SLIDE DECK: A counter-terrorism expert explains how to monitor for internal threats to your company

Image
Dynamiq principal consultant Joseph Iannazzo.

In the age of data security, the “internal threat” is increasingly becoming a sharp point of focus for governments and corporations around the world.

While organisations continue to test their security and emergency management plans to reduce external threats, recent global events have highlighted the enormous damage that can be inflicted by agents from within.

Think NSA leaker Edward Snowden, or Germanwings pilot Andreas Lubitz – these are the high profile cases, but there is a huge spectrum of risk for companies and government agencies that needs to be recognised and managed.

Counter-terrorism expert and principal consultant at global emergency management company Dynamiq, Joseph Iannazzo, told Business Insider corporations and employers needed to be aware of potential security incidents arising from within the workplace.

“The threat of a terrorist act is a trending issue currently being discussed by the media and risk managers. However, the likelihood of a malicious insider or disgruntled worker, contractor or customer should be just as concerning,” he says.

Iannazzo says many companies haven’t taken adequate steps to identify the types of threats they’re exposed to.

“Some organisations have general plans in place but they won’t necessarily be able to combat insider threats because they require a different, more targeted approach,” he says.

Having worked with the Australian federal attorney-general’s department on counter-terrorism, Iannazzo now advises businesses and clients on using an intelligence-led approach to ensuring the safety and security of their people, assets and operations.

Late last month he addressed the subject of Managing The Threat From Within at the Australian Security Industry Association Ltd (ASIAL) conference in Melbourne.

Here’s his presentation, which he’s kindly allowed us to reproduce.

[slideshow]
[slide
permalink=”1″
title=””
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide1.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”2″
title=”An FBI study of active shooters in the US last year revealed business (commerce) premises accounted for almost half (45.6%) of the total locations for 160 separate incidents. The next highest was education (i.e. schools) at 24.4%.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide2.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”3″
title=”Of 44 incidents in 2014 at premises that were open to pedestrian traffic, 68% of active shooters were not employees of the business in question.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide3.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”4″
title=”However, out of 23 incidents in 2014 at premises that were closed to pedestrian traffic, more than 95% involved a current or former employee.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide4.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”5″
title=”Here’s how Wikipedia defines an insider threat…”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide5.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”6″
title=”While the US National Counterintelligence and Security Centre defines it as…”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide6.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”7″
title=”And the Australian goverment says an insider threat is…”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide7.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”8″
title=”Iannazzo says that while many people are concerned about a terrorist attack, they should be just as concerned about other significant security incidents occurring internally.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide8.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”9″
title=”Iannazzo highlights the very recent (June 2015) Charleston church shootings in South Carolina. During a prayer service, nine people were killed by a gunman attempting to incite a race war. A Snapchat video was posted online just moments before the incident took place.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide9.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”10″
title=”Dylann Roof was indicted on 33 federal hate crime charges. What’s most interesting about this particular incident is Roof was invited to the prayer service by the same people he would go on to kill, despite there being a ton of material associated with white supremacy, the Confederate flag and a manifesto of his beliefs on race available on his website and social media profiles.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide10.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”11″
title=”The September 11, 2001 US terrorist attacks sparked a massive overhaul of the global aviation industry, still impacting today’s travellers. Although the attacks were widely recognised as an external terrorist plot, the pilots who purposefully crashed planes into the World Trade Center and Pentagon took flight training lessons in southern Florida.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide11.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”12″
title=”Germanwings co-pilot, Andreas Lubitz, deliberately crashed his plane after locking the commander out of the cockpit. It was the act of an unstable, disgruntled employee who had learned he was medically unfit to fly and wanted to do something to ‘change the system’.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide12.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”13″
title=”Convicted murderers David Sweat and Richard Matt pulled off a brazen escape from an upstate New York prison with the help of Joyce Mitchell, an industrial training supervisor who worked in the prison’s tailor shop. She provided the prisoners with hacksaw blades, chisels, a punch, and a screwdriver.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide13.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”14″
title=”But Mitchell wasn’t alone in assisting the escapees. Veteran corrections officer Gene Palmer (below right) was charged with smuggling illegal contraband. It’s alleged Mitchell recruited him to bring hamburger meat, filled with tools later used in the escape, to the prisoner’s cell.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide14.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”15″
title=”Given the rapid pace of technological innovation, it’s becoming increasingly difficult to protect employees from threats that are created externally but embedded and shared internally.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide15.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”16″
title=”Nearly half of all US companies deal with similar cyber attacks each year. Chelsea Manning (below left) stole thousands of secret US intelligence documents and shared them on WikiLeaks. Edward Snowden, a former CIA analyst, (below right) leaked classified information from the U.S. National Security Agency (NSA).”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide16.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”17″
title=”In June 2015, the US Office of Personnel Management became the target of a massive data breach, exposing millions of people’s personal records. The attackers were thought to have gained access to the system through social engineering — a process whereby insiders with credentials are psychologically manipulated to reveal confidential information.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide17.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”18″
title=”Ex-US Navy sailor Robert Hoffman was jailed for 30 years after trying to ‘pass state secrets to Russia’. Hoffman, arrested in 2012, was a 20-year veteran. The FBI targeted him as a potential spy and set him up to see if he would hand over encrypted naval tracking information — he did.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide18.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”19″
title=”Internal threats have no boundaries. Former Dow Scientist Wen Chyu Liu was convicted of stealing trade secrets and selling them to companies in China. What’s unique about this particular case is Liu paid off a number of other accomplices, some international, to help him carry out his plans.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide19.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”20″
title=”Insider threats don’t always have to be intentional. Republican congressman Pete Hoekstra proved this in 2009 when he Tweeted messages containing potentially revealing information during a visit to Iraq. Hoekstra defended his actions claiming there was no formal rules against what he did.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide20.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”21″
title=”There are targeted ways you can manage insider threats.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide21.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”22″
title=”Focusing on people, assets and operations are the most critical objectives.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide22.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”23″
title=”Establishing a framework to identify potential, future threats is the next step. Iannazzo suggests identifying high-value employees, completing background checks and finding out who would be most susceptible to bribes and intimidation.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide23.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”24″
title=”Understanding behavioural analysis and the possible ways in which insider threats can be realised is vital. Companies must be anticipating that these types of acts will occur, rather than simply preparing prevention methods.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide24.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”25″
title=”This is where monitoring people’s behaviour is important. There may be a threat building in front of you.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide25.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”26″
title=”Consider people’s life situations…”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide26.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”27″
title=”And watch for these kinds of behaviour…”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide27.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”28″
title=”Monitoring personnel social media can also give you indicators of an emerging threat.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide28.jpg”
caption=””
credit=””
credit_href=””
]
[slide
permalink=”29″
title=”Once you’ve discovered a threat, understand there’s no tailored solution. A collective organised response should be formed, based on information, analysis and evidence.”
content=””
image=”http://edge.alluremedia.com.au/uploads/businessinsider/2015/07/Slide29.jpg”
caption=””
credit=””
credit_href=””
]
[/slideshow]