ORIGINAL RESEARCH FROM MIROR SUMMER 2024:
The Use of Military Narratives in White Supremacist Chatrooms on Telegram
An article by Dr. Dana Weinberg, Dr. Meyer Levy, Noah Cohen, and Yunis Ni.
Dr. Weinberg and her team investigate the connections between military and white supremacist narratives in extremist channels on the social media platform Telegram, as both a source of and impetus to insider threat.
PROFESSIONAL COMMENTARY FROM MIROR SUMMER 2024:
Countering Insider Threat in a Fractious Society – a View from Australia
An article by Timothy V. Slattery.
In societies that appear as divided as ever, Tim Slattery (Australian army, intelligence, and national security practitioner), explores how leaders and managers might counter insider threat in an environment he characterizes as employee trust and loyalty being difficult to identify and win, social norms eschewed in favor of self or tribe, victimhood celebrated as part of social justice expectations and the pressures of day-to-day life may convert a trusted employee into a trusted insider overnight.
Leave a Reply
You must be logged in to post a comment.
PROFESSIONAL COMMENTARY FROM MIROR SUMMER 2024:
Safeguarding “By, With, & Through” in Strategic Competition: A SOF CI Professional’s Perspective
An article by Michael Parrot.
Mike Parrott serves as the Special Operations Forces Counterintelligence (CI) Integration Course (SCIC) Director at the Joint Special Operations University (JSOU), MacDill Air Force Base, Florida. He talks about the difficult—yet attainable—goal we have to protect the force while ensuring the mission’s success…without compromising the trust built between trusted operators and their counterparts.
Leave a Reply
You must be logged in to post a comment.
ORIGINAL RESEARCH FROM MIROR SUMMER 2024:
The New Insider Threat: How Commercially Available Data can be used to Target and Persuade
An article by Dr. Jaclyn Fox.
Dr. Fox is a postdoctoral fellow with the Army Educational Outreach Program (AEOP) affiliated with West Point’s Army Cyber Institute. Her work at the nexus of extremism, privacy, and insider threat led her to conduct this research into an important and timely problem: how commercially available data may be used by nefarious actors to identify individuals’ insider access as well as whether they contain the predispositions and motivations for engaging in actions against their organization.
Leave a Reply
You must be logged in to post a comment.
PROFESSIONAL COMMENTARY FROM MIROR SUMMER
2024:
Mission First, People Always: Three Ways to Elevate Your Insider Threat Program Using Protective Intelligence
An article by Ryan Matulka.
The Senior Manager of Cyber Threat Intelligence and Insider Threat at Pacific Gas and Electric Company, one of the largest utility companies in the United States shares thoughts that bring together the worlds of protecting dignitaries and protecting our overall workforce.
Leave a Reply
You must be logged in to post a comment.
SENIOR LEADER PERSPECTIVE FROM MIROR SUMMER 2024:
WORKFORCE PROTECTION: THE NEXt GENERATION OF INSIDER RISK PROGRAMS
Throughout the community many have discussed that ‘Insider Threat’ and ‘Insider Risk’ have a branding and marketing problem because of the confrontational nature of employees regarding each other as “threat vectors.” Stephanie Jaros and Jon Roginski introduce “Workforce Protection” as a constructive-rather than confrontational means to protect employees and the enterprises they serve.
Leave a Reply
You must be logged in to post a comment.
SENIOR LEADER PERSPECTIVE FROM MIROR SUMMER 2024:
DIVERSITY IN INSIDER THREAT PROGRAMS: CRUCIAL TO MISSION SUCCESS
An article by Henry Nelson.
The Deputy Director of Enterprise Programs at the DoD Insider Threat Management and Analysis Center (DITMAC) shares his thoughts on the importance of the human element and criticality of diversity for mission success across the Intelligence Community, the DoD, and beyond.
Leave a Reply
You must be logged in to post a comment.
Featured Podcast episode:
“Roginski on Insider Threats”
The Cognitive Crucible podcast is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association.
During this episode, Dr. Jon Roginski discusses insider threats. Jon asserts that insider threat detection and mitigation is an inherently complex human problem, and describes two broad risk activities: trait-based and state-based. His colleagues at the West Point Insider Threat Program connect insider threats with the medical community and examine the problem as a living, breathing, and growing dynamic.
Leave a Reply
You must be logged in to post a comment.
Leave a Reply
You must be logged in to post a comment.