asac insider threat report july 2018€¦ · .. --... i·~i : aviation security advisory committee...

23
~:·--- .. i·~i : AVIATION SECURITY ADVISORY COMMITTEE July 19, 2018 Honorable David Pekoske Administrator Transportation Security Administration 601 12 th Street South Arlington, VA 20598 Dear Administrator Pekoske: At its meeting on July 17, 2018, the Aviation Security Advisory Committee (ASAC) formally approved the Report on Insider Threat originally sent to you as an Advance Copy on June 21, 2018. For the record, a final copy of the Report is attached hereto. There are no substantive changes from the original submission. In order to plan for future ASAC work on the insider threat issue, I would like to request a short meeting some time in the next few weeks to discuss the next phase of this project, including your expectations and projected time lines. The next meeting of our Insider Threat Subcommittee is scheduled for August 29 so a meeting before then would be extremely helpful. Thanks very much. Sincerely yours, Steve Alterman Chairman Cc: Victoria Newhouse, ASAC Executive Sponsor Tamika Elhilali, ASAC DFO Dan McCann, Insider Threat Subcommittee DFO Serge Potapov, TSA Co-chair, Insider Threat Subcommittee Frank Capello, Industry Co-chair, Insider Threat Subcommittee

Upload: others

Post on 17-Apr-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:·---.. i·~i : AVIATION SECURITY ADVISORY COMMITTEE

July19,2018

Honorable David PekoskeAdministrator Transportation Security Administration601 12th Street South Arlington, VA 20598

Dear Administrator Pekoske:

At its meeting on July17, 2018, the Aviation Security Advisory Committee (ASAC) formallyapproved the Report on Insider Threat originally sent to you as an Advance Copy on June 21, 2018.For the record, a final copy of the Report is attached hereto. There are no substantivechangesfrom the original submission.

In order to plan for future ASAC work on the insider threat issue, I would like to request ashort meeting some time in the next few weeks to discuss the next phase of this project, includingyour expectations and projected time lines. The next meeting of our Insider Threat Subcommitteeis scheduled for August 29 so a meeting before then would be extremely helpful.

Thanks very much.

Sincerely yours,

Steve Alterman Chairman

Cc: Victoria Newhouse, ASAC Executive SponsorTamika Elhilali, ASAC DFO Dan McCann, Insider Threat Subcommittee DFO Serge Potapov, TSA Co-chair, Insider Threat Subcommittee Frank Capello, Industry Co-chair, Insider Threat Subcommittee

Page 2: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~=· .. --l!li•~.1 : AVIATION SECURITY ADVISORY COMMITTEE

REPORT OF THE AVIATION SECURITY ADVISORY COMMITTEE

ON INSIDER THREAT AT AIRPORTS

Page 3: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Tableof Contents

Introduction ..................................................................................................................................1

Definition of insider Threat............................................................................................................1

Approach ...........................................................................................................................................1

Definition...........................................................................................................................................3

ComparativeAnalysis Of Leading Domestic Companies’ Insider Threat Initiatives..........................4

Recognized Practices That Are Common Among Mature Insider Threat Programs..........................8

Insider Threat Mitigation Programs at InternationalAirports ........................................................9

Security Screening and Inspection ....................................................................................................9

BackgroundChecks andVetting of Employees and Threat Assessments........................................10

InternalControls and Auditing of Airport-Issued Credentials .........................................................11

Security for Higher Risk EmployeePopulations and theUse of Intelligence...................................11

Security Awareness, Training and Vigilance ....................................................................................11

Appendix A: Insider Threat Definitions & Policy Scopes ..............................................................13

Appendix B: Members of ASAC Working Group on Insider Threat at Airports..............................19

i | P a g e

Page 4: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, .... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

INTRODUCTION

In a letter to Stephen Alterman, Chairman of the Aviation Security Advisory Committee (ASAC), dated March 23, 2018, TSA AdministratorDavid P. Pekoske requested thatASAC look atthe security threat posed by airport insiders– aviation workers with privileged access to restricted areas of our Nation’s Airports, and thereby to commercial aircraft.

The request envisioned two parts to the initiative with the firstpartofthe initiative to be deliveredwithin60 to90 days andfocus ona holistic report aroundthe concept of insider threat with the following topics for consideration:

• Definition of “Insider Threat” from an industry perspective; • Comparative analysis of leadingdomestic companies’ insider threat initiatives, and; • Analysis of at least one international program (e.g., Israel, AIRPOL1 Amsterdam Airport

Schiphol); and, • Recognizedpractices that are commonamong mature insider threat programs.

In response to this request, ASAC convened its Working Group on Airport Access Control, and identified sub-working groups, or teams, to address the four separate elements of the request.

This report consolidates the teams’ research in response to the Administrator’s firstrequest.

Response tofuture relatedrequests from the Administrator will likely be draftedby the newly forming ASACSubcommittee onInsider Threat.

