Insider Threat Program Lecture Review

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/58

flashcard set

Earn XP

Description and Tags

Flashcards covering key definitions, directives, roles, and techniques related to Insider Threat Programs, DoD policy, and structured analytical techniques based on lecture notes.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

59 Terms

1
New cards

EO 13587

Requires government agencies with classified information to establish an Insider Threat Program created by NITTF.

2
New cards

NITTF Co-Chairs

The Attorney General (AG) and the Director of National Intelligence (DNI).

3
New cards

DODI 5205.83

Establishes policy, assigns responsibilities, and prescribes procedures for the DITMAC, which is DoD's enterprise-level capability for insider threat information integration and management.

4
New cards

DODD 5400.11

Delegates authorities and responsibilities for the effective administration of the DoD Privacy Program.

5
New cards

Devil’s Advocacy

A type of Contrarian structured analytical technique.

6
New cards

UAM (User Activity Monitoring) Requirements

Includes file shadowing and keyboard collect, but not video.

7
New cards

UAM (User Activity Monitoring) Network Requirement

Required on Top Secret networks.

8
New cards

Imaginative Structured Analytic Techniques

Include brainstorming, red team analysis, alternative futures analysis, and Outside In Thinking.

9
New cards

Contrarian Techniques (Exclusions)

Do not include 'Indicators or Signposts of Change'.

10
New cards

DoD Insider Threat Program Senior Official

The Under Secretary of Defense for Intelligence (USDI (S)).

11
New cards

DITMAC (DoD Insider Threat Management and Analysis Center)

The part of the DoD Counter Insider Threat Program that develops enterprise-level risk criteria (thresholds).

12
New cards

Insider Threat Stressors

Often observed as personal, professional, and financial.

13
New cards

NITTF (National Insider Threat Task Force)

Responsible for establishing an Insider Threat policy and minimum standards for government insider threat programs.

14
New cards

Primary Vehicle for Civil Liberties Protection in USA

The US Bill of Rights.

15
New cards

First Amendment

The amendment of the constitution most applicable to the counter insider threat field.

16
New cards

Components of an Espionage Relationship

Motivation, communication, collection, and travel.

17
New cards

DoD Personnel Security Program Determinations

Uses National Adjudicative Guidelines.

18
New cards

EO 12333

Charges the Intelligence Community (IC) with providing the President and National Security Council with necessary information on which to base decisions.

19
New cards

DODI 7050.01

Establishes policy and assigns responsibilities for the DoD Hotline Program, which allows reporting of fraud, waste, abuse, violations, mismanagement, and classified information leaks.

20
New cards

2017 Insider Threat Guide

A NITTF document that lays out best practices for Insider Threat Programs.

21
New cards

Insider Threat Mitigation Responses Student Guide

Lays out the Pillars (Law Enforcement, Security, Counterintelligence, Cybersecurity, Mental Health/Behavioral Science, Human Resources, Legal) of Insider Threat.

22
New cards

SEAD 5

Addresses the collection and use of publicly available social media information.

23
New cards

DODM 5200.01

Pertains to the protection of classified information.

24
New cards

DODI 2000.26

Establishes policy, assigns responsibilities, and provides procedures implementing eGuardian as the DoD Law Enforcement (LE) SAR system.

25
New cards

Red Team Analysis

Models the behavior of an individual or group by trying to replicate how an adversary would think about an issue.

26
New cards

Indicators or Signposts of Change

A technique used to periodically review a list of observable events or trends to track events, monitor targets, spot emerging trends, and warn of unanticipated change.

27
New cards

DoD 5220.22-M (NISPOM)

Prescribes the requirements, restrictions, and other safeguards to prevent unauthorized disclosure of classified information.

28
New cards

Contrarian Techniques (Additional)

Include Devil’s Advocacy, Team A/Team B, What If, and High Impact/Low Probability.

29
New cards

Indicators or Signposts of Change (Application)

Used when an analyst needs to track an event over time to monitor and evaluate change.

