. Managing Information Security
Risks: The OCTAVE® Approach (Boston: Addison-Wesley, 2003).
[4] Andersen 2004 D.F. Andersen, D.M. Cappelli, J.J. Gonzalez,
M. Mojtahedzadeh, A.P. Moore, E. Rich, J.M. Sarriegui, T.J. Shimeall,
J.M. Stanton, E. Weaver, and A. Zagonel. “Preliminary System Dynamics
Maps of the Insider Cyber-Threat Problem.” In Proceedings of the 22nd
International Conference of the System Dynamics Society, July 2004.
[5] Band 2006 S.R. Band, D.M. Cappelli, L.F. Fischer, A.P. Moore,
E.D. Shaw, and R.F. Trzeciak. “Comparing Insider IT Sabotage and
Espionage: A Model-Based Analysis.” Software Engineering Institute
Technical Report CMU/SEI-2006-TR-026, Carnegie Mellon University,
December 2006; www.cert.org/archive/pdf/06tr026.pdf.
[6] Cappelli 2006 D.M. Cappelli, A.G. Desai, A.P. Moore, T.J. Shimeall,
E.A. Weaver, and B.J. Willke. “Management and Education of the Risk
of Insider Threat (MERIT): System Dynamics Modeling of Computer
System Sabotage.” In Proceedings of the 24th International Conference of
the System Dynamics Society, July 2006.
ptg7481383
[7] Cappelli 2007 D.M. Cappelli, A.G. Desai, A.P. Moore, T.J. Shimeall,
E.A. Weaver, and B.J. Willke. “Management and Education of the
Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to
Employers’ Information, Systems, or Networks.” Software Engineering
Institute Technical Note CMU/SEI-2006-TN-041, March 2007; www.sei
.cmu.edu/reports/06tn041.pdf.
[8] Cappelli 2008a D.M. Cappelli, T. Caron, R.F. Trzeciak, and A.P. Moore.
“Spotlight On: Programming Techniques Used as an Insider Attack
Tool.” Joint CyLab (CMU) and CERT (SEI) Report, December 2008; www
.cert.org/archive/pdf/insiderthreat_programmers_1208.pdf.
[9] Cappelli 2008b D.M. Cappelli, A.P. Moore, R.F. Trzeciak, and
T.J. Shimeall. “Common Sense Guide to Prevention and Detection
of Insider Threats: 3rd Edition.” Joint CyLab (CMU) and CERT (SEI)
Report, September 2008 (updated from July 2006 and April 2005);
www.cert.org/archive/pdf/CSG-V3.pdf.
[10] Cone 2006 B.D. Cone, M.F. Thompson, C.E. Irvine, and T.D. Nguyen.
“Cyber Security Training and Awareness Through Game Play.” In IFIP
International Federation for Information Processing, Volume 201, Security and
Privacy in Dynamic Environments; S. Fischer- Hubner, K. Rannenberg,
L. Yngstrom, and S. Lindskog, Eds. (Boston: Springer, 2006), pp. 431–436.
[11] Cordova 1996 D.I. Cordova and M.R. Lepper. “Intrinsic Motivation
and the Process of Learning: Beneficial Effects of Contextualization,
Personalization, and Choice.” Journal of Education Psychology 88:
pp. 715–730, 1996.
[12] Cressey 1974 D.R. Cressey. Other People’s Money: A Study in the Social
Psychology of Embezzlement (Montclair, NJ: Patterson Smith, 1972).
[13] CSO 2011a CSO Magazine, Secret Service, Software Engineering
Institute CERT Program at Carnegie Mellon University, and Deloitte.
2011 CyberSecurity Watch Survey: Press Release, January 2011; www
.cert.org/archive/pdf/CyberSecuritySurvey2011.pdf.
[14] CSO 2011b CSO Magazine, Secret Service, Software Engineering
Institute CERT Program at Carnegie Mellon University, and Deloitte.
2011 CyberSecurity Watch Survey: Data, January 2011; www.cert.org/
archive/pdf/CyberSecuritySurvey2011Data.pdf.
[15] Duran 2009 F.A. Duran, S.H. Conrad, G.N. Conrad, D.P. Duggan,
and E.B. Held. “Building a System for Insider Security.” IEEE Security
and Privacy, pp. 30–38, November/December 2009.
References
360
ptg7481383
References 361
[16] Foroughi 2008 F. Foroughi. “The Application of System Dynamics for
Managing Information Security Insider-Threats of IT Organization.”
In Proceedings of the World Congress on Engineering 2008, Vol. I, WCE
2008, July 2–4, 2008, London, U.K.
[17] Forrester 1994 J.W. Forrester. “Learning through System Dynamics
as Preparation for the 21st Century.” Keynote address for Systems
Thinking and Dynamic Modeling Conference for K–12 Education, 1994.
[18] Gonzalez 2003 J.J. Gonzalez, Ed. From Modeling to Managing Security:
A System Dynamics Approach. Vol. 35, Research Series (Kristiansand,
Norway: Norwegian Academic Press, 2003).
[19] Greitzer 2008 F.L. Greitzer, A.P. Moore, D.M. Cappelli, D.H. Andrews,
L.A. Carroll, and T.D. Hull. “Combating the Insider Cyber Threat.”
IEEE Security and Privacy 6(1): January/February 2008.
[20] Groessler 2004 A. Groessler. “Don’t Let History Repeat Itself
Methodological Issues Concerning the Use of Simulators in
Teaching and Experimentation.” System Dynamics Review 20(3):
pp. 263–274, 2004.
[21] Hanley 2009 M. Hanley, A.P. Moore, D.M. Cappelli, and
R.F. Trzeciak. “Spotlight On: Malicious Insiders with Ties to
the Internet Underground Community.” Joint CyLab (CMU) and
CERT (SEI) Report, March 2009; www.cert.org/archive/pdf/
CyLab%20Insider%20Threat%20Quarterly%20on%20Internet%20
Underground%20-%20March%202009P.pdf.
[22] Hanley 2010 M. Hanley. “Candidate Technical Controls and
Indicators of Insider Attack from Socio-Technical Models and Data.”
In Proceedings of the 2010 NSA Center of Academic Excellence (CAE) Work-
shop on Insider Threat, November 2010 (also published as SEI Technical
Note CMU/SEI-2011-TN-003, January 2011).
[23] Hanley 2011a M. Hanley, J. Montelibano. “Insider Threat Control:
Using Centralized Logging to Detect Data Exfiltration Near Insider
Termination.” SEI Technical Note CMU/SEI-2011-TN-024, Software
Engineering Institute, Carnegie Mellon University, October 2011.
[24] Hanley 2011b M. Hanley, T. Dean, W. Schroeder, M. Houy,
R. F. Trzeciak, and J. Montelibano. “An Analysis of Technical
Observations in Insider Theft of Intellectual Property Cases.” SEI
Tec hn ica l No te CM U/S EI -20 11 -T N-0 06 , Software Engineering Institute,
Carnegie Mellon University, 2011.
ptg7481383
References
362
[25] Keeney 2005 M.M. Keeney, E.F. Kowalski, D.M. Cappelli, A.P. Moore,
T.J. Shimeall, and S.N. Rogers. “Insider Threat Study: Computer
System Sabotage in Critical Infrastructure Sectors.” Joint SEI and
U.S. Secret Service Report, May 2005; www.cert.org/archive/pdf/
insidercross051105.pdf.
[26] King 2011 C. King. “Spotlight On: Malicious Insiders and Organized
Crime Activity.” SEI Technical Note CMU/SEI-2011-TN-025,
September 2011.
[27] Kowalski 2008a E.F. Kowalski, M.M. Keeney, D.M. Cappelli, and
A.P. Moore. “Insider Threat Study: Illicit Cyber Activity in the
Information Technology and Telecommunications Sector.” Joint SEI
and U.S. Secret Service Report, January 2008; www.cert.org/archive/
pdf/insiderthreat_it2008.pdf.
[28] Kowalski 2008b E.F. Kowalski, T. Conway, S. Keverline, M. Williams,
D. McCauley, D.M. Cappelli, B.W. Willke, and A.P. Moore. “Insider
Threat Study: Illicit Cyber Activity in the Government Sector.” Joint
SEI and U.S. Secret Service Report, January 2008; www.cert.org/
archive/pdf/insiderthreat_gov2008.pdf.
[29] Lane 1995 D. Lane. “On a Resurgence of Management Simulations
and Games.” The Journal of the Operational Research Society 46(5):
pp. 604–625, 1995.
[30] Martinez-Moyano 2006 I. Martinez-Moyano, E. Rich, S.H. Conrad,
and D. Andersen. “Modeling the Emergence of Insider Threat
Vulnerabilities. Informs Winter Simulation Conference, Monterey,
CA, 2006.
[31] Martinez-Moyano 2008 I. Martinez-Moyano, E. Rich, S.H. Conrad,
D. Andersen, and T. Stewart. “A Behavioral Theory of Insider-Threat
Risks: A System Dynamics Approach.” ACM Transactions on Modeling
and Computer Simulation 18(2): 2008. Abstract.
[32] Mayo 2007 M.J. Mayo. “Games for Science and Engineering
Education.” Communications of the ACM 50(7): pp. 31–35, July 2007.
[33] Meadows 1974 D.L. Meadows, W.W. Behrens, D.H. Meadows,
R.F. Naill, J. Randers, and E.K.O. Zahn. Dynamics of Growth in a Finite
World (Cambridge, MA: Wright-Allen Press, Inc., 1974).
