Time
7 hours 36 minutes
Difficulty
Advanced
CEU/CPE
7

Video Description

This lesson covers insider threats; which include: · Insiders: examples include company employees and partners · Malicious insiders: insiders with intent to cause damage to an organization Insider threats are especially dangerous to an organization as they have access to information that others do not have and can use it to cause significant damage. When thinking about the motivation behind an insider threat, remember to MINCE words: · Money · Idealogy · Nationalism · Compromise · Ego · Sex In addition, there are also foreign controlled insider threats called RASCLS: · Reciprocation · Authority · Scarcity · Commitment and Consistency · Liking · Social Proof

Video Transcription

00:04
Hello, Siberians. And welcome back to the incident response and advanced forensics. My name is Max Alexander, and I'll be your subject matter expert for days course, which is insider threats. That happens to be one of my favorite topics.
00:18
So, first and foremost, we need to set the definition of what, exactly is an insider threat.
00:24
So what kind of break this into two parts on insider is anyone with access privilege? Our knowledge of information systems and service is essentially they're going to have placement and access to your information, so examples of insiders could be employees contractors.
00:43
Trusted business partners are individuals who may be involved in a merger acquisition process.
00:49
So what separates that normal insider from that malicious insider or insider threat
00:55
so malicious insiders are motivated to intentionally adversely impact organization's mission.
01:02
So they're going to seek to deny damaged, grade or destroy some type of information that you have, or seek to release that information to the public and thereby do greater damage organization as a whole.
01:18
So examples of malicious insiders that have come from the news would include Private Manning, Edward Snowden, Deja para Pacific Wind Holy
01:30
uh whoa. Comb up pronouncing these Chinese names booking cow and she only so those are just some examples of individuals who have committed insider threat, have exposed information or have stolen information from their employers.
01:49
So what is the danger of an insider threat?
01:53
So insiders have placement access the outsider to don't have, so that means they're already inside the organization.
02:02
For some part, they've already been vetted, and they've been given access by you, and you have some level of trusted.
02:09
So the second bullet point is that there are e inside and they may possess knowledge of trade. Secrets are highly sensitive information on a routine basis. They didn't you obviously are, hopefully would not have hired them
02:23
so worse. They're trusted and rarely watched as closely as an outsider would be watched.
02:30
And then, due to the level of trust placed in insiders, they could manipulate that trust to Carm, cause harm to the organization so they'll use that trust that use that placement access to essentially perpetrate for their crimes.
02:44
So bottom line and organization does not knowingly hire a trader rather on rare occasions and organisation, hire someone that believes it can trust who either successfully hides his or her intention to commit espionage are more commonly later finds themselves in circumstances that, for any number of personal complex reasons,
03:04
presents espionage are in industrial cases
03:07
stepped up in a lock that intellectual property
03:09
as a reasonable, even attractive, choice.
03:14
So in order to go through this process of becoming
03:16
insider threat, someone has to have means motive, opportunity and the belief that they're generally going to get away with their crimes. That kind of goes back to that criminal justice element
03:30
of trying to find and figure out who's going to be an insider threat.
03:35
So the dangers again kind of summarized capstone that
03:39
insiders can steal your intellectual property. So, for instance, if your business has, as this one really cool widget that makes makes it what it is, and someone inside your organization gives away that widget or if you work for Kentucky Fried Chicken and you get the way up the colonel secret, essentially, you're damaging
03:59
that business
04:00
fraud. So if you work in a financial service is sector and that person has placement access to financial data, they can essentially start stealing some of that data. The most recent cases, the well Spargo Theat sco. That happened here early October 2016 where there's essentially fraudulent accounts created
04:20
for
04:21
customers of Wells Fargo and then, lastly,
04:26
sabotage. And that could include compromising the availability or the integrity of data. So you've got someone that works in your organization, and they're they're hack, doctor. They've been fired. Essentially, they could go in and start bleeding files or records
04:43
making them unavailable. Or they could start changing information in those files and records,
04:46
altering their integrity. So those are the dangers that those insider threats pose,
04:54
so to look at kind of the motivations of what drives an insider threat to do what they do.
05:01
There has been some studies by psychologists and the Central Intelligence Agency looking at the motivational factors, and a lot of folks have trying to pigeonhole, leaves and narrow these down to some very broad categories doesn't mean these were the only categories that exists. But these are some pretty common ones
