Skip to content
Search

Latest Stories

Cyber Initiatives Group Fall Summit
cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

Designing an Effective Insider Threat Program

“But what is new is that the small fry also have the power of betrayal…Science, adding to our armoury, continually demands more mechanics and more clerks and with every demand makes the problem of security more difficult to solve.” - Rebecca West, The New Meaning of Treason (1966)

When West wrote that passage, she was describing treasonous banalities, citizens of western democracies who had betrayed their countries in service of Soviet tyranny.  Her words, however, have a quality of prescient timelessness in that they are as applicable today as they were almost 50 years ago.  In the Cold War era, the damage even the most proficient and motivated spy could inflict was constrained by the relative inaccessibility of sensitive information in comparison with access afforded by today’s IT systems.  The murders of heroic CIA Soviet agents ascribable to the treachery of Ames, Hanssen, and their ilk aside, the damage such turn-coats could inflict, albeit great, was bounded both by compartmentation and by the fact that much of the data to which they had access was retained in paper form.  That reality imposed operational constraints on those seeking to fully exploit the traitors’ access.  The time, effort, and potentially alerting nature of copying, photographing, or carrying documents out of the workplace forced the spy and his handler to consider the risk inherent in any such activity, a calculus that almost invariably served to limit the scale of damage they might otherwise have inflicted.  That is no longer necessarily the case.

Keep reading...Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.
Threat Con 2025

Related Articles

Chinese and Russian Space Pursuits Are Picking Allied Pockets

OPINION — India’s breakthrough lunar landing showed that our free world economies are in an age of healthy research, experimentation, and growth with [...] More

The Government has an Espionage Problem. Open Source should be part of the Solution.

OPINION — The unauthorized release of classified information and the subsequent arrest of Jack Teixeira has raised important questions. Why does the [...] More

What Mar-a-Lago is Teaching Us About the Declassification Process

OPINION — The Public Interest Declassification Board (PIDB) is an inconspicuous presidential advisory board created by Congress in 2000, to advise [...] More

Soviet Espionage Under the Cover of Diplomacy

Soviet Espionage Under the Cover of Diplomacy

EXPERT PERSPECTIVE — Immediately after Russia’s invasion of Ukraine last month, the US government expelled 13 Russian diplomats working at the United [...] More

Wars are not Won by Evacuations

Wars are not Won by Evacuations

Mark Kelton, Former Deputy Director, CIA's Counterintelligence, National Clandestine ServiceCipher Brief Expert Mark Kelton is a retired senior [...] More

The Spyhunter's Burden

OPINION — A recent email from the current Central Intelligence Agency (CIA) Chief of Counterintelligence (C/CI), wherein Agency retirees were [...] More