[34] Melara 2003 C. Melara, J.M. Sarriegui, J.J. Gonzalez, A. Sawicka, and
D.L. Cooke. “A system dynamics model of an insider attack on an
ptg7481383
References 363
information system.” In Proceedings of the 21st International Conference
of the System Dynamics Society, New York City, July 20–24, 2003.
[35] Montelibano 2011 J. Montelibano. “Insider Threat Control: Using
a SIEM Signature to Detect Potential Precursors to IT Sabotage.”
CERT Program Technical Report, SEI Technical Note CMU/SEI-2011-TN-
021, Software Engineering Institute, Carnegie Mellon University,
April 2011.
[36] Moore 2006 A.P. Moore and R.S. Antao. “Improving Management of
Information Technology: System Dynamics Analysis of IT Controls
in Context.” In Proceedings of the 24th International System Dynamics
Conference, July 2006.
[37] Moore 2007 A.P. Moore, D.M. Cappelli, H. Joseph, and R.F. Trzeciak.
“An Experience Using System Dynamics to Facilitate an Insider
Threat Workshop. In Proceedings of the 25th International Conference of
the System Dynamics Society, July 2007; www.cert.org/archive/pdf/
ISDC2007.pdf.
[38] Moore 2008 A.P. Moore, D.M. Cappelli, and R.F. Trzeciak. “The ‘Big
Picture’ of Insider IT Sabotage Across U.S. Critical Infrastructures.”
In Insider Attack and Cyber Security: Beyond the Hacker. S.J. Stolfo et al.,
Eds., Springer Science + Business Media, LLC, 2008 (also published in
SEI Technical Report - CMU/SEI-2008-TR-009); www.cert.org/archive/
pdf/08tr009.pdf).
[39] Moore 2009 A.P. Moore, D.M. Cappelli, T. Caron, E. Shaw, and
R.F. Trzeciak. “Insider Theft of Intellectual Property for Business
Advantage: A Preliminary Model.” In Proceedings of the 1st International
Workshop on Managing Insider Security Threats (MIST2009), Purdue
University, West Lafayette, IN, June 16, 2009; www.cert.org/insider_
threat/docs/Insider_Theft_of_IP_Model_MIST09.pdf.
[40] Moore 2011a A.P. Moore, D.M. Cappelli, T. Caron, E. Shaw, and
R.F. Trzeciak. “A Preliminary Model of Insider Theft of Intellectual
Property.” Journal of Wireless Mobile Networks, Ubiquitous Computing,
and Dependable Applications 2(1), Special Issue: Addressing Insider
Threats and Information Leakage, 2011, pp. 28–49 (also published as
SEI Technical Note CMU/SEI-2011-TN-013).
[41] Moore 2011b A.P. Moore, A. Cummings, and D. Spooner. Modeling
and Analysis of Insider Fraud.” In 2010 CERT Research Annual
Report, 2011.
ptg7481383
References
364
[42] Phelps 2006 D. Phelps and J. Gathegi. “Information Security
Self-Efficacy.” In Proceedings of the 2006 Americas Conference on
Information Systems (AMCIS 2006), Acapulco, Mexico, August 2006.
[43] Randazzo 2004 M.R. Randazzo, M.M. Keeney, E.F. Kowalski,
D.M. Cappelli, and A.P. Moore. “Insider Threat Study: Illicit Cyber
Activity in the Banking and Finance Sector.” Joint SEI and U.S.
Secret Service Report, August 2004; www.secretservice.gov/ntac/its_
report_040820.pdf.
[44] Repenning 2001 N. Repenning and J.D. Sterman. “Nobody Ever
Gets Credit for Fixing Problems That Never Happened: Creating
and Sustaining Process Improvement.” California Management Review
43(4): pp. 64–88, 2001.
[45] Ricci 1996 K. Ricci, E. Salas, and J.A. Cannon-Bowers. “Do computer
based games facilitate knowledge acquisition and retention?” Military
Psychology 8(4): pp. 295–307, 1996.
[46] Rich 2005 E. Rich, I.J. Martinez-Moyano, S. Conrad, D.M. Cappelli,
A.P. Moore, T.J. Shimeall, D.F. Andersen, J.J. Gonzalez, R.J. Ellison,
H.F. Lipson, D.A. Mundie, J.M. Sarriegui, A. Sawicka, T.R. Stewart,
J.M. Torres, E.A. Weaver, and J. Wiik. “Simulating Insider
Cyber-Threat Risks: A Model-Based Case and a Case-Based Model.”
In Proceedings of the 23rd International Conference of the System
Dynamics Society, July 2005; www.cert.org/insider_threat/docs/
insider_threatISDC2005.pdf.
[47] Spooner 2008 D. Spooner, D.M. Cappelli, A.P. Moore, and
R.F. Trzeciak. “Spotlight On: Insider Theft of Intellectual Property
inside the U.S. Involving Foreign Governments or Organizations.”
Joint CyLab (CMU) and CERT (SEI) Report, December 2008; www.cert.
org/archive/pdf/insiderthreat_programmers_1208.pdf.
[48] Sterman 2000 J.D. Sterman. Business Dynamics: Systems Thinking and
Modeling for a Complex World (McGraw-Hill, 2000).
[49] Weiland 2010 R.M. Weiland, A.P. Moore, D.M. Cappelli, R.F. Trzeciak,
and D. Spooner. “Spotlight On: Insider Threat from Trusted Business
Partners.” Joint CyLab (CMU) and CERT (SEI) Report, February 2010;
www.cert.org/archive/pdf/TrustedBusinessPartners0210.pdf.
ptg7481383
365
About the Authors
Dawn Cappelli, CISSP, is technical manager of
the CERT Insider Threat Center and the Enterprise
Threat and Vulnerability Management Team at
Carnegie Mellon University’s Software Engineering
Institute. She has devoted the past ten years of her
career to helping organizations in government and
industry to protect themselves from the ultimate
betrayal of trust: insider threats. She works with
the Secret Service, U.S. Department of Homeland
Security, U.S. Department of Defense, and other
government agencies and private organizations.
She leads a team of more than 30 security analysts who address real-world
problems by performing modeling and analysis, creating practical solutions,
and disseminating solutions broadly to government and industry. Dawn has
more than 30 years of experience in software engineering, technical project
management, information security, and research. She is often an invited
speaker at national and international venues, is adjunct professor in Carnegie
Mellon’s Heinz College of Public Policy and Management, and is vice-chair
for the CERT Computer Security Incident Handler Certification Advisory
Board. She is on the program committee for several prominent security
conferences, and was recently awarded the Software Engineering Institute
Director’s Office Award of Excellence. Before joining CMU in 1988 she worked
for Westinghouse as a software engineer developing nuclear power systems.
She spends every spare moment she can at her cabin in the mountains with
her family, and volunteers her time for the Friends of Flight 93.
ptg7481383
366 About the Authors
Andrew P. Moore is a lead researcher in the CERT
Insider Threat Center and senior member of the
technical staff at Carnegie Mellon University’s
Software Engineering Institute. He explores ways
to improve the security, survivability, and resiliency
of enterprise systems through insider threat and
defense modeling, incident management, and
architecture engineering and analysis. Andy also
works with teams across the SEI applying modeling
and simulation techniques to hard system and
software engineering problems. Before joining
the SEI in 2000, he worked for the Naval Research Laboratory (NRL)
investigating high-assurance system development methods for the U.S.
Navy. He has more than 20 years of experience developing and applying
mission-critical system analysis methods and tools, leading to the transfer
of critical technology to both industry and the military. Andy has served as
principal investigator on numerous projects sponsored by NSA and DARPA;
has served on numerous computer assurance and security conference
program committees and working groups; and has published two book
chapters and a wide variety of technical journal and conference papers.
His research interests include computer and network attack modeling and
analysis, IT management control analysis, survivable systems engineering,
formal assurance techniques, and security risk management. Andy received
a master’s degree in computer science from Duke University, a bachelor’s
degree in mathematics from the College of Wooster, and a graduate
certificate in system dynamics from Worcester Polytechnic Institute.
Randall F. Trzeciak is currently the technical
team lead for the Insider Threat Research Group
in the CERT Insider Threat Center and senior
member of the technical staff at Carnegie Mellon
University’s Software Engineering Institute. The
team focuses on insider threat research, exploring
both the technical and nontechnical ways in
which insiders have harmed organizations; threat
analysis and modeling; and incident management.
Prior to joining Carnegie Mellon University
in 1999, he worked for nine years at Software
Technology Incorporated in Alexandria, Virginia, supporting multiple
contracts primarily at the Naval Research Laboratory (NRL), building and
supporting large-scale information systems. Randy has more than 20 years
of experience in software engineering; project management; information
ptg7481383
367About the Authors
security; and database design, development, and maintenance. For more
than ten years, Randy has been an adjunct faculty member at Carnegie
Mellon’s Heinz College of Information Systems and Management. He was
invited to chair the Security and Risk track at the 2012 SEPG Conference.
Randy regularly represents the Insider Threat Center by speaking at security
conferences around the United States and has also spoken internationally.
