An insider can be anyone working within a central government department or a commercial organisation that intentionally exploits or intends to exploit his/her legitimate access to an organisation’s assets for unauthorised purposes. Examples include theft (intellectual property [IP], company secrets, money, data), fraud, terrorism, reputation damage, blackmail, denial of service attacks, introduction of viruses, worms, Trojan horses, corruption or deletion of data, altering data, and password cracking (Cappelli, Moore, & Trzeciak, Reference Cappelli, Moore and Trzeciak2012; Nurse et al., Reference Nurse, Buckley, Legg, Goldsmith, Creese, Wright and Whitty2014). An insider is also often understood to be those whose actions cause harm to an organisation through accident (e.g., accidentally downloading malware onto an organisation’s equipment). There is a dearth of research on insiders, which is mostly because organisations often prefer to ignore the problem or, at least, do not publicly admit they have a problem so as to avoid reputational damage (Randazzo, Kenney, Kowalski, Cappelli, & Moore, Reference Randazzo, Kenney, Kowalski, Cappelli and Moore2005). Moreover, often when an insider is identified, organisations are more concerned with removing the threat (employee) than learning about the person who caused the attack and their reasons for causing harm to the organisation. The available research has mainly focussed on fraud (e.g., Gill, Reference Gill2007; Schuchter & Levi, Reference Schuchter and Levi2016) or the accidental insider (e.g., Magklaras & Furnell, Reference Magklaras and Furnell2001; Ophoff, Jensen, Sanderson-Smith, Porter, & Johnston, Reference Ophoff, Jensen, Sanderson-Smith, Porter and Johnston2014). The focus of this paper is on intentional insiders, in general, who act maliciously, either for his/her own purposes or on behalf of some other party.
At present, managers have difficulties predicting who might be an insider within their organisations and the conditions (external or internal) which might turn an employee into an insider. Gaining greater insights into the typology of an insider and their pathways to criminality is, therefore, crucial if we are to identify more effective methods to deter, detect, and prevent these types of attacks on organisations. This paper specifically examines, via the analysis of case studies on a range of insider attacks: (a) how to identify potential insiders and (b) pathways to these attacks. The findings are used to develop a conceptual model that could assist with human and automatic detection as well as prevention of insider attacks.
Background
The harm that insiders might cause an organisation is not a trivial matter. It has been argued that insiders continue to pose threats to organisations, often equal to or greater in volume to outside threats (CERT Program (Carnegie Mellon University) and Deloitte, 2011; Richardson, Reference Richardson2011; Kroll, 2015). Kroll, for example, reports that in 2015, of the companies they surveyed that experienced fraud where the perpetrator was known, 81% involved at least one insider (which they point out was a 72% increase from their previous survey). The report also notes that in spite of these figures, organisations’ concerns about insider issues are relatively low. Those organisations that do recognise the problem often take a more technical approach to detect and prevent, often neglecting the ‘human element’ (Legg et al., Reference Legg, Moffat, Nurse, Happa, Agrafiotis, Goldsmith and Creese2013). There has been some research outlining the typology of an ‘insider’; however, this research is considerably limited and as the earlier literature review highlights, it is difficult to predict or identify insiders from current empirical research. In addition, current literature provides few recommendations on how to change workplace conditions or vet employers to prevent insider attacks on their organisations.
Demographic indicators
According to the available research, insiders are more likely to be men between the ages of 20 and 45 years (Shaw & Stock, Reference Shaw and Stock2011; CIFAS, 2012; CPNI, 2013). Centre for the Protection of the National Infrastructure (CPNI, 2013) examined 120 insider cases and identified that males were more frequently insider attackers (82%) than females (18%), they tended to be between 31 and 45 years old (49%), usually full-time permanent staff (88%), with customer-facing (20%), financial (11%), and security staff (11%) posing the most prominent risk. Threat episodes ranged from <6 months (41%) to >5 years (11%) and 60% of insiders had worked for the company for <5 years. The types of roles insiders were employed in appeared evenly split between managerial (45%) and nonmanagerial positions (49%), with higher prevalence among university graduates (58%).
With respect to insiders who commit fraud, Credit Industry Fraud Avoidance System, in the UK, maintains an ‘internal fraud database’ and members of Credit Industry Fraud Avoidance System can report the details about insider attacks that involve fraud. They reported that the average age for an insider is 30 years, with the majority between the ages of 21 and 30 years. They believe that the proportion of men and women who commit fraud in organisations is a 60:40 split (which is about the same as the working population).
