- Page 1 and 2: NAVAL POSTGRADUATE SCHOOL MONTEREY,
- Page 3 and 4: REPORT DOCUMENTATION PAGE Form Appr
- Page 5 and 6: Approved for public release; distri
- Page 7: ABSTRACT Federal government securit
- Page 11 and 12: LIST OF FIGURES Figure 1. Overview
- Page 13 and 14: LIST OF TABLES Table 1. Behavioral
- Page 15 and 16: LIST OF ACRONYMS AND ABBREVIATIONS
- Page 17 and 18: EXECUTIVE SUMMARY Federal governmen
- Page 19 and 20: of any changes in the personality o
- Page 21 and 22: ACKNOWLEDGMENTS Dedicated to my hus
- Page 23 and 24: I. INTRODUCTION A. THESIS QUESTION
- Page 25 and 26: government employees and are expect
- Page 27 and 28: • Utilization of “see something
- Page 29 and 30: II. LITERATURE REVIEW Recent unauth
- Page 31 and 32: E.O. 12968 “establishes a uniform
- Page 33 and 34: Under Intelligence Community Direct
- Page 35 and 36: classification (confidential, secre
- Page 37 and 38: C. FINANCIAL CONCERNS IDENTIFIED WI
- Page 39 and 40: D. EXAMPLES OF UNAUTHORIZED DISCLOS
- Page 41 and 42: Sulick also looks at the history of
- Page 43 and 44: law enforcement to cooperate with O
- Page 45 and 46: III. HISTORY OF NATIONAL SECURITY I
- Page 47 and 48: all data concerning the manufacture
- Page 49 and 50: 12 years until the lowest classific
- Page 51 and 52: E.O. 12065 continued automatic decl
- Page 53 and 54: Classification Appeals Panel (ISCAP
- Page 55 and 56: IV. DISCUSSION OF INSIDER THREAT AN
- Page 57 and 58: disclosures of Manning and Snowden,
- Page 59 and 60:
organizational leaders should never
- Page 61 and 62:
on male psychology. Over 95% of ins
- Page 63 and 64:
loyalty—one that may prevent a tr
- Page 65 and 66:
V. THE SECURITY CLEARANCE PROCESS
- Page 67 and 68:
eview all of the information, the
- Page 69 and 70:
Foreign Influence Unreported person
- Page 71 and 72:
Use of Information Technology Syste
- Page 73 and 74:
Program (EAP) or other counseling s
- Page 75 and 76:
VI. ROLE OF TECHNOLOGY TODAY Upon i
- Page 77 and 78:
holders current backgrounds, this t
- Page 79 and 80:
in the risk of misconduct. These re
- Page 81 and 82:
threat as: respond to discrepancies
- Page 83 and 84:
can be more easily verified and col
- Page 85 and 86:
VII. BIOGRAPHICAL SKETCHES OF KNOWN
- Page 87 and 88:
I seldom drank liquor, only beer an
- Page 89 and 90:
occasion being serviced orally.”
- Page 91 and 92:
Maas remarks about Ames, “But he
- Page 93 and 94:
and her father, Alberto. “To outs
- Page 95 and 96:
in Iraq and a resultant questioning
- Page 97 and 98:
soldiers and throwing furniture. 24
- Page 99 and 100:
2. Ideology/Disillusionment/Loyalty
- Page 101 and 102:
was a paranoid schizophrenic underg
- Page 103 and 104:
October 2000 that killed 17 America
- Page 105 and 106:
The Russian intelligence officers w
- Page 107 and 108:
contact procedures with his Russian
- Page 109 and 110:
Walker befriended people who admire
- Page 111 and 112:
5. Financial Concerns When intervie
- Page 113 and 114:
He failed to meet deadlines. He ign
- Page 115 and 116:
later admitted “he was corrupted
- Page 117 and 118:
damage to U.S.-foreign relations an
- Page 119 and 120:
next generation who extend the capa
- Page 121 and 122:
VIII. DISCUSSION OF DATA Upon revie
- Page 123 and 124:
easons, as did Abu-Jihaad, Manning,
- Page 125 and 126:
It can be argued almost every indiv
- Page 127 and 128:
Table 1. Behavioral Indicators Foun
- Page 129 and 130:
IX. CONCLUSIONS AND RECOMMENDATIONS
- Page 131 and 132:
Conclusion 3 Self-reporting changes
- Page 133 and 134:
Manning and Edward Snowden. Public
- Page 135 and 136:
employees are granted complete priv
- Page 137 and 138:
equirement for a clearance. This th
- Page 139 and 140:
integrity that enforces responsibil
- Page 141 and 142:
X. EPILOGUE Ultimately, the insider
- Page 143 and 144:
LIST OF REFERENCES Aftergood, Steve
- Page 145 and 146:
Defense Security Service. Roles and
- Page 147 and 148:
Herbig, Katherine L., Ray A. Zimmer
- Page 149 and 150:
———. Intelligence Community D
- Page 151 and 152:
———. Security from within: In
- Page 153:
INITIAL DISTRIBUTION LIST 1. Defens