Randy holds a master’s degree in management from the University of
Maryland, and bachelor’s degrees in management information systems
and business administration from Geneva College.
ptg7481383
This page intentionally left blank
ptg7481383
369
A
Acceptable use policies for sabotage, 42, 48
Acceptable workplace behavior, 168
Access and access controls
Ambitious Leader model, 80–81
description, 179
erosion of, 71, 189
fraud, 125
Internet underground, 291–292
logs, 172–173
remote, 90–92, 200–201
SDLC, 132–133
separation of duties and least privilege,
178–181
source code, 131, 142
system change controls, 193
after termination, 203–206
Access paths
eliminating, 50–52
sabotage, 40–45
Access rights management, 284
Accomplices
fraud, 103, 121, 269
information collection on, 328
theft of IP, 86
Accountability of third-party vendors, 57
Accounts and account management
expiration dates, 234
organized crime, 118
policies and practices, 174–177
for sabotage, 45, 52
terminated employees, 203–204
Accumulation of privileges, 71
ACH (Automated Clearing House)
system, 276
Index
Active Directory, 234–235, 237
Administrator passwords for unknown
access paths, 50
Advanced targeting for centralized logging,
237–238
Aggressive behavior as sabotage
precursor, 36
Agreements, IP, 157, 168–169
Agricultural products firm fraud case,
266–267
Alarms, 172
Alerts, prioritizing, 53–54
Ambitious Leader model
access, 80–81
organization discovery of theft, 81
overview, 78–79
risk assessment, 81–83
theft of IP, 64, 68–70
theft planning, 79–80
American Institute for Certified Public
Accountants, 108
“Analysis of Technical Observations in
Insider Theft of Intellectual Property
Cases,” 216
Annual Report to Congress on Foreign
Economic Collection and Industrial
Espionage, FY07, 83
Anonymous remailer fraud, 109
Anti-spam blacklists, 26
ArcSight environment, 223, 228, 230
Arrests history in background checks, 164
Arrows in system dynamics
modeling, 347
Assessment, risk and threat, 81–83, 151–154,
304–305
ptg7481383
Index
370
Attachments
detecting, 235–236
fraud case, 109, 265–266
large, 77, 93, 197
logging, 233–234
theft of IP, 81, 89, 95
Attribution in SDLC, 137
Audits
critical and irregular processes, 120–121
database transactions, 123
employee online actions, 195–199
HTTPS traffic, 66
passwords and account management, 175
for sabotage, 24
Authentication
multifactor, 172
SDLC, 132–133
social engineering, 126
unauthorized credentials, 141, 271
Authenticity, digital watermarking for, 65
Author biographies, 365–367
Authorization
Ambitious Leader model, 80–81
DNS registration, 291
maintaining, 185
online, 179
organized crime, 118
remote access, 200
SDLC, 130
updating, 56
Authorized system overrides
SDLC, 132
system design, 183
Auto parts manufacturer theft of IP case, 262
Automated Clearing House (ACH)
system, 276
Automation
backdoor account detections, 195
centralized logging, 237–238
email for access control, 71
integrity checking, 134, 195
limitations, 14
separation of duties in, 131
system change controls monitoring, 193
Availability
SDLC, 130
threats impact on, 152
B
Backdoors
automated detection, 195
government theft of IP cases, 260–261
Internet underground, 290
logistics company sabotage case, 256
privileges, 175–176
remote attacks, 201–202
sabotage, 24, 40, 44–45
SDLC, 136, 184
terminated employees, 203
Background checks
financial problems, 124
functions, 164
sabotage, 30–31
subcontractors, 166–167
Backups
Ambitious Leader model, 82–83
best practices, 207–210
change, 192
fraud case, 268–269
physical protection, 172
sabotage, 24, 40, 44–45, 139, 208, 256
sabotage/fraud case, 258
SDLC, 138–139
single system administrators, 205
testing, 57–59
Badges, 171
Balancing loops in system dynamics
modeling, 347
Banking and finance industry
case prevalence, 307
foreign theft of IP, 87
fraud cases, 264–265
fraud losses, 104–105
Insider Threat Study, 19
miscellaneous case, 270–271
sabotage cases, 243–245
sabotage/fraud cases, 257
Basic Analysis and Security Engine (BASE)
user interface, 221
Behavioral concerns
monitoring and responding to, 164–167
sabotage precursors, 35–37
security awareness training for, 159
Beneficiary organizations, 327
ptg7481383
Index 371
Benefit disagreements as dissatisfaction
factor, 73
Best practices
in 2005, 17
backup and recovery processes, 207–210
employee online actions, 195–199
enterprise-wide risk assessments, 151–154
incident response plans, 211–213
monitoring and responding to suspicious
and disruptive behavior, 164–167
negative workplace issues, 168–170
overview, 145–146
password and account management
policies and practices, 174–177
physical environment, 171–173
policies and controls, 155–158
remote attacks, 200–202
SDLC, 182–186
security awareness training, 159–163
separation of duties and least privilege,
178–181
summary, 146–150, 213–214
system administrators and technical and
privileged users, 187–190
system change controls, 191–194
termination, 203–206
“Big Picture” of Insider IT Sabotage Across
U.S. Critical Infrastructures, 12
Bizarre behavior as sabotage precursor, 36
Bonus issues
fraud case, 265
policies, 155
sabotage from, 32–34, 158, 189, 244–245, 253
SDLC, 136, 142, 185
British Petroleum Refinery, 335
Business advantage, theft of IP for, 62
Business management training simulation,
335
Business partners. See Trusted business
partners (TBPs)
Business plans theft, 95
C
Cameras
cell phone, 281
closed circuit, 172
Canada, theft of IP in, 85
Cappelli, Dawn
best practices, 145
biography, 365
Internet underground, 286
SDLC, 139
theft of IP, 65, 83
trusted business partners, 276
Caron, Thomas
SDLC, 139
theft of IP threats, 65
Case-based training simulation, 336
Case breakdown
country, 316–317
current employees vs. former, 314
employees vs. contractors, 313
international cases, 315–317
sectors, 307–309
technical vs. nontechnical insiders,
314–315
trends over time, 312–313
type of crime, 309–312
Case examples, 241
backup and recovery processes, 209–210
employee online actions, 198–199
enterprise-wide risk assessments, 152–154
fraud. See Fraud cases
incident response plans, 212–213
miscellaneous, 269–273
monitoring and responding to suspicious
and disruptive behavior, 166–167
password and account management
policies, 176–177
physical environment, 173
policies and controls, 156–158
positive outcomes, 296–297
remote attacks, 201–202
sabotage cases. See Sabotage cases
sabotage/fraud cases, 256–258
SDLC, 185–186
security awareness training, 162–163
separation of duties and least privilege,
180–181
system administrators and technical and
privileged users, 189–190
system change controls, 192–194
terminated employees, 205–206
ptg7481383
Index
372
Case examples (contd.)
theft of IP. See Theft of IP cases
trusted business partners, 276–277
Categories of threats, 8–9
ccTLD (code top-level domains), 235
CEE (Common Event Expression), 223,
229–230
CEF (Common Event Format), 223, 228–229
Centralized logging
advanced targeting and automation,
237–238
appliances, 197
conclusion, 239
overview, 231–233
Splunk rules, 235–237
termination monitoring, 233–235
CERT
insider threat center. See Insider threat
center
MERIT. See MERIT (Management and
Education of the Risk of Insider
Threat) project
Changes
change management software, 53–54
controls, 191–194
in employment status, theft of IP, 98
in policies and controls, sabotage
from, 35
Changing passwords for sabotage, 42
Characterization of configurations, 191–192
Chemical industry cases, 87, 258–259
China, theft of IP in, 85
Cigarettes, low-nicotine, 345
Citizenship in theft of IP, 85
City government fraud losses, 105
Classified information, theft of, 67
Closed circuit cameras, 172
Code, defined, 326
Code reviews
benefits, 10–11
formal, 142
SDLC, 136–137
Code top-level domains (ccTLD), 235
Coding process
incident data, 329–331
organization data, 327–328
subject data, 328–329
Collection of data, 325–326
Collusion, 1
complexity of, 6
fraud, 111–113, 117, 134–135, 294
SDLC, 183
separation of duties, 179–180
system design, 183
theft of IP, 194
Commercial facilities industry
case prevalence, 308–310
foreign theft of IP, 87
fraud cases, 263, 265–266
sabotage cases, 242, 245
trusted business partner cases, 278
Common Event Expression (CEE), 223,
229–230
Common Event Format (CEF), 223, 228–229
“Common Sense Guide to Prevention and
Detection of Insider Threats,” 17
Communication for sabotage, 34
Compensating measures for
disgruntlement, 49
Competing businesses, foreign theft of IP
for, 88
Competitors, email to, 77
Complexity of insider threats, 6–7
Compromised accounts in organized
crime, 118
Compromised passwords in fraud, 125–126
Concealment in theft of IP, 95
Conditional projections, 346
Confidentiality
in reporting, 161
SDLC, 130
threats impact on, 152
training about, 162
Conflicts, sabotage from, 35
Consistency checks in SDLC, 183
Consistent enforcement for sabotage, 34, 168
Conspirators in theft of IP, 86
Consultants
food industry sabotage case, 248
information technology sabotage case,
250–251
source code modification, 140–142
Consumer credit database fraud case, 264
Contentious employee terminations, 35
Contractors and third parties
background checks, 166–167
ptg7481383
Index 373
backups, 57
defense industrial base sabotage case, 246
vs. employees, 313
energy industry sabotage case, 247–248
enterprise-wide risk assessments, 152
fraud cases, 266
government sabotage case, 248–249
government theft of IP cases, 260–261
health care fraud case, 269
kiosk access case, 153
ownership case, 156–157
password and account management
policies, 175–176
password cracking case, 154
physical security, 173
sabotage, 39, 44–45
theft of IP, 73
unauthorized access case, 272–273
Contracts with trusted business partners, 285
Contribution perception in Entitled
Independent
model, 70–72
Controlled information documents, 173
Controls
access. See Access and access controls
best practices, 155–158
change, 191–194
documenting, 155–158
Copied documents as theft of IP indicator, 77
Corporate fraud, 103
Countries
case breakdown by, 316–317
cultural differences, 6
in theft of IP, 85
Coworkers in fraud recruitment, 113–115,
121–123
Crackers, 40
Credentials
information technology sabotage case, 255
Snort for, 220–221
termination sabotage case, 245
unauthorized, 141
Credit card debt as fraud factor, 109
Credit card number verification program
case, 255
Credit database fraud case, 264
Credit histories fraud losses, 105
Cressey, Donald, 106
Crime
case breakdown by, 309–312
types, 8–9, 116
Criminal history
in background checks, 164
information technology sabotage case,
30–31, 255–256
Internet underground, 290
Critical business functions, outsourcing, 152
Critical data modification verification, 123
Critical infrastructure, protecting, 172
Critical processes, auditing, 120–121
Cultural differences in threats, 6
Cummings, Adam, 102
Currency trader case, 180
Current employees vs. former, 314
Custodial staff training, 162–163
Customer records stolen cases, 272
Customer service processes, training for,
160–161
CyberCIEGE game, 336
CyberSecurity Watch Survey, 319–323
CyLab
fraud modeling, 105
insider threat assessment sponsored by,
17–18
MERIT InterActive. See MERIT InterActive
tool
workshops, 17
D
Dashed arrows in system dynamics
modeling, 347
Data audits, 195
Data collection for database, 325–326
Data integrity in SDLC, 134, 183
Data leakage tools, 65, 77, 197
Data loss prevention (DLP) systems, 65, 77
Database administrators
government sabotage case, 249
Internet underground, 292
privileges, 149
sabotage/fraud case, 257
shared accounts, 44, 52
Database breakdown of cases, 7–9
country, 316–317
current employees vs. former, 314
ptg7481383
Index
374
Database breakdown of cases (contd.)