With respect to IP theft, Shaw and Stock (Reference Shaw and Stock2011), in a summary of the literature, found that male employees, with an average age of 37 years, who are employed in technical positions, commit the majority of IP theft. They also found that about 65% of employees who commit insider IP theft had already accepted a new job and that those who commit this crime typically steal using the authorisation privileges they had been given access to in the job. Although the above findings need to be treated with caution, they do suggest that the monitoring of potential insiders based on demographic data alone would be: (a) too resource intense and (b) yield too many false positives. The research also suggests that there might be some value in distinguishing between different types of attacks (e.g., fraud, IP theft, etc.) when outlining the anatomy of insider attacks.
Dispositional indicators
Dispositional indicators can provide useful data about insiders, which might be used in the monitoring and risk assessments of employees. Turner and Gelles (Reference Turner and Gelles2003) believe the following psychological indicators need to be considered when examining insider risk: self-centredness, arrogance, risk-taking, manipulative, coldness, narcissism, self-deception, and defensiveness. CPNI (2013) have also identified from a sample of 120 cases a number of personality characteristics, including immature, low self-esteem, amoral and unethical, superficial, prone to fantasising, restless and impulsive, lacks conscientiousness, manipulate, emotionally unstable, evidence of psychological or personality disorders. Some of these characteristics map onto well-established and recognised personality traits (e.g., those in OCEAN – openness, conscientiousness, extraversion, agreeableness, and neuroticism and the dark triad – narcissism, psychopathy, and Machiavellianism). Shaw and Stock (Reference Shaw and Stock2011) outline a number of personality traits that are typically exhibited by an insider, including antisocial traits, difficulties getting along with others, being above the rules, impulsivity, tendency to blame others, ambitious, and greedy. Their research, however, focussed on insider theft of IP and therefore cannot be generalised to all insider attacks.
Gaining a greater understanding of the psychological make-up of an insider might help organisations identify at-risk employees. To date, however, businesses and government organisations have conducted most of this research, and many of the categories employed are not traditional labels used by psychologists. As a further point, some of the personality characteristics that indicate a potential insider might also be traits sought out in an employee (e.g., ambition, Machiavellianism). Therefore, it might be counter-productive to spend resources monitoring employers based on their personality profile alone, as well as unethical (given that it might be discriminatory to label these as individuals as ‘at-risk’ employers) (Schultz, Reference Schultz2002). At present, we know little to inform organisations of the utility of monitoring at-risk employees based on their psychological profile.
Behavioural indicators
The manner in which a person behaves might also be an indicator of insider activity. Maloof and Stephens (Reference Maloof and Stephens2007) found that insiders carrying out IP theft can be detected by comparing an insider’s volume of printing and Internet use with the pattern of Internet use and printing expected for their organisational role. Emotional state, such as feeling stressed or depressed has also been identified as behavioural indicators of insiders (e.g., Turner & Gelles, Reference Turner and Gelles2003; Shaw & Stock, Reference Shaw and Stock2011). Interestingly, Taylor et al. (Reference Taylor, Dando, Ormerod, Ball, Jenkins, Sandham and Menacere2013) found that in hypothetical scenarios of insider attacks, those individuals who role-played insiders were more likely to alter their language to become more self-focussed and show greater negative effect compared with their noninsider coworkers. As with psychological characteristics, research on behavioural indicators suggests they might be useful in detecting insider threats. Further research could potentially yield interesting results. However, these same behavioural indicators might instead be the result of an incident in someone’s life (e.g., grieving over the death of a loved one, stressed about meeting deadlines, etc.), rather than the intention to cause harm to an organisation. This again raises the question of ethics and accuracy in detection on behaviours alone.
Motivations
Understanding employees’ goals and expectations might be useful for detecting and predicting insider threats. Numerous motivations for committing an insider attack have been noted in the literature, although it is the general consensus that disgruntlement is one of the main motivations for an insider attack (Band, Cappelli, Fischer, Moore, Shaw, & Trzeciak, Reference Band, Cappelli, Fischer, Moore, Shaw and Trzeciak2006; Moore, Cappelli, & Trzeciak, Reference Moore, Cappelli and Trzeciak2008; Moore, Cappelli, Caron, Shaw, Spooner, & Trzeciak, Reference Moore, Cappelli, Caron, Shaw, Spooner and Trzeciak2011; Shaw & Stock, Reference Shaw and Stock2011; Cappelli, Moore, & Trzeciak, Reference Cappelli, Moore and Trzeciak2012). Moore et al. (Reference Moore, Cappelli, Caron, Shaw, Spooner and Trzeciak2011) describe the ‘disgruntled employee’ as someone who is dissatisfied with their job due to a rejected request for a promotion, raise, or relocation. They also contend that a subset of disgruntled employees is the ‘entitled independent’. According to these researchers, an ‘entitled independent’ is an insider who previously actively contributed to the development of the IP of a product, and once they leave that organisation believe they are entitled to a share of this IP. Given this sense of entitlement, they are motivated to steal the product. Individual gain is another obvious motivation (Moore et al., Reference Moore, Cappelli, Caron, Shaw, Spooner and Trzeciak2011). This might be a financial gain (e.g., fraud) and/or nonmonetised personal gain, such as revenge. The alleviation of certain stressors has been identified as another motivation (CPNI, 2013; Shaw & Stock, Reference Shaw and Stock2011). Stressors might include financial problems, relationship difficulties, legal problems, loss of status, disagreement, and conflict with coworkers; however, not all people with the same circumstances or stressors commit insider attacks.
