Sunday, March 5, 2017

Intent, Opportunity and Capability (week 12)

If someone asked you who Harold T. Martin III was would you know? What about Edward Snowden? Most people know the latter individual. These 2 people do have something in common; Snowden ‘took’ a huge cache of classified documents and fled the United States in 2013. Martin on the other hand is in custody as of right now, arrested in August of last year for allegedly stealing classified material which was found in his home and car. In Martin’s case, some of the material he took, like the NSA-developed exploits, ended up being published online.
Image Courtesy of beforeitsnews.com
The debate is still on whether he published them or he was hacked and someone else published them. What these 2 contractors have in common is that they both worked for Booz Allen Hamilton, a well-known and established government contractor; nothing against Booz Allen, just the case of bad apples falling from their tree.

The National Counterintelligence and Security Center (NCSC) defines insider threat as “…when a person with authorized access to U.S. Government resources, to include personnel, facilities, information, equipment, networks, and systems, uses that access to harm the security of the United States”. While the NCSC’s definition focuses on the U.S. Government, the same logic can be rightfully applied to private corporations with the key takeaway being, these people have ‘approved’ access and knowledge of your system. Kind of tough to catch the insider threats then… wow! How do I know Joe Blow from accounting has no malicious intent when he reads the company’s financials or what Jane Doe from IT is intending to do with the firewall policy report. We simply can’t. Intent is something that can’t be measured.

The threat triangle states that 3 things have to be present for the threat to materialize; Intent, Opportunity and Capability. If any one of those elements is missing, the threat may not materialize. Of the three, intent is the intangible element. You can measure whether someone is capable of doing something, you can measure what your security landscape is therefore determine what opportunities may be present in terms of security gaps/lapses, but you can’t measure whether someone is intending to commit a crime. We can speculate based on other factors like debt issues, personal problems, negative emotions towards the company; but all these are at best simply guesses or speculations. The focus, therefore, should be on opportunity and capability when are crafting an insider threat mitigation plan.

In conclusion

As noted by the Snowden-Martin case, even the best of the best can and do experience cases of insider threats. Every company has their ‘secret-sauce’ and none wants their proprietary advantage or whatever keeps them at the top of their food chain exposed to the public. Many companies would fold if their trade secrets got publicized. Think about what Pepsi would do if Coke’s ‘recipe’ got publicized or what Bing would do if Google’s search engine algorithms were readily available for the public to scrutinize. The insider threat is surreal and can cause a lot of damage to a company. Every company should pay attention to their ‘approved’ humans and invest in controlling both external and internal threats accordingly.

No comments:

Post a Comment