employees vs. contractors, 313
international cases, 315–317
sectors, 307–309
technical vs. nontechnical insiders, 314–315
trends over time, 312–313
type of crime, 309–312
Databases, 325
coding process, 327–331
data collection, 325–326
password cracking case, 154
SIEM analysis, 225–227
transactions auditing, 123
DC (domain controller), 235–236
DC3 (Defense Cyber Crime Conference), 219
Deactivating access after termination,
203–206
Dean, Tyler, 216
Deception in Entitled Independent model,
74–78
Defense Cyber Crime Conference
(DC3), 219
Defense industrial base
foreign theft of IP, 87
fraud cases, 266
sabotage cases, 246–247
theft of IP case, 260
Deleted backups, 58
Demonstrational videos, 218–219
Demotions as sabotage precursor, 38, 56
Denial-of-service attacks, 288
Departing employees. See Termination
Detection
Ambitious Leader model, 81–82
automated, 14, 195
fraud, 127
IDS, 220–221
malicious code, 193
sabotage, 53
trusted business partners, 283–285
Dictionaries in Common Event
Expression, 229
Digital rights management (DRM), 65
Digital watermarking, 65
Directory services, 234
Disability fraud cases, 105, 267–268
Disabling
known paths, 51–52
remote access, 200–201
system logs, 42
Disagreements as dissatisfaction factor, 73
Discrimination complaint in government
sabotage case, 249
Disgruntlement issues
defense industrial base sabotage cases,
246–247
fired employee sabotage case,
243–244
government case, 271–272
password theft, 176–177
positive intervention for, 49–50
resigned employee case, 169–170
as sabotage factor, 31–34, 37–38, 40–42
system administrators and other
privileged users, 190
Disposal of controlled information
documents, 173
Disruption of service in SDLC, 141–142
Disruptive employees
monitoring and responding to, 164–167
as sabotage precursor, 37
Dissatisfaction in Entitled Independent
model, 72–74
DLP (data loss prevention) systems, 65, 77
DNS
registrations redirection, 291
suffixes, 236
Document imaging company in theft of IP
case, 96, 261–262
Documentation
policies and controls, 155–158, 161
SDLC, 138
Domain controller (DC), 235–236
Domain names, in sabotage, 26
Doors, locking, 172
Downsizing, sabotage from, 33
Downward spiral situations in sabotage, 42
Driver’s licenses case, 105, 186, 266
DRM (digital rights management), 65
Dynamic trigger hypotheses, 349
E
E-commerce developer in sabotage
case, 250
Economic espionage, 84
ptg7481383
Index 375
Ecuador, theft of IP in, 85
Education industry
foreign theft of IP, 87
miscellaneous case, 271
EEOC complaint in government sabotage
case, 249
Email
for access control, 71
attachments. See Attachments
eavesdropping case, 270–271
fake addresses cases, 153–154, 266
pornographic images case, 201
Splunk rules, 235–237
theft of IP, 89, 91, 93
theft of IP indicator, 77
Emergency services fraud cases, 266
Employee assistance programs
for disgruntlement, 49
for disruptive employees, 166
for fraud, 124–125
for sabotage, 35, 37
Employees
vs. contractors, 313
disgruntlement. See Disgruntlement issues
online actions best practices, 195–199
protecting, 171
security awareness training for, 159–163
susceptibility to recruitment, 121–123
susceptibility to social engineering, 126
termination. See Termination
Encryption
backups, 58, 208
theft of IP, 95
End user source code access, 131
Energy industry
foreign theft of IP, 87
sabotage case, 247–248
Enforcement of policies in sabotage, 34, 168
Engineers, theft of IP by, 63, 85
Enterprise-wide risk assessments, 151–154
Entertainment Technology Center (ETC),
18, 336
Entitled Independent model in theft of IP
contribution perception in, 70–72
deception, 74–78
dissatisfaction, 72–74
overview, 68–70
threats, 64
Erosion of access controls, 71, 189
Espionage
foreign governments and organizations, 84
prevalence, 8
ETC (Entertainment Technology Center),
18, 336
Event correlation engines, 93, 197
Events
MERIT InterActive, 338–339
SIEM signature, 228–230
Exception handling
SDLC, 132, 135
system design, 183
Excessive access privileges, 125
Expectations
policies and controls for, 156
setting, 47–49
unmet. See Unmet expectations
Expedite function in SDLC, 135
Expiration dates of accounts, 234
External hard disks for theft of IP, 94
External organizations
attacks against, 196
email to, 77
External partners. See Trusted business
partners (TBPs)
Extortion
manufacturing plant case, 212–213
two-person rule for, 44
F
Fake email addresses, 153–154, 266
Fake vendor fraud losses, 105
FCI (Force Concept Inventory), 335
Federal Bureau of Investigation (FBI)
organized crime definition,
115116, 286
Federal Network Security (FNS) branch, 17
Federally Funded Research and
Development Center (FFRDC), 219
Feedback loops in system dynamics
modeling, 347–348
File integrity checkers, 191
File transfer, 90–91
File Transfer Protocol (FTP), 90
Finance industry. See Banking and finance
industry
ptg7481383
Index
376
Financial compensation as dissatisfaction
factor, 73
Financial gain as motive, 139
Financial impact
Ambitious Leader model, 78
fraud, 103–105
theft of IP, 67
Financial problems
in background checks, 165
fraud from, 111, 124–125
non-sharable, 106
FIRST (Forum of Incident Response and
Security Teams), 219
Flagging database transactions, 123
Flood control, 345
FNS (Federal Network Security)
branch, 17
Food industry
fraud cases, 266–267
sabotage case, 248
Force Concept Inventory (FCI), 335
Foreign-currency trader fraud
case, 265
Foreign governments and organizations
Ambitious Leader model, 78
theft of IP, 67, 83–88, 261–262
threat complexity, 7
Foreign nationals asylum case, 181, 267
Formal code reviews, 142
Former employees vs. current, 314
Forum of Incident Response and Security
Teams (FIRST), 219
Fraud
auditing for, 120–121
continuing, 110–111
defined, 101
description, 4
excessive access privileges, 125
financial problems, 124–125
impacts, 103, 105
insider stressors, 115
models, 13
organizational issues, 120–126
organized crime, 115–119
origins, 108–110
outsider facilitation, 111–113
overview, 101–106
patterns, 106–108
perpetrator characteristics, 1
recruiting others, 113–115, 121–123
trusted business partners, 279–280
verification of modification of critical
data, 123
Fraud cases, 4–5, 262–263
banking and finance industry, 264–265
commercial facilities industry, 263,
265–266
defense industrial base, 266
emergency services, 266
food industry, 266–267
government, 267–269
health care industry, 166, 269
lottery agency, 212
positive outcome, 296–297
prevalence, 8, 310–312
Fraud Triangle, 106–108
From Modeling to Managing Security: A
System Dynamics Approach, 349
FTP (File Transfer Protocol), 90
Full disclosure by third-party vendors, 57
G
Games. See MERIT InterActive tool
GFIRST (Government Forum of Incident
Response and Security Teams), 219
Globalization issues, 176
Glossary of terms, 351–357
Gmail accounts as theft of IP indicator, 77
Gonzalez, Jose, 349
Government
case prevalence, 308–309
defense industrial base sabotage cases,
246–247
espionage, 84
fake email addresses case, 153–154
foreign theft of IP, 87
fraud, 104–105, 267–269
miscellaneous case, 271–272
sabotage cases, 248–250
theft of IP cases, 260–261
Government Forum of Incident Response
and Security Teams (GFIRST), 219
Group modeling, 349
Guards
ptg7481383
