The document discusses insider threat and solutions from the US Department of Defense perspective. It defines insider threat, discusses motivations and past cases like Edward Snowden. It outlines government measures including the National Insider Threat Task Force and requirements around user activity monitoring. Technical solutions discussed include user and entity behavior analytics using machine learning, extensive logging and forensic capabilities, and combining internal monitoring with external threat protection.