DEFINITIONOF INSIDER THREAT

Approach

The working group collected Insider Threat Definitions and PolicyScope(seeAppendixA) from multiple sources, including governmentagencies, trade and otherprofessional organizations, as well as privateentities and unattributed sources. Thepurposeof this initial effort was to review and assess theapplicability of existingdefinitions to collectively defineinsider threat from an aviation industry perspective.

The working group discussed the scope of what should be considered in defining insider threat, butrecognized that individual entities within theaviation industryarelikelyto adhereto abroader meaning, covering a wide variety of risks toinclude theft of intellectual property or sensitive data, sabotage of systems, violence in the workplace, property damage, etc.

AIRPOL, a coordinating body of law enforcement units at Europeanairports is currently developing anInsider Threat Guidebook and training course.

1 |P a g e

Page 5: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Considering that TSAwas createdafter September 11, 2001, to prevent similar terrorist attacks into thefuture, theworkinggroup concluded that an overly broad definition was inappropriate.Instead, the definition should align TSA’s mission of protecting the nation’s transportation systems to ensurefreedom of movement for peopleand commerce, by focusingefforts on criminal activity, terrorism, or other illicit actions which inflict “significant” harm to people, anorganization, the air transportationsystem or national security as it relates to events such as9/11. The intent of the definition isto focuson insider activity that could result in a catastrophicevent for which TSA wascreated to prevent. There are other insider activitiesthat could occur without causing such harm to the air transportation system. Those activities should be considered asindicatorsof vulnerabilitiesthat could be exploited to harm the transportation system.

For thepurposeof theinsider threat definition under this task, thefollowing is implied: • The term “individuals” includes current or former employee(s), contractors or others who,

whether on or off the airport, have/had access to sensitive areas and or information, or those who have developed insiderknowledge through research oraccess to security sensitive tools, equipment, information or current or former employees.

• The term “sensitive” encompasses both physical space and information, whether on or off the airport, in comparison to the term “secure areas” which is limited to physicalspace.

• The term sensitive was chosen as an attribute to describe access to physical areas and information that require specialprotection, and/or are governed by legislation, regulation, policy, or other programs inorder toprevent harm. Sensitive areas andinformation are restricted from the general public and protected from unauthorized access ordisclosure respectively. The term sensitive extends beyond the TSA defined regulated areas which include Secured, SIDA, Sterile, and AOA to include physicalspace that may contain critical infrastructure, or other assets which warrant protection.

• “Intentionallyor unwittingly”includes individuals with specific intent to use their access to cause harm, aswell asthose who utilize their accessfor an activitytheydid not realize couldprovide anopportunity for another individual tocause such harm.

• “Facilitate criminal activity…or other illicit actions”does not include pettycrime such as theftorpilferage butrathercriminal orillicitactivity thatwould align with TSA’s mission of protecting the nation’s transportationsystem toensure freedom of movement for people and commerce.

• Illicit actions may include criminaloffenses, regulatory infractions, administrative rule or policy violations, or other unauthorizedactions. Illicitis a term which is integral to the definitionof insider threat because it is adaptable toa variety of insider schemes whichmay fall shortofthe elements ofcriminality orterrorism. Illicitactions may include conducting surveillance, gathering knowledge/intelligence to supportcriminal orterroristactivity, circumventing security, or violating the Known Crew Member Program. The term illicit isfrequently referenced in policies and regulations including Title Code 21 of Federal

2 |P a g e

Page 6: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

• Regulations Part 1301, Section1301.92 Illicit activities by employees whichreferences a positionby DEAregarding employees, andBank Secrecy Act (31 USC5311-5330).

• A nexus withnational security is establishedthrough the known grave consequences ofcatastrophicattackson or through the aviation sector.

Definition

The following is offered as the definition of insider threat from an industry perspective, and is predicatedon applicable points notedinthe preamble above:

The term insider threat refers toindividuals withprivilegedaccess tosensitive areas and/or information, who intentionally or unwittingly misuse or allow others to misuse this access to exploit vulnerabilities in an effort to compromise security, facilitate criminal activity, terrorism, orotherillicitactions which inflictharm to people, an organization, the airtransportation system ornational security.

3 |P a g e

Page 7: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

COMPARATIVE ANALYSIS OF LEADING DOMESTICCOMPANIES’ INSIDERTHREAT INITIATIVES

In the course of our research, it became clear that there are common fundamentalelements to robustinsiderthreatprograms across domestic companies and aviation organizations. Previous work by Deloitte, the Intelligence and National Security Alliance (INSA) and the NationalInsider Threat Task Force, to specifically mention only a few, outlines the key considerations and fundamental elements to include as partofenterprise-wide insider threat programs.

Key considerations include: • Define what insider threat means to your company or facility and identify the critical assets

thatyourmitigation measures are aimed atprotecting. Tailorthe developmentofthe program toaddress these specific needs, threat types, andyour organization’s uniqueculture. One size does not fit all.