Index 377
for deterrence, 171
security awareness training for, 162–163
H
Hanley, Michael
insider threat lab, 216
Internet underground, 286
Hazardous material sector, 87
Headers in Common Event Format, 228
Health industry
case prevalence, 308
claims fraud case, 166, 269
foreign theft of IP, 87
Help desk fraud cases, 266
High-priority mitigation strategies, 219–220
Hiring process, 164
Host data exfiltration, 93–95
Hostile work environments
case study, 169–170
dissatisfaction factor, 73
Hotmail accounts as theft of IP indicator, 77
Houy, Matt, 216
HTTPS traffic, 66
Human resources (HR) department
account expiration dates, 234
for disgruntlement, 49
MERIT InterActive, 337, 339
for sabotage, 39
I
IDC (Interactive Data Corporation)
survey, 278
Identity crimes. See also Personally
Identifiable Information (PII)
defined, 101
prevalence, 113–114
Identity management systems, 24
IDS (intrusion detection system),
220–221
Immigration asylum case, 181, 267
Impacts, 152
Ambitious Leader model, 78
fraud, 103–105
SDLC, 130
theft of IP, 66–68
Implementation in SDLC, 183–184
Incident data in coding process, 329–331
Incident management process, 124
Incident response plans, 211–213
Inconsistent enforcement of policies,
sabotage from, 34, 168
Industrial espionage, 84
Information and telecommunications
industry
case prevalence, 307–309
foreign theft of IP, 86
Information overload, 196, 198
Information technology departments,
MERIT InterActive for, 337
Information technology industry cases
miscellaneous, 272–273
sabotage, 250–256
sabotage/fraud, 257–258
theft of IP, 261–262
Infrastructure
insider threat lab, 217–218
protecting, 172
Insider and Cyber Security: Beyond the
Hacker, 23
Insider threat assessment in 2007, 18
Insider threat center, 3
exercises, 303–304
objectives, 13–14
products and services, 299–301
sponsored research, 306
teams, 15
threat assessment, 304–305
workshops, 301–303
Insider threat exercises in 2010, 18–19
Insider threat lab, 15–16
in 2009, 18
centralized logging. See Centralized
logging
demonstrational videos, 218–219
exercises, 239
high-priority mitigation strategies,
219–220
infrastructure, 217–218
overview, 215–216
purposes, 216–217
SIEM signature. See Security Information
and Event Management (SIEM)
signature
ptg7481383
Index
378
Insider threat lab (contd.)
SiLK tool, 221–223
Snort tool, 220–221
Insider Threat Outreach and Transition
Team, 1516
Insider threat research in 2000, 16
Insider Threat Research Team, 15
Insider Threat Study (ITS)
in 2001, 16
banking and finance sector, 19
fraud modeling, 105
profiles from, 11
Insider trading, 103
Installation in SDLC, 184
Insurance fraud case, 166, 269
Integrity
SDLC, 130
threats impact on, 152
training on, 162
Integrity checks
automated, 134, 195
database transactions, 123
SDLC, 134
Intellectual property agreements, 157,
168–169
Intellectual property theft. See Theft of
intellectual property (IP)
Interactive Data Corporation (IDC)
survey, 278
Interactive virtual simulation tool.
See MERIT InterActive tool
International cases, 315–317
International Traffic in Arms
Regulations, 67
Internet Relay Chat (IRC) channels, 255
Internet service providers (ISPs) cases
customer information, 220–221
sabotage, 251–252, 255–256
source code modification, 140
threatening email, 176
Internet underground threats
access controls and monitoring, 291–292
complexity of, 7
conclusions, 293
crimes, 288–289
insider characteristics, 287
insider involvement, 288
overview, 286–287
sabotage cases, 245, 251–252
sabotage/fraud case, 257
unknown access paths, 289–291
Intrusion detection system (IDS), 220–221
Inventory control, 94
IRC (Internet Relay Chat) channels, 255
Irregular processes, auditing, 120–121
ISPs. See Internet service providers (ISPs)
cases
ITS. See Insider Threat Study (ITS)
J
Job performance declines as sabotage
precursor, 35
Job responsibilities descriptions, 49
Journal of Wireless Mobile Networks,
Ubiquitous Computing, and Dependable
Applications, 65
K
Key-value pairs in Common Event
Format, 228
Keystroke loggers
fraud cases, 109, 265–266
system change control cases, 194
theft of IP, 160
King, Christopher, 116
Kiosk access case, 153
Known-bad domain names, 235
L
Laptops for theft of IP, 90–91
Large attachments as theft of IP indicator, 77
Last days of employment
centralized logging. See Centralized
logging
precautions, 98
theft of IP, 76, 95, 98
Lax overtime controls, 185
Layered defense for remote attacks, 200–202
LDAP directory service, 234
Least privilege best practices, 178–181
Legal firm theft of IP case, 261–262
Legal issues, 152
ptg7481383
Index 379
Lessons learned step for financial
problems, 124
Limiting accounts, 45
Loan officer fraud case, 264
Locking doors and windows, 172
Logic bombs
defense industrial base sabotage case,
246–247
description, 9
government sabotage case, 248–249
information technology sabotage case,
252–253
placement, 53
positive outcome case, 25, 297
SDLC case, 185–186
system administrator case, 189, 244–245
system change controls, 193
unmet expectations, 33
Logistics company sabotage case, 256
Logs and logging
access, 172–173
centralized. See Centralized logging
change, 192
Common Event Expression, 229
employee online actions, 195–199
reviewing, 166
sabotage, 37, 42, 56–57
SDLC, 137
theft of IP, 93, 95
Loops in system dynamics modeling,
347–348
Lottery
fraud case, 212, 268–269
fraud losses, 105
Low-nicotine cigarettes, 345
Lower-level employees, 104–105
M
Macro-lab, 218
MAILHOST server, 235–236
Maintenance phase in SDLC, 136
Malicious activity in system design, 183
Malicious code
description, 10
expected bonus sabotage case, 244–245
fraud case, 265–266
information technology sabotage case,
252–253
network manager sabotage case, 244
unauthorized access case, 271
Management and Education of the Risk of
Insider Threat (MERIT) project, 9
development of, 17
insider threat models, 9–12, 27
Managers as organized crime
participants, 117
Manufacturing sector
extortion case, 212–213
foreign theft of IP, 87
terminated employee case, 205
Market trend product analysis organization
sabotage case, 253–254
Meadows, Dennis, 346
Media
backups, 208
theft of IP, 62, 90, 94
Mergers and acquisitions
complexity of, 6
as dissatisfaction factor, 73
MERIT (Management and Education of the
Risk of Insider Threat) project, 9
development of, 17
insider threat models, 9–12, 27
MERIT InterActive tool, 18
conclusion, 343
effectiveness, 334–336
overview, 333–334
prototype, 336–340
stages, 339–342
Micro-lab, 217–218
Military equipment fraud losses, 105
MIS Training Institute InfoSec World, 219
Miscellaneous cases, 8, 269–273
Missing work as sabotage precursor, 35
Mitigation strategies
insider threat lab, 219–220
SDLC, 142
theft of IP, 88–97
trusted business partners, 283–285
Modification
fraud cases, 110–111
production source code and scripts,
140–142
verifying, 123
ptg7481383
Index
380
Monitoring
employee online actions, 195–199
Internet underground, 291–292
network traffic for sabotage, 51
strategies, 52–53
suspicious and disruptive behavior,
164–167
targeted, 55
termination, 233–235
for theft of IP, 95
trusted business partners, 284
Montelibano, Joji, 216
Monthly auditing, 196
Mood swings as sabotage precursor, 36
Moore, Andrew P.