05:20
on the acronym for this is menses.
05:24
So the first is money
05:26
individuals who are in a general, a tight financial position or who are just greedy. They may be motivated by money to be a spy are to steal your intellectual property,
05:40
moving down from there's ideology. So someone who holds strong convictions that,
05:47
uh,
05:48
drive them to do something. For instance, if they believe so strongly that they do not like the capitalist system and they want to take down your major big bank, that ideology would be driving them to commit insider threat activity.
06:03
Nationalism, which we see a lot of the government where individuals who are generally approached by
06:11
China or some other large country who wants to compete economically with the United States.
06:17
Essentially, they'll get thrown the card that hey, you guys air ethnically Chinese, where Chinese, Don't you want to see China great
06:28
and they'll be pitched that way. And essentially that will be their motivation for committing espionage now that not not to say that every Chinese person is a danger or threat to be on insider threat. But that just is one example.
06:43
The next one is going to be compromised,
06:46
also known as blackmail. So if you've done something that you don't want someone to know about and they figure out that you've done that thing essentially, they could blackmail you and to, uh, going into work and becoming that insider threat.
07:00
The next one is going to be ego. Uh, you think you're smarter. That insider threat thinks they're smarter than everyone else's, and they're going to do this for egos. Ah, good example. That was Robert Hanssen, who work for the FBI and betrayed the government by giving up secrets. Thio, Russia.
07:19
I could just also be that they're kind of
07:26
look down upon at work and to prove themselves that they're better than the people that they work with will commit those insider activities
07:35
and the last one of ***. So that's your classic honeypot running that someone is lowered into a sexual relationship. And then that person turns out to be pushing that individual towards being that insider threat. So those are some of the basic, uh,
07:54
motivation of categories that psychologists have come up with over the years.
07:59
Another one. Another acronym. It's Rascals. This generally applies to foreign controlled insider threats specifically,
08:07
so reciprocation is going to be the first type of motivations *** for tat. I do a favor for you. You do a favor for me. Generally, the starts out very on a small scale where someone has put in a position where they have something done for them,
08:26
and then that other individuals say, You know, I've done a favor for you
08:31
now you owe me a favor and just kind of builds and builds. And then eventually it turns into a new insider threat or espionage type of activity.
08:41
The next one is going to be authority
08:43
When you're in some of these relationships, a lot of times it's there's going to be a more dominant type of personality.
08:50
And as the relationship develops, the usually the person who's driving that other person to commit espionage and or insider threat activities will try and be more superior and direct the actions of the other person through a position of authority,
09:07
the next one. It's scarcity that kind of speaks to itself. So if you're in a relationship, another person and
09:13
your resource poor due to mass loves hierarchy of needs. A lot of times, whoever you're dealing with may be able to provide you money, food, whatever. Is that your need up and do the scarcity that will drive that person to be an insider threat and or spot
09:33
moving honest commitment, consistency. This usually eyes for pre existing relationships where someone is already an insider threat or a spy. And there's going to be some type of turnover in that relationship where they're going to be dealing with a new handler. For someone who's going to be pushing them to be
09:52
that insider threat
09:52
and due to the past relationship, they're going to get that person to again renew their commitment and being consistent with providing that information.
10:05
Uh, the next one is just good old fashioned liking. We get into a relationship. You like me. You want to do favors for me just because I'm a nice guy. And it turns out I'm trying to drive you to commit espionage and or insider threat activities,
10:20
and the last one is going to be social proof again. That kind of goes out that ego. I have to prove myself that I'm better. I've got some type of,
10:31
uh,
10:31
depressed sense of self or and in order, Thio essentially elevate my sense of self, or I have to be this insider threat, our spy. So again, just another way of looking at some of the activities that drive on individual to become an insider threat

Up Next

Incident Response and Advanced Forensics

In this course, you will gain an introduction to Incident Response, learn how to develop three important protection plans, perform advanced forensics on the incident, deep dive into insider and malware threats, and commence incident recovery.

Instructed By

Instructor Profile Image
Max Alexander
VP, Cybersecurity Incident Response Planning at JPMorgan
Instructor