• Leverage a broad set of internal and external stakeholders. Deloitte recommends that organizations establishcross-disciplinary insider threat working groups that canserve as change agentsand ensure the proper level of buy-in across departments and stakeholders (e.g., legal, physical security, policy, IT security, human resources, ethics, etc.). Support and involvement of senior leadership is key.

• Awareness of observable behaviors that canserve as potential risk indicatorsfor insider threat. According to the FBI’s InsiderThreatProgram, detection ofinsiderthreatshould use behavioral-basedtechniques. Inaddition, case studies analyzedby Carnegie MellonUniversity’s Computer Emergency Response Team (CERT) program have shownthat insider threats are rarely impulsive acts.

• Robust reporting structures for all stakeholders toreport suspicious activity. • Review personnel management practices andinclude regular audits toverify trust and

related privileges granted to certain populations. • Customizedawareness andsecurity training for all stakeholders throughout the company

and organization. • Formal and established insider threat responseprotocols and procedures. • Constant reevaluationtomaintainandadjust insider threat programs to industry trends,

keyriskindicators, and emergingand evolving threats.

The team analyzed the insider threat programs in place at various domestic companies and aviation organizations, including a major defense company, a U.S. air carrier and U.S. airports of all sizes. We approached each company with the following questions:

• How do you define insider threat in relation to your insider threat programs? What is the main focus? What are you trying to deter?

• How do you measure effectiveness of your programs?

• Pleasedescribethesizeand scopeof your company and sizeand scopeof your insider threatprogram? Whatare the key elements ofyour program?

4 |P a g e

Page 8: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

• Does the program incorporate a focus on external stakeholders such as third parties toinclude supply chain providers?

• What is the company’s leadership support and involvement?

• What internal organizations (e.g., legal, HR, IT, security, law enforcement) are most involved in the program?

• What is the visibility and messaging put out to the company on the insider program?

• Pleasedescribeyour insider threat training – if any – to youremployees. Is training providedtoany other external stakeholders?

Lockheed Martin Members of the working group held a conference call with Mr. DouglasD. Thomas, Director, Counterintelligence Operations andInvestigations andMs. Kimberly O’Grady, Intelligence Analyst at Lockheed Martin. Lockheed Martin is a global securityand aerospace companythat employs approximately 100,000peopleworldwideand isprincipally engaged in the research, design, development, manufacture, integrationandsustainment of advancedtechnology systems, products and services.

The following was provided by Lockheed Martin as an explanation of its definition of Insider Threat,found atAppendix 1:

In November 2015, the Insider Threat Subcommittee, under the auspices of the Intelligence and National Security Alliance (INSA), and the Security Policy Reform Council (SPRC), undertook an initiative to review and refine the definitionof Insider Threat witha goal of achieving broadconsensusamong the diverse base of constituentswithin INSA. The Subcommittee, comprised of representatives from the US Governmentand Industry noted three issues to be addressed:

1. There are several definitions in existencetoday promulgated by government, industry and professional associations.

2. Many of the definitions are not inclusive enough, failing to account for one or more aspects of threat posedby an insider.

3. Several industries arestruggling withthe threats posedby insiders andmany articulatedthatthe various definitions created barriers to efficientimplementation ofinsiderthreatprograms.

Through group discussion several proposals were made and subjected to critical peer review. TheSubcommitteesettled on thelanguagethat was briefed to theSPRC on December 4, 2015, who embraced thenew definition. It was also briefed to theDirector of DefenseSecurity Serviceand the Directorofthe National Counterintelligence and Security Center, who both endorsed the inclusive nature of the definition and including language specific to instances of workplace violence.An explanationof the definition:

• The concise, yet inclusive nature of the definition was meant to relate to all industries andthe US Government. Several definitions we reviewed are easily interpreted to only focus on

5 |P a g e

Page 9: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

the US Government or the US Government and the Defense Industrial Base, to the exclusion of other industries suchas Energy, Financial, Oil andGas, Pharmaceutical, etc.

• The "threat" is a person as an "insider" is a human being. • The reference to "authorized access" simply means theperson has successfully gone

through that agency's or that company's vetting process prior to a final hiring decision. • "Access"refersto that person being granted the ability to become part of an organization,

givingthem access tofacilities, other employees, information, networks, andother resources.

• "Wittingly or unwittingly"recognizesthat the threat could have be done by a person purposefully, accidentally or through neglect.

• "Actsin contravention of law or policy", thisrequires that either a law or statedpolicy or practice was violated.

• "Harm through the lossor degradation"are really determined by that company oragency. • The inclusion of language regarding "workplace violence" had everything to do with how

"insider"was defined- aperson who was granted access to peopleand facilities based on some form of vetting that resulted in a hiring decision.

Lockheed Martin uses a tool developed internallyknown as their riskanalysis mitigation system to create behavioral and digital benchmarks for eachof their over 100,000 employees.

