skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Spy the Lie: Detecting Malicious Insiders

Abstract

Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthorized recipients. Inadvertent action or inaction without malicious intent (e.g., disposing of sensitive documents incorrectly) can also cause harm to an organization. This review article will explore insider threat, specifically behaviors, beliefs, and current debates within the field. Additionally particular focus is given to deception, a significant behavioral component of the malicious insider. Finally, research and policy implications for law enforcement and the intelligence community are addressed.

Authors:
 [1]
  1. Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1452870
Report Number(s):
PNNL-SA-122655
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Technical Report
Country of Publication:
United States
Language:
English
Subject:
insider threat; deception detection; cybercrime; law enforcement; intelligence community

Citation Formats

Noonan, Christine F. Spy the Lie: Detecting Malicious Insiders. United States: N. p., 2018. Web. doi:10.2172/1452870.
Noonan, Christine F. Spy the Lie: Detecting Malicious Insiders. United States. doi:10.2172/1452870.
Noonan, Christine F. Mon . "Spy the Lie: Detecting Malicious Insiders". United States. doi:10.2172/1452870. https://www.osti.gov/servlets/purl/1452870.
@article{osti_1452870,
title = {Spy the Lie: Detecting Malicious Insiders},
author = {Noonan, Christine F.},
abstractNote = {Insider threat is a hard problem. There is no ground truth, there are innumerable variables, and the data is sparse. The types of crimes and abuses associated with insider threats are significant; the most serious include espionage, sabotage, terrorism, embezzlement, extortion, bribery, and corruption. Malicious activities include an even broader range of exploits, such as negligent use of classified data, fraud, cybercrime, unauthorized access to sensitive information, and illicit communications with unauthorized recipients. Inadvertent action or inaction without malicious intent (e.g., disposing of sensitive documents incorrectly) can also cause harm to an organization. This review article will explore insider threat, specifically behaviors, beliefs, and current debates within the field. Additionally particular focus is given to deception, a significant behavioral component of the malicious insider. Finally, research and policy implications for law enforcement and the intelligence community are addressed.},
doi = {10.2172/1452870},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Mon Mar 12 00:00:00 EDT 2018},
month = {Mon Mar 12 00:00:00 EDT 2018}
}

Technical Report:

Save / Share: