Question 1: Construct an assessment of ONCIX strategy, prevention and detection concerning either insider threats, or, economic threats.
Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the most effective safeguard against insider threats is a knowledgeable, trusted workforce which is confident that their privacy and civil liberties are respected.”[footnoteRef:2] Making sure that its employees are trustworthy and invested is the first line of defense against insider threats. Gathering data from multiple sources is another line of defense in the ONCIX strategy to mitigate the risk of malicious insiders. The basis of the approach is to use a whole-person, whole-of-career concept that so as to analyze data and to identify anomalies that present themselves. Anomalies are reviewed to see if any foreign intelligence entity (FIE) nexuses are present. FIE activities are analyzed as well for the purpose of identifying patterns of behavior that correspond with an insider threat.[footnoteRef:3] [2: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 4. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf] [3: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf]
Automation is another key aspect of the strategy and ONCIX plans to use automated records checkers to help identify applicable counterintelligence information that would assist in identifying an insider threat.[footnoteRef:4] Risk management is also part of its strategy: insider threat methods are meant to include counterintelligence equities within a risk-based framework for detection purposes. [4: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf]
The culture of the office is also important as a line of defense: the strategy here is to promote insider threat awareness among employees so that workers are both conscious and vigilant of insider threat potential and remain alert to possibilities of risk at all times.[footnoteRef:5] To achieve that end, networking and system monitoring provides key technical support so that red flags or triggers do not go undetected by monitoring programs even if they do go undetected by workers. Data that is flagged is then cross-checked against a variety of other data sources to detect anomalies. Finally, the strategy uses an auditing function meant to prevent unauthorized retrieval of information and unauthorized activity by workers from occurring. The goal here is to maintain, ultimately, the most secure information infrastructure possible.[footnoteRef:6] [5: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf] [6: National Counterintelligence Strategy of the United States of America 2016 (Strategy), 5. https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf]
Overall, the strategy in place is one that is structured, functional and operational: the strategy focuses first and foremost on delivering an organizational culture that promotes and fosters awareness among workers in the office; this awareness is absolutely essential for identifying and deterring insider threats. It means that protocol are more likely to be followed, as everyone will know that everything they do is being watched and monitored and that any actions out of the ordinary will be flagged and compared to other anomalies to determine whether the actor is an FIE.
The organization supports this culture with technological programs that assist in the monitoring of individuals and their actions. This two-pronged approach uniting a workplace culture with a technical methodology of monitoring and evaluating employee actions to determine anomalies and potential insider threats is comprehensive and cohesive and will facilitate achievement of the objective of mitigating the risk of insider threats within counterintelligence.
The first line of defense is the most powerful, which is where the office is concentrating efforts as well, which is in the hiring of trustworthy agents to serve in the office. This means that every hire has to be thoroughly vetted and documented to make certain that there has been no risk of the agent having become an FIE at any point in his or her career. This requires a very robust human resources department in the office, one that is trained to vet incoming agents and employees and has extensive knowledge of the counterintelligence field, what factors to identify as potential triggers, and how to go about collecting a pool of potential hires. That pool of talent will be the most critical source for...
After all, although the polygraph cannot be considered to be definitive proof -- it cannot be used as evidence in the court of law, for example -- it is a cheap way to identify and eliminate major threats to security. Nevertheless, the notorious instances in which the polygraph provided counterintelligence operations with unreliable information seem to loom over the head of much of the information that is gathered through them.
Instead, it has been suggested, he was more interested in his significant value to the Russian agents to whom he passed his information on to (Court TV). In short, Hanssen felt an elevated level of importance; one that the FBI was incapable or, in his eyes, unwilling to provide for him. As a consequence, Hanssen became a rather devastating mole within the FBI, and was largely unsuspected -- because
Why Ethical Egoism is a Problematic Framework for Intelligence CI Literature Review Introduction The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by researchers on
Morality of Counterintelligence Ethical Implications and the Need for a Theoretical Framework CI Literature Review Deception is at the core of counterintelligence: yet, it is a problematic core because of the corruption associated with deception in ethical systems. Mattox (2002), for example, observed that the practice of deception “is subject to limitations imposed by the demands of morality” (4). Unfortunately, morality within the realm of counterintelligence is often the first casualty, as
CI FinalAbstractThis thesis describes the need for an ethical standard in counterintelligence (CI) so as to facilitate collaboration among the various CI agencies and the private sector. It conducts an analysis of the formation of the counterintelligence program under Angleton, the use of CI within the Federal Bureau of Narcotics under Anslinger, and the use of CI in the Phoenix Program and the FBI�s COINTELPRO. This analysis is used to
HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCEPROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT USCOUNTERINTELLIGENCE POLICIESA Master ThesisSubmitted to the FacultyofAmerican Public University SystembyAlexgardo OrriolaIn Partial Fulfillment of theRequirement for the DegreeofMaster of ArtsAugust 2020American Public University SystemCharles Town, WVviTheauthorhereby grantsthe American PublicUniversity System the right todisplay these contentsfor educational purposes.Theauthorassumestotalresponsibility formeetingthe requirementsset by UnitedStates copyrightlawfor the inclusionofany materialsthatare not the author�screation or in the public domain.� Copyright2020by Alexgardo OrriolaAll rights reserved.DEDICATIONI dedicate thisthesisto
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now