09.12.2012 Views

2003 IMTA Proceedings - International Military Testing Association

2003 IMTA Proceedings - International Military Testing Association

2003 IMTA Proceedings - International Military Testing Association

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHARACTERIZING INFORMATION SYSTEMS INSIDER<br />

OFFENDERS<br />

Lynn F. Fischer<br />

Defense Personnel Security Research Center<br />

Introduction<br />

The development of a database to track trends and common characteristics of<br />

information systems insider offenses in the Department of Defense has been underway at<br />

PERSEREC for over 3 years. An early analysis of data drawn from the Insider Events<br />

Database was presented to <strong>IMTA</strong> at the Edinburgh meeting in 2000. Since then<br />

additional information has been obtained from the investigative agencies of the military<br />

services and we can more clearly define common characteristics and motivations of<br />

offenders as well as the types of offenses they commit against defense systems. Insiders<br />

are defined here as individuals holding a position of trust and given authorized access to a<br />

defense information system. As military services throughout the world are increasingly<br />

dependent on computer systems, internal networks, and the Internet, it is probable that<br />

scenarios such as those described in this report will be repeated in the military<br />

organizations of other countries.<br />

While many approaches to detecting and preventing cyber-offenses committed by<br />

insiders focus on technical countermeasures, we at PERSEREC are persuaded that the<br />

insider threat is essentially a trust-betrayal issue. That is, the insider threat is a human<br />

problem related to the selection and monitoring of persons who have use of or<br />

administrative control of our critical networks. Another important factor working against<br />

misuse or abuse of systems must be adequate security education. We have found that<br />

many offenders did not know or had not been informed of what was unacceptable<br />

behavior and what its consequences are for the integrity and operability of their systems.<br />

Who Are the People Doing This and Why Do They Do It?<br />

Based on a review of over 80 insider events in the database of different<br />

magnitudes of seriousness, most offenses were committed by younger service members<br />

or by information technology (IT) professionals under contract to a defense facility.<br />

Forty-seven percent were attributed to misuse by uniformed service members. Of 33<br />

events for which the rank of the offender is known, 22 involved junior enlisted personnel,<br />

nine were committed by non-commissioned officers, and two by commissioned officers.<br />

With few exceptions, the service members, whether IT professionals or not, knew a great<br />

deal more about computer systems than was required by their job. Several engaged in<br />

hacking or computer-related private enterprise from home during off-duty hours.<br />

This paper reviews several significant findings or generalizations, based on data<br />

available to date, that are emerging from the analysis. However, a much better<br />

understanding of situational factors, motivations, and contributing causes can be gained<br />

from in-depth case studies of those events that resulted in significant consequences for<br />

the organization. Therefore, each of the general observations will be illustrated by a case<br />

study that demonstrates the importance of situational factors at the place of employment,<br />

interpersonal and social interrelationships (often hostile and vindictive), and the attitudes<br />

of the offenders. The following observations are clearly emerging from the data acquired<br />

from sources of record to date.<br />

289<br />

45 th Annual Conference of the <strong>International</strong> <strong>Military</strong> <strong>Testing</strong> <strong>Association</strong><br />

Pensacola, Florida, 3-6 November <strong>2003</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!