In terms of measuring effectiveness of the program, Lockheed Martin referenced the challenge that airport operators, air carriers and TSA often facewhen asked to demonstratetheeffectiveness ofvarious securitymeasures – it is impossible to prove a negative.Despite this challenge, Lockheed Martin reports a number of proactive metrics to its Board of Directors on an annual basis, including:

• Number of training and awareness sessions, • Numbers of investigations, • Number of files stopped from leaving the company, • Activity reports from workplace violence andsuicide preventionthreat management teams,

and, • Investigative leads generated through the risk analysis mitigation system tool.

The fact that Lockheed Martin briefs its Board of Directors annually on insider threat mitigation is rare fora company ofthis size butdemonstrates the importance ofinsiderthreatmitigation as an issue that is integralto the company’s values.Prior to briefing the Boardof Directors, the Counterintelligence Operations andInvestigations team brief the CEO, COO andExecutive Leadership Team throughout the year. There is a robust governance structure for the insider threat steering committee which includes CI, legal, human resources, corporateIT security, and ethics. The steering committee is responsible for the Concept of Operations that governs how the insider threatmission is executed.

6 |P a g e

Page 10: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Senior leadership is also part of thecommunications strategy toemployees toexplainwhy the program is important, whois involvedandthat there are watchers towatchthe watchers. The program has partneredwiththe LockheedMartinethics hotline – an already popular and trusted tool within the organization. They also pair insider threat trainingwith popular ethics trainingmaterials and courses.

Lockheed Martin could not overstate the importance of communications and trainingand awareness. In its communications, Lockheed Martin uses company-specific case studiesto highlight thatthreats from insiders can (and do)happen attheircompany and thatLockheed Martin employees arepotential targets for nefarious actors lookingto infiltratethecompany. Thecompanyalso tailorsitsmessage and training to employees based on job roles. It uses different messaging media to appeal to different generations of employees – posters, e-mails, internal social media networks. Lockheed Martin also tailors the message to what employees may care most about – national security, their own financial security or their own physical security (workplaceviolence).

From across theairport operator community, theASAC team surveyed afew domestic airports of varyingsizes, and leveraged its own organicexperience in airport operations. Findings were consistent with established and emerging standardsto mitigate the Insider Threat, asfound in security policy and recommendations. Recognizing that each airport must tailor itsown security programs, recognizedpractices include:

• Employee training

• Employee awareness (See Something/Say Something) and recognition programs • Recurrent vetting

• Badge audits – periodic andrandom

• Reductionof direct access points toanoperational minimum

• Random screening throughout security restrictedareas, and at other sensitiveareas on and off the airport

• Two-factorbadge authentication

• Use of biometrics in identity verification and access control • Zoning security badges, to further limit employeeaccess within restricted areas

The team noted that there is a listofeffective measures compiled from airportvulnerability assessments availableto airport operators. Thelist is posted on theHomeland Security Information Network, and includes a number of measures that mitigate the Insider Threat.

7 |P a g e

Page 11: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

RECOGNIZED PRACTICES THAT ARE COMMON AMONG MATURE INSIDERTHREAT PROGRAMS

Senior leadership support and involvement to focus on insider threat as ahigh risk across theenterprise.

Robust andcontinuous backgroundcheck evaluations aimed at determiningsuitability and trustworthiness.

Create a culture of security awareness, including training andrewardprograms.

Advancedsuspicious activity reporting programs basedon continuous educationandmultiple reporting channels.

Restricting access to critical assets based on operational need.

Behavior-basedemployee monitoring, including ID andaccess control monitoring.

Investigative expertise to investigate situations of potentialconcern.

Engagement and partnership with law enforcement across multiple agencies toshare information, increase available intelligence, and strengthen investigations.

Cross disciplinary working groups or consortia tomeet regularly toshare intelligence, review updatedsecurity policy andprocedure changes, andanyrecent incidents whether international, national, regional or local.

Include insider threat related information in initial, on-goingand recurrent training, stressingroles and responsibilities of all employees in mitigatinginsider threat.

Knowledgetesting to reinforce training and security awareness and coverttesting and auditing ofsecurity and required procedures.

8 |P a g e

Page 12: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, .... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

INSIDER THREAT MITIGATION PROGRAMS AT INTERNATIONAL AIRPORTS

In conducting an analysis of internationalinsider threatmitigation programs, the working group solicited specific information from various airports around theworld. Given thesensitivityof the measures, relatively few airports responded, otherthan to provide very general information.

With limited details about insider threat mitigation programs at international airports and the shorttime frame forthe initial report, there is an opportunity to conductfurtheranalysis and in-countryinformation exchangesat a later date.

However, most international airports adhere closely to the International Civil Aviation Organization (ICAO) security standards for Safeguarding International Civil Aviation Against Acts of Unlawful Interference.

In order to provide a means for comparative analysis, the working group attempted to assess mitigation measures in placeat international airports in thesamecategories as identified by the ASAC Working Group on AirportAccess Control:

• Security Screening and Inspection

• Vetting of Employees and Security Threat Assessment • InternalControls andAuditing of Airport-Issued Credentials • Risk-BasedSecurity for Higher Risk Populations and Intelligence

• Security Awareness and Vigilance

SecurityScreening and Inspection

Althoughairports inAustralia, Canada, JapanandNew Zealandutilize physical screening as a major element of their insider threat mitigation programs, it is not “full” screeningof aviation workers, nor is it used in isolation.2 Instead, it is conducted on a random and continuous basis in conjunction with other securitymeasures.

In accordance with a government mandate, airports in Japan implemented fullphysicalscreening of aviation workers. Asa result, significant congestion occurred at variousaccesscontrol points, ofteninterfering withairport operations andnegatively impacting the flow of aviationworkers. After a year, the government of Japan developed and ultimately transitioned to “multi-layered airport securitymeasures,” to enhance securityand facilitate airport operations.

Through the multi-layered approach – thateffectively involves the establishmentofsecurity perimeters, withaircraft being the last perimeter – airports in Japan placed moreemphasis on enhanced access control points and focused therandom physical screeningof aviation workers on

Given the aviation worker screening exemptions that exists for first responders, law enforcement, security personnel and others, the term “full” is used in lieu of 100 percent.

9 |P a g e

Page 13: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

the identification of explosive materials.Security guards were stationed around aircraft to conduct observations inorder toidentify anddetect unlawful interference. Aviationworkers withaccess toaircraft may besubject to screeningfor “restricted carry-onitems.”

Airports inEurope rely primarily onfull physical screening of aviationworkers tomitigate the InsiderThreat.

In Australia last year, the government announced its intention to enhance security at airports through theintroduction of random aviation worker screening, tighter access controls and security awarenesstraining. The Australian government directed a phased implementation of the enhanced security measures, and specifically designed them in amanner that provides “flexibility forairports toensure they continue tofunctionefficiently andeffectively.” Aviationworkers at large airports in Australia along with their vehicles and accessible property are randomly selected forexplosive trace detection testing and/orotherscreening methodologies whenentering or working in security restricted areas.

In accordance with Transport Canada regulations, the Canadian aviation security system is basedon anintegrated, multi-layered approach involving security partnerships, intelligence sharing, risk assessments, policing, physical security, regulations, training and the use ofphysical processes, procedures andtechnology tomitigate risk.

Similar to therecommendation of theASAC Working Group on Airport Access Control, which called for the development of a model togive all employees the expectationthat they are subject to security screening/inspection at any time while working at an airport, aviation workersat Canadianairports must present themselves for screening prior toentering security restricted areas.The CanadianAir Transport Security Authority (CATSA) randomly subjects a percentage of aviationworkers to physical screening procedures.

Rather thanscreening aviationworkers for all prohibiteditems, many international airports haverevised their screeningmeasures to primarily focus on explosivematerials.

Reportedly, a model similar toTSA’s ATLAS model is being developedandrolledout at airports in Switzerland. Theteam was not ableto fully explorethis Swiss model, but ASACwill assess that model through theInsider Threat Subcommittee.

BackgroundChecks andVettingof Employees andThreat Assessments

In Australia, only aviation workers who have been subjected to and successfully passed a backgroundcheck andanAustralian Security Intelligence Organization security assessment are able to obtain an Aviation Security Identification Card (ASIC). The issuance ofan ASIC may be refused ifthe background checks reveal certain criminal offenses, orrevoked ifcriminal activityis subsequently discovered. However, airport operatorsdetermine and control the level of security restricted area access thatis provided to ASIC holders.

10 |P a g e

Page 14: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Notably, two or more aviation-security-relevant offences, withno imprisonment, one of which was received within 12 months of the criminal history check, is sufficient grounds for denial of anASIC.

In Canada, aviation workers whose duties necessitate access to security restricted areas at an airport must obtain transportation security clearance. Transport Canada verifies the suitability of each Transportation Security Clearanceapplicant with Citizenship and Immigration Canada, Royal CanadianMountedPolice andCanadianSecurity Intelligence Service. If Transport Canada obtains credible information indicating that an applicant or an existing passholder posesa transportation security risk, the department refuses, suspendsor revokesthe clearance of the individual in question.

The holders of a transportation security clearance are perpetually vetted againstcriminal records to ensure there is no new derogatory information thatwould necessitate revocation ofthe clearance.

Upon successful completion of the transportation security clearance, the aviation worker may be issued a Restricted Area Identity Card (RAIC). The RAIC system, created by CATSA in partnershipwithTransport Canada andairport authorities, uses iris andfingerprint biometrics tolimit access to security restricted areas of airports. The final authority responsible for granting access to security restricted areas of an airport is theairport operator.