best practices, 145
biography, 366
fraud modeling, 102
Internet underground, 286
SDLC, 139
theft of IP, 65, 83
trusted business partners, 276
Motives
Ambitious Leader model, 79
foreign theft of IP, 88
Internet underground insiders, 287
organized crime, 118
SDLC, 139
Moves in MERIT InterActive, 338
Multiple roles in fraud cases, 267–268
N
National Threat Assessment Center
(NTAC), 16
Negative influences in system dynamics
modeling, 347
Negative workplace issues
managing, 168–170
sabotage from, 35
trusted business partners, 284–285
Network sniffers, 221, 255, 304
Networks
information technology sabotage case,
252–253
kiosk access case, 153
monitoring, 51
sabotage, 41
theft of IP, 90–93
Nigerian Mafia, 122
911 system case, 209, 254
NOC system administrators sabotage
case, 254
Non-sharable financial problems, 106
Noncompete agreements, 168–169
Nonpublic sources of information, 326
Nonrepudiation techniques
benefits, 187
for sabotage, 42–43
Nontechnical employees, insider theft
discovered by, 74
Nontechnical insiders vs. technical, 314–315
NTAC (National Threat Assessment
Center), 16
Ntop tool, 304
O
OCTAVE (Operationally Critical Threat,
Asset, and Vulnerability Evaluation)
technique, 195
Office of National Counterintelligence
Executive, 83
Office trash, 173
One-month termination window
centralized logging, 233–237
precautions, 98
theft of IP, 76, 95, 98
Online actions best practices, 195–199
Operationally Critical Threat, Asset, and
Vulnerability Evaluation (OCTAVE)
technique, 195
Opportunity in Fraud Triangle, 106–107
Organization data coding process, 327–328
Organization-issued badges, 171
Organizational issues in fraud, 120–126
Organized crime, 286–287
fraud, 115–119
malicious insiders, 116–117
methods, 118–119
motives, 118
participants, 117
prevalence, 116
targets, 118
ptg7481383
Index 381
Origins of fraud, 108–110
Outreach and Transition Team, 15–16
Outsider facilitation of fraud, 111–113
Outsourcing
critical business functions, 152
and password and account management
policies, 176
Overtime, lax controls on, 185
Ownership disagreements, 73, 156–157
P
Packet sniffers, 221, 255, 304
Partners. See Trusted business partners
(TBPs)
Password cracking, 40, 154
Password-protected screen savers, 172
Passwords, 42
auditing, 44
customer records stolen cases, 272
food industry case, 266–267
fraud, 125–126
government case, 271–272
information technology sabotage case, 255
policies and practices, 45, 174–177
student unauthorized access case, 271
system administrator termination
sabotage case, 245
withheld pay case, 152–153
Patterns
fraud, 106–108
sabotage, 28–29
theft of IP, 68–70
Performance reviews for sabotage, 49
Periodic security awareness training, 159–163
Personal information in fraud, 103–104
Personal predispositions for sabotage, 28, 30
Personally Identifiable Information (PII)
access control case, 292
fraud, 111, 121, 279
future threats, 315–316
information technology sabotage case,
255–256
Internet underground, 288–290
organized crime, 117
positive outcome case, 296–297
prevalence, 113–114
trusted business partner access to, 279
Personnel policies for trusted business
partners, 284
Physical environment, tracking and
securing, 171–173
Physical exfiltration, 95
Physical media for backups, 208
PII. See Personally Identifiable
Information (PII)
Planned layoffs, sabotage from, 33
Planning in Ambitious Leader model, 79–80
Police communications operator case, 132,
186, 266
Policies and procedures
documenting, 155–158
passwords and account management,
174–177
reporting suspicious behavior, 165–166
for sabotage, 34, 36
SIEM, 225
termination, 203–206
training based on, 161
trusted business partners, 283
Pornographic images case, 140, 201, 254
Positive influence in system dynamics
modeling, 347
Positive intervention for disgruntlement,
49–50
Possessiveness in Entitled Independent
model, 72
Postal and shipping industry sabotage
case, 256
Potential precursors to sabotage, 37–42,
223–231
PowerShell AD administration tools,
237–238
Precipitating events for sabotage,
31–34
Precise predictions in system dynamics, 346
Precursors to sabotage, 37–42, 223–231
Predictions in system dynamics
modeling, 346
Preliminary Model of Insider Theft of
Intellectual Property, 12
Prescription benefit plans sabotage
case, 252
Pressure in Fraud Triangle, 106
Preventive controls for fraud, 126
Printed documents for theft of IP, 90
ptg7481383
Index
382
Prioritizing alerts in risk-based approach,
53–54
Prison inmate cases, 282–283
Privileges
accumulation of, 71
backdoor accounts, 175–176
best practices, 187–190
excessive, 125
hacking case, 157–158
least privilege best practices, 178–181
Proactive monitoring of employee online
actions, 199
Production source code modification, 140
Profiles in MERIT threat models, 10–12
Programmer theft of IP threats, 63
Programming techniques for attacks,
139–142
Progress Measure in MERIT InterActive, 338
Project managers in government sabotage
case, 249
Promotion disagreements as dissatisfaction
factor, 73
Proprietary software in theft of IP, 95
Prototypes in MERIT InterActive,
336–340
Proxies in theft of IP, 93
Public health industry
case prevalence, 308
foreign theft of IP, 87
Public sources of information, 326
Q
Quarterly auditing, 196
R
Random auditing, 196
Rationalization in Fraud Triangle,
106–107
Recovery processes
best practices, 207–210
SDLC, 142
testing, 57–59
Recruitment
fraud, 113–115, 121–123
security awareness training for, 159
theft of IP case, 261
References, 359–364
Reinforcing loops in system dynamics
modeling, 348
Relocation issues as dissatisfaction
factor, 73
Remailers, 109
Remote network access
layered defense for, 200–202
terminated employees, 204
for theft of IP, 90–92
Remote network administration tools for
sabotage, 40
Removable media for theft of IP, 62, 90, 94
Reorganization, sabotage from, 33
Reporting
confidential, 161
suspicious behavior, 165–166
Reprimands as sabotage precursor, 38
Requirements in SDLC, 131–132, 182–183
Research by insider threat center, 306
Research chemist case, 198
Research deleted case, 166
Research Team, 15
Resignations in theft of IP, 73, 76
Responding to suspicious and disruptive
behavior, 164–167
Responsibilities removal as sabotage
precursor, 38
Return on investment (ROI) in theft of IP
mitigation, 68
Revenge
Internet underground insiders, 287, 293
sabotage cases, 243–244, 250, 257, 280
SDLC, 139
Risk assessments
Ambitious Leader model, 81–83
enterprise-wide, 151–154
process, 304–305
Risk-based approach in prioritizing alerts,
53–54
Risk Measure in MERIT InterActive, 338
ROI (return on investment) in theft of IP
mitigation, 68
Role-based access control
description, 179
fraud, 125
SDLC, 132–133
system change controls, 193
ptg7481383
Index 383
Role playing, 334
Rootkits, 41
S
Sabotage
backup and recovery process tests, 57–59
backups, 24, 40, 44–45, 139, 208, 256
behavioral precursors, 35–37
demotion measures, 56
description, 3
disgruntlement strategies, 49–50
expectations setting, 47–49
impacts, 26–27
mitigation strategies, 46–47
monitoring strategies, 52–53
of other organizations, 59
overview, 23–28
patterns, 28–29
perpetrator characteristics, 1, 27
personal predispositions, 28, 30
precipitating events, 31–34
profiles for, 11
reducing, 30–31, 34–35
risk-based approach to prioritizing alerts,
53–54
secure logs, 56–57
SIEM signature for, 223–231
from stressful events, 37–39
targeted monitoring, 55
technical precursors and access paths,
40–45
termination measures, 35, 40, 56
time and attack location, 225–227
Trust Trap, 4546
trusted business partners, 44–45, 280–281
unknown access paths, 41–42, 50–52
Sabotage cases, 3–4, 241–243
banking and finance industry, 243–245
commercial facilities industry, 242, 245
defense industrial base, 246–247
energy industry, 247–248
food industry, 248
government, 248–250
information technology industry, 250–256
positive outcome, 297
postal and shipping industry, 256
prevalence, 8, 309–310
Sabotage/fraud cases, 256–258
Salary and compensation as sabotage
factor, 34
Salespeople theft of IP threats, 63
Sanctions as sabotage precursor, 38–39
Schroeder, Will, 216
Scientists in theft of IP, 63, 85
Screen savers, password-protected, 172
Scripts modification, 140
SDLC. See Software Development Life
Cycle (SDLC)
SDMIS (System Dynamics Modeling for
Information Security), 348–349
SDN (Security Dynamics Network), 348–350
Secret Service
fraud modeling, 106
National Threat Assessment Center, 16
Sectors, case breakdown by, 307–309
Secure logs for sabotage, 56–57
Security
awareness training, 159–163
backup and recovery processes, 207–210
bypassing in organized crime, 118
physical environment, 171–173
SDLC, 131, 138–139
Security Dynamics Network (SDN), 348–350
Security guards
for deterrence, 171
training for, 162–163
Security Information and Event
Management (SIEM) signature,
223–225
application, 227–228, 230–231
Common Event Expression, 229–230
Common Event Format, 228–229
database analysis, 225–227
overview, 223–225
Sense of ownership in Entitled Independent
model, 70
Separation of duties
backups, 58
best practices, 178–181
fraud, 125
for sabotage, 43
SDLC, 133
system administrators, 188
system design, 183
trusted business partners, 285
ptg7481383
Index
384
Shared accounts
audits for, 175
for sabotage, 44, 52
terminated employees, 204
Sharing passwords in sabotage, 42
Shaw, Eric, 65
Shimeall, Timothy J., 145
SIEM. See Security Information and Event
Management (SIEM) signature
SiLK tool, 221–223, 304
Sim City-styled simulation, 336
Simulation. See MERIT InterActive tool
Snort tool, 220–221, 304
Social engineering
fraud, 126
organized crime, 118
sabotage, 44
security awareness training for, 160
Software Development Life Cycle
(SDLC), 129
attribution, 137
authentication and role-based access
control, 132–133
automated data integrity checks, 134
backups, 138–139
best practices, 182–186
code reviews, 136–137
disruption of service and theft of
information, 141–142
exception handling, 132, 135
mitigation strategies, 142
modification of production source code
and scripts, 140
overview, 129–131
programming techniques, 139–142
requirements and system design
oversights, 131–132
separation of duties, 133
system deployment, 137–139
unauthorized authentication
credentials, 141
Software Engineering Institute, 219
Software keystroke loggers
fraud cases, 109, 265–266
system change control cases, 194
Software ownership issues, 73, 156–157
Sole system administrators
backups, 205
sabotage, 44
sabotage/fraud case, 257–258
system change controls, 192–193
withheld pay case, 152–153
Solid arrows in system dynamics
modeling, 347
Source code
access control, 142
backups, 138
defense industrial base sabotage case, 247
deleted, 163
end user access, 131
modification, 140
sabotage/fraud case, 258
shared, 67
theft of IP, 95
Special Publication 800–53: Recommended
Security Controls for Federal Information
Systems and Organizations, 214
Special treatment of employees, sabotage
from, 34, 168
splunk-powershell project, 238
Splunk rules, 235–237
Splunk tool, 232
Sponsored research for insider threat
center, 306
Spooner, Derrick
fraud modeling, 102
theft of IP, 65, 83
trusted business partners, 276
“Spotlight On: Insider Theft of
Intellectual Property inside the U.S.
