Case Study: Russian Insider Threat

Improved Essays
Using the Defense Security Service Insider Threat Risk Equation Where, Risk = (threat, vulnerabilities, values, or consequence), I propose the Risk of Russian insider threats has grown substantially, that US citizens, many with DoD security clearance access, maintain radicalized or adverse political beliefs favorable to Russia. Our vulnerabilities range from poor personnel vetting to all aspects of information and systems security, and DoD facilities security. Lastly, the values of these insider threats, threaten damage to the U.S. interests through possible espionage, terrorism, mission failure and a degradation of DoD resources and capabilities or other adverse consequences.
We also must acknowledge an intelligence failure occurred
…show more content…
It appears that our profile of a potential Insider Threat actor within DoD has several new indicators. One is an ideology which views the federal government with hostility or disdain, even while working for DoD. Two, is a Religious ideology that favors Russia and or Russian foreign policy over US foreign policy. Three, is any Neo-Confederate, white nationalist, white supremacist, or militia group. Four, is any DoD or military member highly active on Russian sponsored social media. It is noteworthy to point out that much of this increase in hostile Russian social media is now affiliated with the conservative Christian and Neo-Confederate social media, which happens to uptick upon the election and duration of President Obama’s term in office. To say race does not matter is to ignore the long, difficult history of race relations in our country. Yet it begs the question for anyone working in the field of insider threats: What security compromises have occurred by these potential actors during the eight years of President Obama? One of the key elements to minimize the impact of the insider threat is to “Establish trustworthiness – and seek to reduce the threat by establishing a high level of assurance in the trustworthiness of people…” We have not identified a large body of potentially untrustworthy people. Individuals and groups falling within these categories of insider threats have had ample incentive to support hostile Russian activities. How many breaches of security have we missed during the Obama administration? We may never

Related Documents

  • Improved Essays

    Abstract Stephen Flynn believes that there are goals of homeland security that are crucial to America’s bureaucracies and he senses that the country is wasting the chance to really protect the United States. Stephen discusses two crucial mistakes that he feels America has made and the first mistake is that he discusses is how homeland security is separated from national security. The two key intelligence agencies are not communicating. The second issue, he discusses is how our infrastructure is penetrable. In this lesson Stephen Flynn sees a problem with tactical thinking within the Department of Homeland Security (DHS).…

    • 684 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    This source was selected as it affords an overall perspective on this politically charged and socially sensitive affair as well as revealing the implications it had for Western global national security networks. The source is not merely a heresy document, but a legal occurring event recorded in the annals of parliament. It presents a compelling overview of these controversial events and parties involved. By appealing to the Cabinet for Australian citizenship to be granted to the Petrov’s, it reveals the strategic value the Australian government and ASIO had placed upon the Petrov’s during this cold war period. In a moment of exuberance for information gathering, Australian security agencies believed that the Petrov’s were a walking encyclopedia, ready to expose vast amounts of Soviet activity regarding espionage within Australia and its allies.…

    • 699 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    In 1954 President Dwight Eisenhower stated “We fear the men in Kremlin, we fear what they will do to our friends around them; we are fearing what unwise investigators will do to us here at home as they try to combat subversion or bribery or deceit within. “Also seen in Document…

    • 461 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Congress has a great influence and oversight on strategic intelligence activities. However, having an abundance of influence and oversight Congress can lessen the efforts and results of strategic intelligence. Strategic intelligence oversight must fall on the responsibility of an independent government entity, which manages, stores, and safeguard information and plans intelligence activities. Covert action is a sensitive process, which must be planned, coordinated, and approved without being impartial. Congress has been known to approve the financial budget to be spent on “emergency” expense.…

    • 307 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    2014-2017, we observe that there has been a growing tendency around the globe but not limited to the United States of America, United Kingdom, France, Netherlands, Turkey to see the rise of a populist rhetoric where demagogues are increasingly indulging in “gesture politics” while supporting and advocating for policies that right violate the sanctity of the right to privacy and other human rights in an attempt to ‘call for’ doing something about topical security issues and combating terrorism. These ideas find their foundations in preconceived prejudiced notions of the psychology of fear. Even though questions surrounding the future of national and international security and terrorism are legitimate and reasonable cause for concern, the…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    The United States is experiencing an increase in Transnational Organized Crime (TOC), particularly from the Salvadoran gang Mara Salvatrucha or MS-13. President Trump identified this organization as a direct threat the U.S. national security during his campaign for office. President Trump reiterated this in the State of Union address in January 2018. Mara Salvatrucha’s rapid growth and transnational connections create a violent threat to the Nation Security of the United States. This essay will address the threats posed by MS-13 to the United States.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Brandon Mayfield of Portland, Oregon was an attorney and converted Muslim when he was arrested in 2004 in connection with the Madrid bombings that killed 191 people (Abramson, 2005). The FBI held him for two weeks as a material witness but let him go after admitting that his fingerprints were erroneously matched with another set that were found near the scene of the bombing. This kind of mistake rarely happened; however, it prompted the government to tell Mayfield that his home was secretly searched allowed by a special court order that was authorized for intelligence purposes (Abramson, 2005). According to the American Civil Liberties Union (ACLU), the search was an abuse of the Patriot Act masking a search for evidence to use in a criminal…

    • 1181 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The Cold War was, by and large, a war many American Citizens were not prepared for. In the past wars were usually fought a considerable distance from home with less destructive technology. The Cold War changed this as the threat of Communism was closer than ever, either off the shore or inside the country it’s self, and the possibility of blowing up the world was great. It is a common reaction to new and dangerous concept is to be afraid, and this is exactly how the American public responded to the Cold War. During the Cold War many citizens feared losing their international leadership to the USSR, a post nuclear fallout, and the spread of communism close to home.…

    • 1432 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    “Balancing the Risks, Benefits, and Costs of Homeland Security.” Homeland Security Affairs 7, Article 16. Veronique, R. (2010). “The Economics of Homeland Security,” in Terrorizing Ourselves: Why U.S. Counterterrorism Policy Is Failing and How To Fix It,(eds). Washington, DC: Cato…

    • 487 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Empire of Bases: Good or Bad? American exceptionalism is the belief “that the United States is different, better, and morally superior to the rest of the world” (Layne, 142). It also implies that the United States is both destined and entitled to play a distinct and positive role on the world stage. In essence, exceptionalism is a popular ideal held by many Americans, but is it practical?…

    • 1257 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Marginalized status is not the only factor that plays a major role in racial profiling. Another common factor is white privileged. White individuals tend to have more advantages in today’s society, and those advantages are associated with disadvantages that the people of color face (Behnke, 2017). Not many individuals believe that white privilege plays a major role in today’s society, and many argue that their career success and financial security is due to hard work and dedication (Behnke, 2017). One can also argue that this is not completely accurate and white privilege does play a major role in American society.…

    • 1263 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Although Booth also explores this theme at the start of his article, his analogy of this traditional approach is rather disparate. Booth assumes that prior to the end of the Cold War, the main concern of security studies was based and focused on inter-state war and the deployment of weapons . Similar to the argument of Walt, Booth states that traditional security has been characterized by the three elements of military threats and counter threats, status quo, and state centrism . Consequently, Booth shifts and differs immensely from Walt, with a much more reasonable and relevant argument. Booth believes that although this was a well-focused part of the study of security, ever since the Cold-War has ended, the modern era has seen the decline in inter-state war, and the fact that will only fight if they or…

    • 1801 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays