Insider Threat Programs are designed to deter, detect, and mitigate actions by insiders who represent a threat to national security.

Privacy and Civil Liberties Case Law Examples

Potential Risk Indicators: Insider Threat
PDF icon June 2019, 11 Pages Most insider threats exhibit risky behavior prior to committing negative workplace events. If identified early, many risks can be mitigated before harm to the organization occurs.  This job aid provides information on insider threat potential risk indicators.

Privacy and Civil Liberties Case Law Examples

Insider Threat Reporting Procedures
PDF icon June 2019, 1 Pages This job aid provides information on reporting to Insider Threat Programs for employees with Department of Defense, Cleared Industry, and Federal Agencies.

Insider Threat Resources for Industry Senior Officials

Insider Threat Resources for Industry Senior Officials
PDF icon June 2019, 4 Pages This brochure describes resources available to Senior Officials, to meet Industry needs during the development or maturation of Insider Threat Programs.

Insider Threat Programs for the Critical Manufacturing Sector—Implementation Guide

Insider Threat Programs for the Critical Manufacturing Sector—Implementation Guide
PDF icon May 2019, 17 Pages This job aid is a collaboration between the DHS Cyber and Infrastructure Agency and the DCSA Center for Development of Security Excellence.  It provides guidance and information for critical manufacturing organizations to establish insider threat programs.

Privacy and Civil Liberties Case Law Examples

Privacy and Civil Liberties Case Law Examples
PDF icon May 2019, 5 Pages This job aid gives examples of court decisions that have provided protection of privacy and civil liberties.

The Principles of Confidentiality

The Principles of Confidentiality
PDF icon May 2019, 1 Page This job aid lists the principles of confidentiality with respect to the insider threat program.

Whistleblower Protection Policies and FAQs

Whistleblower Protection Policies and FAQs
PDF icon May 2019, 1 Page This job aid lists resources and answers frequently asked questions about Whistleblower Protection Policies.

Freedom of Information Act (FOIA) Exemptions

Freedom of Information Act (FOIA) Exemptions
PDF icon May 2019, 1 Page This job aid provides information about the nine exemptions congress established under the Freedom of Information Act (FOIA).

Privacy Act Consent Rule Exceptions

Privacy Act Consent Rule Exceptions
PDF icon May 2019, 1 Page “No agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains [subject to 12 exceptions].” This job aid lists the 12 exceptions.

Workplace Environment and Organizational Justice

Workplace Environment and Organizational Justice
PDF icon May 2019, 1 Page This job aid discusses how a positive workplace environment can affect employees.

Critical Thinking Tools for Insider Threat Analyst

Critical Thinking Tools for Insider Threat Analyst
PDF icon May 2019, 4 Pages This job aid provides a list of insider threat critical thinking tools and how to use them.

Critical Thinking Techniques for Insider Threat Analyst

Critical Thinking Techniques for Insider Threat Analyst
PDF icon May 2019, 2 Pages This job aid provides a list of skills insider threat analysts need to develop in order to accurately interpret evidence.

Why Threats of Violence Are Not Protected

Why Threats of Violence Are Not Protected
PDF icon May 2019, 1 Page This job aid provides examples of case law that identify situations where speech that includes threats of violence may not be protected under the first amendment.

What's the 411 on the 811?

What's the 411 on 811 Job Aid
PDF icon May 2019, 1 Page This quick decision guide outlines some thresholds federal agencies may use when reporting to the FBI, potentially generating what is known as an 811 Referral.

Tales from the Inside: Volume 1

Tales from the Inside: Volume 1
PDF icon April 2019, 1 Page This job aid provides a vignette of a real world event. It highlights a positive outcome of insider threat program risk mitigation. The name of the SUBJECT and the organization have been anonymized to protect privacy.

Insider Threat Annual Vigilance Campaign Job Aid

Insider Threat Annual Vigilance Campaign Job Aid
PDF icon December 2018, 2 pages. This 2019 annual insider threat awareness job aid is intended to complement your existing annual insider threat awareness training to increase awareness of potential threats to government resources and what we can do to protect against potential threats. An information campaign makes a wonderful supplement to annual training and can serve as a nonintrusive reinforcement of training and reminder of the need for vigilance.

Potential Risk Indicators: Kinetic Violence

Potential Risk Indicators: Kinetic Violence
PDF icon November 2018, 2 pages.We've all heard the expression, "If you see something, say something!" But what, exactly is the "something" we should be looking for? This job aid provides an introduction to the "The FBI Top 21 Concerning Behaviors" that were identified In the FBI report titled, "A Study of Active Shooter Incidents in the United States Between 2000 and 2013."

Insider Threat Virtual Forum Guidance

Insider Threat Virtual Forum Guidance
PDF icon June 2018, 1 page. This job aid provides guidance for conducting an Insider Threat Virtual Forum.

Insider Threat Indicators in UAM</a>

Insider Threat Indicators in UAM
PDF icon March 2018, 8 pages. This job aid discusses Insider Threat policies and procedures for User Activity Monitoring (UAM) on classified networks in support of Insider Threat Programs. Logging, monitoring, and auditing of information system activities can lead to early discovery and mitigation of behavior indicative of insider threat. UAM also plays a key role in prevention, assistance, and response (PAR) capabilities to insider kinetic violence threats.

Insider Threat Definitions</a>

Insider Threat Definitions
PDF icon 2017, 20 pages. This job aid provides information on Insider Threat terminology and definitions.

Customizable DoD Command Brief for Insider Threat Awareness</a>

Customizable DoD Command Brief for Insider Threat Awareness
PPT icon November 2017, 38 pages. The customizable presentation can be used by your organization to provide in person Insider Threat Awareness briefings.  The briefing meets National Minimum Standards for insider threat awareness training and includes a practical exercise with instructor guide.

DoD Component Insider Threat Training Requirements and Resources

DoD Component Insider Threat Training Requirements and Resources
PDF icon March 2017, 3 pages. This job aid provides information on Insider Threat program management personnel training requirements and resources.

Sample Insider Threat Plan

Sample Insider Threat Program Plan feedback
PDF icon August 2016, 4 pages. This Job Aid provides a sample plan that can be tailored to the specific Insider Threat Program procedures and processes in place at your company. The template is not mandatory, but it can be used as a starting point to explain how your facility will accomplish various elements of its Insider Threat Program.

Insider Threat Program (ITP) for Industry

Insider Threat Program (ITP) for Industry
PDF icon May 2016. This job aid provides information on establishing an Insider Threat Program, conducting Insider Threat training, the requirements, definitions and resources and more.

Foreign Intelligence Entity Targeting Recruitment Methodology

Foreign Intelligence Entity Targeting Recruitment Methodology
PDF icon March 2016, 1 page. Intelligence officers spot and assess individuals for potential recruitment.

Understanding Espionage and National Security Crimes

Understanding Espionage and National Security Crimes
PDF icon April 2015, 2 pages. This job aid provides information on understanding espionage and national security crimes.