Involving Foreign Governments or
Organizations,” 83
“Spotlight On: Insider Threat from Trusted
Business Partners,” 276
“Spotlight On: Malicious Insiders and
Organized Crime Activity,” 116
“Spotlight On: Malicious Insiders with
Ties to the Internet Underground
Community,” 286
“Spotlight On: Programming Techniques
Used as an Insider Attack Tool,” 139
Stages in MERIT InterActive, 339–342
Star performer treatment, sabotage from,
34, 168
Stolen backup media, 58
Stressful events
fraud from, 115
sabotage from, 37–39
ptg7481383
Index 385
Strict password policies and practices,
174–177
Students unauthorized access cases, 271
Subcontractors
background checks, 166–167
password and account management
policies, 175–176
Subject data in coding process, 328–329
Supervisors as dissatisfaction factor, 73
Supply chain management, 176
Surveys
CyberSecurity Watch Survey, 319–323
IDC, 278
Suspensions as sabotage precursor, 38
Suspicious behavior
Entitled Independent model, 74
monitoring and responding to, 164–167
reporting, 165–166
as sabotage precursor, 37
System administrators
backups, 205
best practices, 187–190
sabotage, 44
sabotage/fraud case, 257–258
system change controls, 192–193
theft of IP threats, 62–63
withheld pay case, 152–153
System change controls, 191–194
System deployment in SDLC, 137–139
System design in SDLC, 131–132, 183
System dynamics modeling, 12
in 2005, 17
MERIT InterActive based on, 335
overview, 345–348
Security Dynamics Network, 348–350
System Dynamics Modeling for Information
Security (SDMIS), 348–349
System Dynamics Society, 348–349
System Dynamics Society Conference, 349
System logs for sabotage, 42
System maintenance in SDLC, 185
System overrides in system design, 183
T
Tagging documents for theft of IP, 77
Targeted monitoring for sabotage, 55
Targeting centralized logging, 237238
TBPs. See Trusted business partners (TBPs)
Team-oriented, role-playing
experiences, 334
Teams in CERT Insider Threat Center, 15
Technical controls. See Insider threat lab
Technical insiders vs. nontechnical,
314–315
Technical monitoring in Ambitious Leader
model, 83
Technical precursors for sabotage, 4045
Technical users best practices, 187190
Technology solution limitations, 14
Telecommunications company
case prevalence, 307–309
foreign theft of IP, 86
information technology sabotage case, 253
sabotage/fraud case, 257–258
Temporary staff, threats from, 278
Termination
best practices, 203–206
monitoring, 233–235
property retrieval in, 169
remote access, 200–201
sabotage, 35, 40, 56
theft of IP, 73
trusted business partners, 285
unknown access paths, 289–291
Termination cases
backups, 209–210
commercial facilities sabotage, 245,
289–290
eavesdropping, 270–271
information technology sabotage,
250–251
logistics company sabotage, 256
theft of IP, 260
trusted business partner, 277
unauthorized access, 272–273
Terms, glossary, 351357
Testing backup and recovery process,
57–59
Theft of information
employee remote access case, 198–199
SDLC, 141–142
Theft of intellectual property (IP)
Ambitious Leader model, 78–83
concealment, 95
description, 5
Entitled Independent model. See Entitled
Independent model in theft of IP
ptg7481383
Index
386
Theft of intellectual property (IP) (contd.)
foreign governments and organizations,
83–88
host data, 93–95
impacts, 66–68
methods overview, 89–90
mitigation strategies, 88–97
models, 12–13
network data, 90–93
overview, 61–66
patterns, 68–69
perpetrator characteristics, 1
physical theft, 95
trusted business partners, 96–97, 281–282
types, 61
Theft of IP cases
chemical industry, 258–259
customer information, 5–6
defense industrial base, 246, 260
fraud, 265–266
government, 260–261
information technology industry, 261–262
ownership issue, 156–157
positive outcome, 297
prevalence, 8, 310–311
Theft ring in fraud case, 264
Third-parties. See Contractors and third
parties
30-day window
centralized logging, 233–237
precautions, 98
theft of IP, 76, 95, 98
Threads in MERIT InterActive, 339
Threat models, 9–12, 27
Threatening emails case, 201
Thumb drives for theft of IP, 94
TIFF images, 261
Time frame in fraud, 110111
Tracking
access paths, 52
controlled information documents, 173
physical environment, 171–173
theft of IP, 92
Trade secrets. See Theft of intellectual
property (IP)
Trader fraud case, 265
Training
for disgruntlement, 49
effectiveness of, 334–336
security awareness, 159–163
simulation for. See MERIT
InterActive tool
supervisors for sabotage, 36
Transactions
auditing, 123
verifying, 154
Trash, ofce, 173
Trends
cases breakdown by, 312–313
system dynamics modeling, 346
Trigger hypotheses, 349
True stories. See Case examples
Trust Trap in sabotage, 4546
Trusted business partners (TBPs)
complexity of threats, 6
customer records stolen cases, 272
fraud, 5, 279–280
identifying, 282–283
mitigation and detection
recommendations, 283–285
overview, 275–277
password and account management
policies, 175–176
sabotage, 44–45, 280–281
theft of IP, 96–97, 281–282
threat overview, 278–279
Trzeciak, Randall F.
best practices, 145
biography, 366
insider threat lab, 216
Internet underground, 286
SDLC, 139
theft of IP, 65, 83
trusted business partners, 276
Two-person rule
backups, 58, 208
description, 178
for sabotage, 43–45
system change controls, 193
Type of crime, case breakdown by, 309312
U
UIDs (userids)
converting, 234
information technology sabotage case, 255
ptg7481383
Index 387
Unauthorized authentication
credentials, 141
Undercover agent fraud case, 296–297
Unknown access paths
eliminating, 50–52
Internet underground, 289–291
sabotage, 41–42
Unmet expectations
information technology sabotage case, 253
logic bomb sabotage cases, 244–245
policies and controls for, 156
sabotage from, 31–34
SDLC case, 185–186
system administrator case, 189
U.S. Munitions List source code theft, 67
Userids (UIDs)
converting, 234
information technology sabotage case, 255
V
Validation of congurations, 191192
Vendors
backup services, 57
password and account management
policies, 175–176
sabotage, 44–45
Verication
modification of critical data, 123
transaction, 154
Victim organizations, 327
Videos at insider threat lab, 218219
Violent behavior
arrests for, 30
as sabotage precursor, 36
Virtual private networks (VPNs)
attack prevalence, 225–227
sabotage, 24
theft of IP case, 221–223
Virtual simulation tool, 18
Virtual world, 179
Visual simulation company theft of IP
case, 260
Voi ce -m ail sy ste m c ase , 2 01– 20 2
VPNs (virtual private networks)
attack prevalence, 225–227
sabotage, 24
theft of IP case, 221–223
Vulnerabilities assessments, 152
W
Water sector
foreign theft of IP, 87
fraud, 104
Web site for insider threat controls, 216
Weiland, Robert, 276
Windows, locking, 172
Wireless networks
information technology sabotage cases,
251–253
kiosk access case, 153
Wireshark packet sniffer, 221, 304
Withheld passwords case, 152153
Workshops
insider threat center, 301–303
SDMIS, 349
Writable CDs for theft of IP, 94
X
XNET platform, 18–19, 218, 239, 304
ptg7481383
S.R. Band, D.M. Cappelli, L.F. Fischer, A.P. Moore, E.D. Shaw, and R.F. Trzeciak, “Comparing Insider
IT Sabotage and Espionage: A Model-Based Analysis,” Software Engineering Institute Technical Report
CMU/SEI-2006-TR-026, Carnegie Mellon University, December 2006. http://www.cert.org/archive/
pdf/06tr026.pdf.
