Criminal Justice /Insider Threat Program

Insider Threat Program

Criminal Justice22 CardsCreated about 2 months ago

This deck covers key concepts and indicators related to insider threats within the United States government, including definitions, reportable behaviors, and the importance of the Insider Threat Program.

An insider is defined as any person with authorized access to any United States government resource to include personnel, facilities, information, equipment, networks, or systems.

True
Tap to flip
Space↑↓
←→Navigate
SSpeak
FFocus
1/22

Key Terms

Term
Definition
An insider is defined as any person with authorized access to any United States government resource to include personnel, facilities, information, equipment, networks, or systems.
True
Which of the following are insider threats: Fort Hood shootings, Greg Chung – Economic Espionage, WikiLeaks?
All of the above
Hover to peek or log in to view all
Which of the following should be considered as reportable indicators of possible insider threats?
Unexplained or undue affluence, Displaying questionable loyalty to U.S. government, Disgruntled employee
During the spot and assessment phase of the recruitment, the foreign intelligence service will often explore potential exploitable weaknesses which may be used as a lever against the recruit if needed later.
True
Exploitable weaknesses by a foreign intelligence service when considering a source for recruitment may include: Adultery, Financial Problems, Gambling, Drugs or Alcohol.
True
Hover to peek or log in to view all
Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat.
True

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition
An insider is defined as any person with authorized access to any United States government resource to include personnel, facilities, information, equipment, networks, or systems.
True
Which of the following are insider threats: Fort Hood shootings, Greg Chung – Economic Espionage, WikiLeaks?
All of the above
Which of the following should be considered as reportable indicators of possible insider threats?
Unexplained or undue affluence, Displaying questionable loyalty to U.S. government, Disgruntled employee
During the spot and assessment phase of the recruitment, the foreign intelligence service will often explore potential exploitable weaknesses which may be used as a lever against the recruit if needed later.
True
Exploitable weaknesses by a foreign intelligence service when considering a source for recruitment may include: Adultery, Financial Problems, Gambling, Drugs or Alcohol.
True
Unauthorized downloads or copying of files, especially for employees who have given notice of employment termination, is an indicator of a possible insider threat.
True
Insider threat policy is only applicable to classified information. Sensitive, proprietary, or need-to-know information is not currently protected by the insider threat program policy.
False
Contact with an individual who is known to be, or is suspected of being, associated with foreign intelligence, security, or terrorism, should always be considered a reportable indicator of a possible recruitment.
True
Insiders work alone. They never recruit because it increases the chance of them being caught.
False
Attempting to gain access to an unclassified automated information system without authorization may be considered an information collection indicator.
True
Which of the following could be considered a possible indicator of an insider threat?
All of the above
An insider threat is anyone with authorized access to the information or things an organization values most, and who uses that access, either wittingly or unwittingly, to inflict harm to the organization or national security. When an insider becomes a threat, it can have far-reaching consequences on both an organization and national security.
True
Why is the success of the Insider Threat Program important to everyone at DHS?
All of the Above
One of your co-workers is exhibiting suspicious behavior. Which of the following should you report to the DHS Insider Threat Program?
All of the above
What are the most likely indicators of espionage?
Both A and C: Divided loyalties, Working outside of normal hours
You are a DHS project manager and you believe that one of your employees is exhibiting the following behaviors. Which behaviors should you report to the DHS Insider Threat Program?
Both A and B: Downloading and saving a large amount of data that is not typical for their job, Querying a database outside of their job duties
You overheard two colleagues having a discussion. Which of these discussions should be reported to the DHS Insider Threat Program?
Both B and C: They expressed appreciation for the tactical abilities of an active shooter and appeared to idealize the perpetrator, Both employees began screaming at each other
Your privacy, civil rights, and civil liberties are protected under the DHS Insider Threat Program?
True
Everyone knows if you 'see something, say something.' How should you report something to the DHS ITOC?
Both A and C: Email the DHS.insider.threat.program@hq.DHS.gov, Call 202-447-4200
Potential Risk Indicators (PRIs) are patterns of behavior that were documented from previous insider threat incidents. Any one of these PRIs may be insignificant on its own, but when it is observed in combination with other suspicious behaviors, it may warrant reporting.
True
Which of the following are potential indicators of unauthorized disclosure?
All of the above: Attempting to work around security protocols, Sense of 'self above the rules', Repeated and unreasonable disregard for policy
Unintentional insider threats are not of concern at DHS since there is no malicious intent.
False