“The ongoing cyber-thefts from the networks of
public and private organizations, including Fortune
500 companies, represent the greatest transfer of
wealth in human history.”
• Insider threats remain the top counterintelligence challenge to our community.
• Over the past century, the most damaging U.S. counterintelligence failures were perpetrated by a trusted
insider with ulterior motives.
• In each case, the compromised individual exhibited the identifiable signs of a traitor – but the signs went
unreported for years due to the unwillingness or inability of colleagues to accept the possibility of treason.
• Insiders … are people who have been lured to betray their nation for ideological reasons, a lust for
money or sex, or through blackmail.
• Mankind's methods may change – but core motivations do not.
• Insiders convicted of espionage have, on average, been active for a number of years before being
• The damage caused by malicious insiders will likely continue to increase unless we have effective
insider threat detection programs that can proactively identify and mitigate the threats before
they fully mature.
Six Recommendations from FBI
Ease of Implementation
1. Use appropriate screening
processes to select new
2. Educate and regularly train
employees on security or other
3. Provide non-threatening,
convenient ways for employees
to report suspicions.
5. Routinely monitor computer
networks for suspicious activity.
4. Ensure that proprietary
information is adequately, if not
6. Ensure security (to include computer
network security) personnel have the
tools they need.
“Remind employees that reporting security concerns is vital to
protecting your company’s intellectual property, its reputation, its
financial well-being, and its future. They are protecting their own
jobs. Remind them that if they see something, to say something.”
– FBI Insider Threats