It should be noted that many internationalairports lack the ability to perpetually vet aviation workers against both criminal andterrorism databases as is standardpractice inthe UnitedStates.

InternalControls and Auditing of Airport-Issued Credentials

In accordance with European Commission regulation, to prevent the misuse of airport identification cards, a system shallbe inplace toreasonably ensure that attempteduse of cards thathave been lost, stolen ornotreturned is detected.

Securityfor Higher RiskEmployeePopulations and theUseof Intelligence

In Canada, Canadian Security Intelligence Service (CSIS) has district offices at some of the largest airports across the country.CSIS supports aviation security, and liaises with other departments andagencies witha presence at airports.

SecurityAwareness, Training and Vigilance

In Australia, security awareness training is required for aviation workers who regularly work in security restricted areas.The training is focused on enhancing the security culture and encouragingreportingof suspicious activity.

11 |P a g e

Page 15: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

As stipulated in the Canadian Aviation Security Regulations, airports in Canada have established and implemented security awareness trainingprograms that promotea cultureof security vigilance and awarenessamong aviation workers. In order to obtain or renew their RAIC, aviation workers must takethetrainingwhich may bedelivered viaclassroom, video or computer-basedformats.

In addition to a nationalCanadian Airport Security Awareness Program developed in coordination with the eight largest airportsin Canada, someincludeairport-specificmodulesto impart additionalinformation about their airport.

Of note, several high-levelinvestigations that resulted in the arrest of aviation workers at airports in theUnited States can beattributed to security awareness trainingprograms, such as theDHS "If You See Something, Say Something®" campaign. As emphasized during thetraining, vigilant aviation workers reported suspicious activity to theairport operator.

12 |P a g e

Page 16: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Appendix A: Insider Threat Definitions & Policy Scopes (As of May 2018)

National Insider Threat Task Force (NITTF) • Executive Order 13587(October 2011)

“ensure the responsible sharingand safeguardingof classified national security information”

• National Insider Threat Policy & Minimum Standards (November 2012) “Insider Threat means the threat that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to the security of the United States. This threat can include damage to the United States through espionage, terrorism, unauthorized disclosureof national security information, or through the loss ordegradation ofdepartmental resources orcapabilities.”

Department of Defense • National Defense Authorization Act (NDAA) For FY 17; Section 951 (2017)

“(3) The term “insiderthreat” means, with respectto the Department, a threatpresented by the personwho– (A)has, oronce had, authorized access to information, a facility, a network, a person, or a resource of the Department and(B) witting or unwittingly, commits – (i)and actin contravention oflaw orpolicy thatresulted in, ormightresultin, harm through the loss ordegradation ofgovernmentorcompany information, resources, orcapabilities; or (ii) a destructive act, which mayinclude physical harm toanother in theworkplace.”

• DoDInstruction 5205.16 The DoDInsider Threat Program (Change 2 – August 2017) “The threat insiders maypose to DoDand U.S. Government installations, facilities,personnel, missions, or resources. This threat caninclude damage tothe UnitedStates through espionage, terrorism, unauthorized disclose ofnational security information, orthrough the loss ordegradation ofdepartmental resource or capabilities.”

Department of Homeland Security • DHS Action Memorandum – Expandingthe Scope of the DHS Insider Threat Program

(December 2016) “The threat that an insider will use his or her authorized access, wittinglyor unwittingly, to d harm tothe Department’s mission, resources, personnel,facilities,information,equipment, networks, or systems. Insiders would includeany person who has or who had authorized access to any DHSfacilities, information, equipment, networks, or systems.”

DSS & CLEAREDINDUSTRY • NISPOM Conforming Change 2 (May 2016)

13 |P a g e

Page 17: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

“Insider Threat. The likelihood, risk, or potential that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to thenational security of theUnited States. Insider threats may include harm to contractororprogram information, to the extentthatthe information impacts the contractor or agency’sobligationsto protect classified national security information.

CarnegieMellon University Computer Emergency ResponseTeam (CMU CERT) • CMU CERT – Insider Threat Blog(March 2017)

“Insider Threat - the potential foran individual who has orhad authorized access to an organization's assets touse their access, either maliciously or unintentionally, toact ina way that could negativelyaffect the organization.”

Intelligence and NationalSecurity Alliance (INSA) • The threat presented by a person who has, or once had, authorized access to information,

facilities, networks, people, orresources; and who wittingly, orunwittingly, commits acts in contravention of law or policy that resulted in, or might result in, harm through theloss or degradationof government or company information, resources, or capabilities; or destructive acts, toinclude physical harm toothers inthe workplace.

