The report describes characteristics of 209 Americans who committed espionage-related offenses against the U.S. since 1947. Three cohorts are compared based on when the individual began espionage: 1947-1979, 1980-1989, and 1990-2015. Using data coded from open published sources, analyses are reported on personal attributes of persons across the three cohorts, the employment and levels of clearance, how they committed espionage, the consequences they suffered, and their motivations. The second part of the report explores each of the five types of espionage committed by the 209 persons under study. These include: classic espionage, leaks, acting as an agent of a foreign government, violations of export control laws, and economic espionage. The statutes governing each type are discussed and compared. Classification of national security information is discussed as one element in espionage. In Part 3, revisions to the espionage statutes are recommended in light of findings presented in the report.
Tag Archive for Insider Threat
Department of Homeland Security
(U//FOUO) DHS National Risk Estimate: Risks to U.S. Critical Infrastructure from Insider Threat
The Department of Homeland Security’s (DHS) Homeland Infrastructure Threat and Risk Analysis Center (HITRAC) produced this National Risk Estimate (NRE) to provide an authoritative, coordinated, risk-informed assessment of the key security issues faced by the Nation’s infrastructure protection community from malicious insiders. DHS used subject matter expert elicitations and tabletop exercises to project the effect of historic trends on risks over the next 3 to 5 years. In addition, DHS used alternative futures analysis to examine possible futures involving insider threats to critical infrastructure over the next 20 years. The results are intended to provide owners and operators a better understanding of the scope of the threat and can inform mitigation plans, policies, and programs, particularly those focused on high-impact attacks.
Federal Bureau of Investigation
FBI Checklist for Reporting Economic Espionage or Theft of Trade Secrets
Federal Bureau of Investigation
(U//FOUO) FBI Counterintelligence Vulnerability Assessment for Corporate America
To prevent foreign entities from achieving their goals, a Counterintelligence Program (CIP) proactively searches for and uses information from multiple sources. An effective CIP draws information from security programs and other internal systems, as well as from the U.S. Intelligence Community (USIC). Once this information is assembled, an effective CIP develops a coherent picture and crafts a strategy to prevent the foreign entity from successfully achieving its goals and minimizes the damage already done. An effective CIP conducts active analysis of available information, requires annual CI education for all employees, and provides a system for immediate referral of behavior with CI implications.
Afghanistan, North Atlantic Treaty Organization
ISAF Security Force Assistance Guide
This guide is designed to provide NATO partners and troop contributing nations (TCNs) participating as part of the International Security Assistance Forces (ISAF) a common understanding of Security Force Assistance (SFA) activities. It provides a summary of the ISAF SFA concept as well as guidance and information concerning SFA activities, countering the insider threat, mission critical tasks, and training requirements in support of Afghan National Security Forces (ANSF).
U.S. Army
U.S. Army Cyber Attack Cycle Awareness Guide and Threat Vignettes
Department of Justice, Office of the Director of National Intelligence
National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs
U.S. Army
Asymmetric Warfare Group Guide to Insider Threats in Partnering Environments
This guide assists in three areas. First, it aides military leaders and all personnel to be aware of the indicators associated with insider threat activity while serving in a partnering environment. Second, this guide informs commanders and other leaders by giving them options on how to deal with insider threat activities. This guide is not all encompassing so there are other options a commander has dependent on their operating environment. Lastly, this guide is meant to generate open dialogue between coalition partners and partner nation personnel. Partnering in itself is a sensitive mission and only by creating trust and having an open dialogue with all forces will the mission be accomplished.