D.M. Cappelli, T. Caron, R.F. Trzeciak, and A.P. Moore, “Spotlight On: Programming Techniques Used as an
Insider Attack Tool,” Joint CyLab (CMU) and CERT (SEI) Report, December 2008. http://www.cert.org/
archive/pdf/insiderthreat_programmers_1208.pdf
D.M. Cappelli, Moore, A.P., Trzeciak, R.F. and Shimeall, T.J., “Common Sense Guide to Prevention and
Detection of Insider Threats: 3rd Edition,” Joint CyLab (CMU) and CERT (SEI) Report, September 2008
(updated from July 2006 and April 2005). http://www.cert.org/archive/pdf/CSGV3.pdf
D.M. Cappelli, A.G. Desai, A.P. Moore, T.J. Shimeall, E.A. Weaver, B.J. Willke, “Management and
Education of the Risk of Insider Threat (MERIT): Mitigating the Risk of Sabotage to Employers’ Information,
Systems, or Networks,” Software Engineering Institute Technical Note CMU/SEI-2006-TN-041, March 2007.
http://www.sei.cmu.edu/reports/06tn041.pdf
M. Hanley, J. Montelibano, “Insider Threat Control: Using Centralized Logging to Detect Data Exfiltration
Near Insider Termination,” SEI Technical Note SEI-TN-024, Software Engineering Institute, Carnegie Mellon
University, October 2011.
M. Hanley, T. Dean, W. Schroeder, M. Houy, R.F. Trzeciak and J. Montelibano, “An Analysis of Technical
Observations in Insider Theft of Intellectual Property Cases,” SEI Technical Note CMU/SEI-2011-TN-006,
Software Engineering Institute, Carnegie Mellon University, 2011.
M. Hanley, A.P. Moore, D.M. Cappelli, and R.F. Trzeciak, “Spotlight On: Malicious Insiders with
Ties to the Internet Underground Community,” Joint CyLab (CMU) and CERT (SEI) Report, March 2009.
http://www.cert.org/archive/pdf/CyLab%20Insider%20Threat%20Quarterly%20on%20Internet%20
Underground%20-%20March%202009P.pdf
C. King, “Spotlight On: Malicious Insiders and Organized Crime Activity,” SEI Technical Note CMU/
SEI-2011-TN-025, September 2011.
J. Montelibano, “Insider Threat Control: Using a SIEM Signature to Detect Potential Precursors to IT Sabotage,”
SEI Technical Note SEI-TN-021, Software Engineering Institute, Carnegie Mellon University, April 2011.
A.P. Moore, A. Cummings, and D. Spooner, “Modeling and Analysis of Insider Fraud,” in 2010 CERT Research
Annual Report, 2011.
D. Spooner, D.M. Cappelli, A.P. Moore, and R.F. Trzeciak, “Spotlight On: Insider Theft of Intellectual Property
inside the U.S. Involving Foreign Governments or Organizations,” Joint CyLab (CMU) and CERT (SEI) Report,
December 2008. http://www.cert.org/archive/pdf/insiderthreat_programmers_1208.pdf
R.M. Weiland, A.P. Moore, D.M. Cappelli, R.F. Trzeciak, D. Spooner “Spotlight On: Insider Threat from
Trusted Business Partners, Joint CyLab (CMU) and CERT (SEI) Report, February 2010. http://www.cert.org/
archive/pdf/TrustedBusinessPartners0210.pdf
A.P. Moore, D.M. Cappelli, T. Caron, E. Shaw, and R.F. Trzeciak, “A Preliminary Model of Insider Theft of
Intellectual Property.” SEI Technical Note CMU/SEI-2011-TN-013.
A.P. Moore, D.M. Cappelli, and R.F. Trzeciak, “The ‘Big Picture’ of Insider IT Sabotage Across U.S.
Critical Infrastructures,” SEI Technical Report CMU/SEI-2008-TR-009 http://www.cert.org/archive/
pdf/08tr009.pdf)
M. Hanley, “Candidate Technical Controls and Indicators of Insider Attack from Socio-Technical Models and
Data,” in Proceedings of the 2010 NSA Center of Academic Excellence (CAE) Workshop on Insider Threat,
November 2010 (also published as SEI Technical Note CMU/SEI-2011-TN-003, January 2011).
A.P. Moore, D.M. Cappelli, T. Caron, E. Shaw, and R.F. Trzeciak, “A Preliminary Model of Insider Theft of
Intellectual Property.” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
This page constitutes a continuation of the copyright page, which begins on page iv.
388
ptg7481383
Applications 2, 1 (Special Issue Addressing Insider Threats and Information Leakage, 2011): 28–49
(also published as SEI Technical Note CMU/SEI-2011-TN-013).
A.P. Moore, D.M. Cappelli, T. Caron, E. Shaw, and R.F. Trzeciak, “Insider Theft of Intellectual Property for
Business Advantage: A Preliminary Model,” in Proceedings of the 1st International Workshop on
Managing Insider Security Threats (MIST2009), Purdue University, West Lafayette, USA, June 16, 2009.
http://www.cert.org/insider_threat/docs/Insider_Theft_of_IP_Model_MIST09.pdf
A.P. Moore, D.M. Cappelli, and R.F. Trzeciak, “The ‘Big Picture’ of Insider IT Sabotage Across U.S. Critical
Infrastructures,” in Insider Attack and Cyber Security: Beyond the Hacker, eds. Stolfo, S.J., et. al., Springer
Science + Business Media, LLC, 2008 (also published in SEI Technical Report - CMU/SEI-2008-TR-009
http://www.cert.org/archive/pdf/08tr009.pdf)
A.P. Moore, D.M. Cappelli, H. Joseph, R.F. Trzeciak, “An Experience Using System Dynamics to Facilitate an
Insider Threat Workshop,” in Proceedings 25th International Conference of the System Dynamics Society,
July 2007. http://www.cert.org/archive/pdf/ISDC2007.pdf
CSO Magazine, Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University
and Deloitte, 2011 CyberSecurity Watch Survey: Press Release, January 2011. http://www.cert.org/archive/
pdf/CyberSecuritySurvey2011.pdf
CSO Magazine, Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon University
and Deloitte, 2011 CyberSecurity Watch Survey: Data, January 2011. http://www.cert.org/archive/pdf/
CyberSecuritySurvey2011Data.pdf
M.M. Keeney, E.F. Kowalski, D.M. Cappelli, A.P. Moore, T.J. Shimeall, and S.N. Rogers, “Insider Threat
Study: Computer System Sabotage in Critical Infrastructure Sectors,” Joint SEI and U.S. Secret Service Report,
May 2005. http://www.cert.org/archive/pdf/insidercross051105.pdf
E.F. Kowalski, M.M. Keeney, D.M. Cappelli, and A.P. Moore, “Insider Threat Study: Illicit Cyber Activity in
the Information Technology and Telecommunications Sector,” Joint SEI and U.S. Secret Service Report,
January 2008. http://www.cert.org/archive/pdf/insiderthreat_it2008.pdf
E.F. Kowalski, T. Conway, S. Keverline, M. Williams, D. McCauley, D.M. Cappelli, B.W. Willke, and A.P. Moore,
“Insider Threat Study: Illicit Cyber Activity in the Government Sector,” Joint SEI and U.S. Secret Service
Report, January 2008. http://www.cert.org/archive/pdf/insiderthreat_gov2008.pdf
M.R. Randazzo, M.M. Keeney, E.F. Kowalski, D.M. Cappelli, A.P. Moore, “Insider Threat Study: Illicit Cyber
Activity in the Banking and Finance Sector,” Joint SEI and U.S. Secret Service Report, 2004, August, available at
http://www.secretservice.gov/ntac/its_report_040820.pdf.
389
ptg7481383
This page intentionally left blank
ptg7481383
Do you know how vulnerable your organization is to its own insiders?
Employees, contractors, or business partners can exploit their
knowledge to attack your organization.
The CERT Insider Threat Center, part of Carnegie Mellon University’s
Software Engineering Institute, studies the technical and behavioral
aspects of real insider compromises. Our Insider Threat Vulnerability
Assessment for government, private, public, for-profit, and not-for-
profit organizations is a confidential, on-site evaluation of your entire
organizations ability to prevent, detect, and respond to insider threats.
The results are incorporated into an actionable framework for
managing your organizations vulnerability.
The CERT® Insider Threat Vulnerability
Assessment: Identify vulnerabilities and
remediation strategies from the inside out.
To l e a r n m o r e a b o u t t h e I n s i d e r T h r e a t C e n t e r,
visit the CERT website: http://www.cert.org/insider_threat.
To l e a r n m o r e a b o u t t h e I n s i d e r T h r e a t A s s e s s m e n t o r t o
schedule one, email the Insider Threat Center staff:
insider-threat-feedback@cert.org.
ptg7481383
Activate your FREE Online Edition at
informit.com/safarifree
STEP 1: Enter the coupon code: PRIVHFH.
STEP 2: New Safari users, complete the brief registration form.
Safari subscribers, just log in.
If you have diculty registering on Safari or accessing the online edition,
please e-mail customer-service@safaribooksonline.com
Your purchase of The CERT® Guide to Insider Threats includes access to a free online edition
for 45 days through the Safari Books Online subscription service. Nearly every Addison-Wesley
Professional book is available online through Safari Books Online, along with thousands of books
and videos from publishers such as Cisco Press, Exam Cram, IBM Press, O’Reilly Media, Prentice
Hall, Que, Sams, and VMware Press.
Safari Books Online is a digital library providing searchable, on-demand access to thousands
of technology, digital media, and professional development books and videos from leading
publishers. With one monthly or yearly subscription price, you get unlimited access to learning
tools and information on topics including mobile app and software development, tips and tricks
on using your favorite gadgets, networking, project management, graphic design, and much more.
FREE
Online Edition
0321812573_Cappelli_SFP_ad.indd 1 12/27/11 9:41 AM

Navigation menu