• INSA Website (September 2016) “insider threats include the theft, loss, or leakof classified, sensitive, or proprietaryinformation;the deliberate infliction of damage to an organization’s facilities, operations, or networks; or violence or harassment perpetratedby a trusted insideragainstotheremployees of theorganization, whether at theworkplace, at another location, or online;”

TSA • TSA Management Directive No. 2800.17Insider Threat Program (July 2013)

“Insider Threat: Oneor moreindividuals with access and/orinsiderknowledge thatallows them to exploitvulnerabilities ofthe Nation’s transportation systems with intentto cause harm. This includes direct risks associatedwithTSA’s security programs andoperations, as well as the indirect risksthat may compromise our critical infrastructure. For purposesof the TSA Insider Threat Program, insiders are, or present themselves tobe, current or former transportation sectoremployees, contractors, orpartners who have orhave had authorized access to transportation sectorfacilities, operations, systems, and information.”

Note: TSA’s definition is derived, in part, from a President's National Infrastructure Advisory Council (NIAC) report datedApril 2008. The NIACdevelopeda working definitionforthe insider threat to criticalinfrastructures.The NIAC applied and tested this definition throughoutthe Study, and the definition helped shape policy recommendations foraddressingtheinsider threat. Thefollowingis theoutcomeof theStudy’s development andtesting process fora definition ofinsiderthreatto critical infrastructures:

14 |P a g e

Page 18: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

The insider threat tocritical infrastructure is one or more individuals withthe access and/or inside knowledge of a company, organization, or enterprise that wouldallow them toexploit the vulnerabilities ofthatentity’s security, systems, services, products, orfacilities with the intent to cause harm.

In deliberations on the definition of the insider threat, the NIAC carefully considered the importance of access – access to thesystems, facilities, or information wherean infrastructure’s vulnerabilities lie.Inclusion of allpeople with access expands the group of potential insiders beyondcompany employees, toinclude unescortedvendors,consultants,and contractors with access to an infrastructure’s facility or IT system.

U.K. Centrefor theProtection of National Infrastructure (CPNI) • CPNI INSIDERDATACOLLECTION STUDY (April 2013)

“an insider is defined as a person who exploits, or has the intention to exploit, their legitimate access to an organisation’s assets for unauthorised purposes.”

Analytic Exchange Program (AEP) (Public-PrivatePartnership sponsored by DHS and ODNI) • AEP Aviation Insider Threat Team Report (2017)

Pageseven of this report contains several public-private definitionsthe study team collected during their research to include: o US Airline: According to a US Airline, the insider threat is a current or former

employee, contractor, vendor, or other business partner, who has or had authorized access to an organization's information, abilities, products, or supply chain. This knowledge or access is then misused to negativelyaffect the organization or to do harm tothe public.

o PrivateSector Company: According to aprivatesector company, insiders arepersons whohave the potential toharm anorganizationfor whichthey have inside knowledge or access. An insider threat can have a negative impact on anyaspect of an organization, includingemployeeand/or public safety, reputation, operations, finances, national security andmission continuity.

o TSA: TSA defines insider threat as an individual with the intent to cause harm and with access and/or insider knowledge that would allowthe individual to exploit vulnerabilities of the nation’s transportation systems. In the aviation domain, this potentially includes current or former TSAemployees andcontractors, airline employees, cleaningand cateringcrews, construction and maintenanceworkers, law enforcement, military and security forces, taxicab drivers or transportation specialists, or other airport personnel who have access and/or insider knowledge.

o FBI: “’Insiders,’ which arecorrupt employees who exploit their credentials, access, and knowledgeof security procedures.”

15 |P a g e

Page 19: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

National Institute of Standards and Technology (NIST) – Threedefinitions foundat https://csrc.nist.gov/Glossary/?term=4852

• CNSSI 4009-2015 (Adaptedfrom CNSSD No. 504) The threat that an insider will use her/his authorized access, wittingly or unwittingly, to do harm tothe security of the UnitedStates. This threat caninclude damage totheUnited States through espionage, terrorism, unauthorized disclosure, or through theloss or degradationof departmental resources or capabilities. (This definitionclosely aligns withthe definition underNITTF)

• NIST SP 800-53Rev. 4 (CNSSI 4009) An entity withauthorizedaccess (i.e., withinthe security domain) that has the potential toharm aninformation system or enterprise through destruction, disclosure, modification of data, and/or denial of service.

• NIST SP 800-53 Rev. 4 (Presidential Memorandum, National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs) The threat that an insider will use her/his authorized access, wittingly or unwittingly, to do harm tothe security of UnitedStates. This threat can includedamageto theUnited States through espionage, terrorism, unauthorized disclosure ofnational security information, orthrough the loss ordegradation ofdepartmental resources orcapabilities.

Lockheed Martin • The threat presented by aperson who has, or oncehad, authorized access to information,

facilities, networks, people, orresources; and who wittingly, orunwittingly, commits: acts in contravention of law or policythat resulted in, or might result in, harm through theloss or degradationof government or company information, resources, or capabilities; or destructive acts, toinclude physical harm toothers inthe workplace.