30
New cards

Records Maintenance Duration

Records are maintained for 25 years.

31
New cards

Counterintelligence Pillar

Deals with contact with foreign nationals, foreign visits, and foreign travel.

32
New cards

Human Resources (HR) Referrals

Issues related to basic employment, disciplinary actions, and performance reviews are referred to HR.

33
New cards

Court Records Reporting

Court records are reported to Law Enforcement.

34
New cards

Mirror Imaging

An inclination to assume foreign leaders would behave as we imagine our own leaders would behave in similar circumstances.

35
New cards

Anchoring

A cognitive bias distinct from the tendency to search for or interpret information in ways that confirm preconceptions, preferences, and assumptions (which is Confirmation Bias).

36
New cards

Fruit of the Poisonous Tree Doctrine

Refers to the Fourth Amendment.

37
New cards

Privacy Act of 1974

Establishes a code of fair information practices governing the collection, maintenance, use, and dissemination of individuals' records by federal agencies.

38
New cards

DoD Insider Threat Program Monitoring

USDI (S) is responsible for monitoring the DoD Insider Threat Program.

39
New cards

Insider Threat Hubs Responsibilities

Required to maintain records and results of mitigated activity.

40
New cards

Personal Predisposition

The susceptibility or inclination to do something.

41
New cards

DODD 5205.16

An insider threat policy document that mandates insider threat information complies with all applicable laws and DoD policy issuances.

42
New cards

Imaginative Techniques (Purpose)

Encourage new perspectives, insights, and alternative scenarios.

43
New cards

DITMAC Information Sharing

Can share adverse personnel security information with DoD Components that have an official interest in the information and CAF (Central Adjudication Facility).

44
New cards

DCSA (Defense Counterintelligence and Security Agency)

Responsible for background investigations, adjudication for security clearances, and the oversight of DoD insider threats and mitigation efforts.

45
New cards

Freedom of Information Act (FOIA) Exemptions

Most common exemptions include personnel records, law enforcement, and classified information.

46
New cards

Espionage Relationship Components (Comprehensive)

Motivation, communication, travel, and collection.

47
New cards

Reporting Federal Criminal Law Violations

Executive Branch agencies report suspicions of an employee or officer breaking a federal criminal law to the Attorney General (AG).

48
New cards

Fraud, Waste, and Abuse Referrals

Referred to the Office of Inspector General (OIG).

49
New cards

Structured Analytic Techniques (SATs)

Used to mitigate bias.

50
New cards

Imaginative Techniques (Examples)

Include Brainstorming, Red Team Analysis, and Outside In Thinking, but not Team A/Team B.

51
New cards

Diagnostic Techniques (Exclusions)

Do not include Devil’s Advocacy. Examples include Key Assumptions Check, Quality of Information Check, Indicators of Signposts of Change, and Analysis of Competing Hypotheses.

52
New cards

Brainstorming (Application)

A technique used at the beginning of a project to generate a range of hypotheses about an issue.

53
New cards

Cyber Pillar

Deals with enterprise audit monitoring tool audit logs, authentication of people, User Activity Monitoring (UAM) for data analysis, UAM trigger development, profile data, printer log data, privileged users, trusted agents, and download history.

54
New cards

Outside In Thinking

A Structured Analytic Technique (SAT) used to identify the full range of basic forces, factors, and trends that would indirectly shape an issue.

55
New cards

Key Assumptions Check

Involves listing and reviewing the key working assumptions on which fundamental judgments rest.

56
New cards

User Activity Monitoring (UAM) Network Placement

UAM must be on Top Secret networks.

57
New cards

Diagnostic Techniques (Purpose)

Aim to make assumptions and logical arguments more transparent.

58
New cards

Analysis of Competing Hypotheses (ACH)

A technique used when there are large amounts of data.

59
New cards

E.O 13526

Prescribes a uniform system for classifying, safeguarding, and declassifying national security information.