ACI Books & Book Chapters

Document Type

Book

Files

Download

Download Full Text (2.2 MB)

Contributing USMA Research Unit(s)

Army Cyber Institute

Description

A concerned serviceman observes his counterpart acting erratically – plotting to cripple or contaminate the entire water system of a U.S. Army base. Suspicious behaviors observed over the course of a year point to a potential insider threat.

Insider threats are so dangerous because they are a betrayal of trust. Foundational to the U.S. military is the trust between service members. Erratic behavior doesn’t automatically indicate a possible insider threat, nor should service members spend their days suspicious of their colleagues. In a time when technology has empowered soldiers to be more effective and efficient, these threats are increasingly hazardous. How can we create a culture of awareness and support to catch problems early and disrupt a possible insider threat before it ever exists?

Publication Date

2018

Keywords

insider threat, social psychology, influence operations, ptsd

Insider Threat

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.