• Lockheed Martin shared the followingexplanation which provides an insightful frame of reference tounderstandthe context of their definition.

o The concise, yet inclusive nature of the definition was meant to relate to all industries and the US Government.Severaldefinitions we reviewed are easily interpreted to only focus on the US Government or the US Governmentand the Defense Industrial Base, to the exclusion of other industries such as Energy, Financial, Oil and Gas, Pharmaceutical, etc.

o The "threat" is a person, a human being as an "insider" o The reference to "authorized access" simply means the person has successfully gone

through thatagency's orthatcompany's vetting process priorto a final hiring decision

16 |P a g e

Page 20: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~, ... --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

o "Access"refersto that person being granted the ability to become part of an organization, giving them access tofacilities, other employees, information, networks, andother resources

o "Wittingly or unwittingly"recognizesthat the threat could have be done by a person purposefully, accidentally or through neglect

o "Actsin contravention of law or policy", thisrequiresthat either a law or statedpolicy or practice was violated

o "Harm through the lossor degradation"are really determined by that company or agency

o The inclusion of language regarding "workplace violence" had everything to with how "insider" was defined- apersonwhowas grantedaccess topeople andfacilities based on some form ofvetting thatresulted in a hiring decision

Note: This definition was included in the most recent National Defense Authorization Act andit has beenendorsedby the Director of National Intelligence (DNI) and Department of Defense (DOD).

Massport • A insider threat is anyone withprivilegedaccess tosensitive areas, informationand/or

assets that an organization values most, who misuses this access, either wittingly or unwittingly, to facilitate criminal activity, terrorist activity, or illicit actions which inflict harm to an organization ornational security.

Federal Aviation Administration • Any employee whouses their grantedprivileges or access toharm personnel, facilities,

networks, or information(wittingly or unwittingly) is anInsider Threat. The Unwitting Insider is defined as a trusted employee or contractor who, without malice, causes harm to the organization. (FAA)

Other Definitions (multiple sources) • Insider threat is a malicious threatto an organization thatcomes from people within the

organization: employees, former employees, contractors, vendors, etc. whohave inside information – knowledge, information, and access, regardingan organization's security practices, data andsystems that canbe exploitedfor malicious reasons ranging from criminalityand personal gain – e.g. economic espionage, theft, furtheranceof terrorism/ideology, and ultimately to inflict violence.

• A threat from people within the organizationsuchas current or former employee’s, contractors, vendorsetc. who have inside information, knowledge, and access, regarding an organization's security practices, data and systems that can be exploited for malicious

17 |P a g e

Page 21: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

reasons ranging from criminality and personal gain e.g. economic espionage, theft, furtherance ofterrorism/ideology, and ultimately to inflictviolence.

• Any risk posedby a current or formerly trustedindividual withaccess or privilegedknowledge; used to damage, deprive, diminish, injureor interrupt organizational stakeholders, assets, critical processes, information, systemsor brand reputation. Insider threats include any illegal, prohibited orunauthorized conduct(acts oromissions).

18 |P a g e

Page 22: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Appendix B: Members of ASAC Working Groupon Insider Threat at Airports

SteveAlterman President CargoAirline Association

Paul Arnold Director, Aviation Security United Parcel Service

Christopher Bidwell Vice President, Security Airports Council International – North America

AlanBlack Vice-President of Public Safety Dallas Fort Worth International Airport

Scott Broyles President and CEO National Safe Skies Alliance

Frank Capello Director of Security, Broward County Aviation Department Fort Lauderdale-Hollywood International Airport

ColleenChamberlain Vice President, Transportation Security Policy AmericanAssociationof Airport Executives

Michele Freadman Deputy Director, Aviation Security Operations Massachusetts Port Authority

Randy Harrison Vice President, Corporate Security Delta Air Lines

19 |P a g e

Page 23: ASAC Insider Threat Report July 2018€¦ · .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE Consideringthat TSA was created after September 11, 2001, to prevent similar terrorist

~:· .. --... i·~i : AVIATION SECURITY ADVISORY COMMITTEE

Jens Hennig Vice President, Operations General Aviation Manufacturers Association Stephen Holl Chief of Police (retired) Metropolitan Washington Airports Authority Police Department Airport Law Enforcement Agencies Network

Cedric Johnson Director, Office of Airport Security BWI ThurgoodMarshall Airport

Janulyn Lennon Director of Security Hartsfield-Jackson Atlanta International Airport

Craig Lowe Director of Security Operations Airlines forAmerica

John McGraw Director, Regulatory Affairs National Air Transportation Association

Jeanne Olivier, A.A.E Assistant Director, AviationSecurity Port Authority of New York and New Jersey

Gary Wade Vice President Security Atlas Airlines

Chris Witkowski Director Air Safety, Health and Security Associationof Flight Attendants

Transportation Security Administration (Adjunct Members) SergePotapov, TamikaMcCree, Dan McCann

20 |P a g e