It is important that research further examines how common ‘disgruntlement’ is as a motivator or whether there are other motivations to commit insider attacks. If disgruntlement appears to be the main tipping point, then managers might make this the main focus of their attention in preventing insider attacks. However, if research identifies other motivations, then managers will need to cast their nets wider or else they will miss other important warning signs.
Opportunity/environment
Criminologists highlight the importance of considering ‘opportunity’ when developing predictive models of criminality. Cressey’s (Reference Cressey1953) ‘Fraud Triangle’ is an example of a theory that takes into account opportunity for individuals to commit fraud, including insider attacks. In this model, three factors are present in every instance of occupational fraud: motivation, rationalisation (the fraudster’s ability to justify the act), and opportunity (the situation that enables fraud to occur). According to the theory, the individual first has a financial problem, which is nonshareable, and they become motivated to commit fraud. Second, they perceive an opportunity to commit fraud and have the skills to do so. Third, individuals employ rationalisations to give themselves permission to commit fraud. Although this theory has been popular among criminologists, it does have its critiques. For example, Huber (Reference Huber2016) has criticised the simplicity of the model. Moreover, rationalisation is a defence mechanism employed well beyond fraudsters to justify ‘bad behaviour’ (see, e.g., Freud, 1936/Reference Freud1992, who first outlined this psychological concept).
Some researchers have acknowledged that ‘the immediate environment may not only afford potential opportunities but also help in provoking criminal behaviour’ in the workplace (Willison & Siponen, Reference Willison and Siponen2009: 133). Willison and Siponen provide a list of 25 techniques that could be used in situational prevention of insider attacks. Examples include controlling access to facilities (e.g., swipe cards for office access), denying benefits (e.g., not having a clear desk and computer screen could lead to reduced rewards), and setting rules (e.g., security policies). Of course, opportunity is not simply about access privileges that employees hold legitimately but can also include perceived opportunities to illegitimately gain access (e.g., tailgating, stealing passwords, and hacking into systems).
Research Objectives
This paper examined which psychological, behavioural, and social variables (in both the physical and cyber realms) are important when identifying potential insider attackers. Typologies of insider attackers were also examined to determine whether previous findings might be replicated and/or whether new typologies might be identified. In addition to identifying variables, potential pathways that might lead to an attack were investigated. In so doing, the work produced in this paper offers a conceptual model for organisations to consider when detecting, deterring, and preventing insider attacks.
Method
Materials
A case study methodology was used for this investigation. Cases were either about an individual insider or a group of individuals that included one or more insiders. The attack took place within the year before the interviews taking place. They involved semi-structured interviews where various people who knew (managers, fellow employees, HR personnel, heads of security and their teams, law enforcement officers dealing with the case) the insider was interviewed about the job role of the insider; their general behaviour in the workplace, before and after the attack; their observations regarding the person’s personality and behaviour; the person’s circumstances before and after the attack (both at organisation they conducted the attack as well as previous employment); information about the person outside of the workplace (e.g., socially, networks); their understanding of the person’s motivation for the attack; details about how the insider went about the attack; and how the attack was detected. Approximately 2–3 people were interviewed per case study. Although the basic structure of the interview was adhered to for each participant, because each case was unique, and the person interviewed had different insights about the person (especially because of their role in the workplace), participants did not receive identical interview schedules.
Procedure
The University Ethics Committee first approved the study. The researchers then approached approximately 80 organisations (typically the head of security or HRs) inviting them to participate in the study about insider threat. Of these initial approaches, 21 organisations agreed to participate in the study. Approaches were made either to the head of security or HRs who then proceeded to organise interviews with people familiar with the employee to be interviewed by the researchers involved in the project.
In line with grounded theory, the intention was to either find support for previous assumptions about insiders as well as to gain new insights into an under-researched field. Although the researcher was mindful of the previous literature, participants were asked open-ended questions in order to gain new insights and there were no hypotheses developed. Participants were not given a tick box list of attributes to consider regarding the insider and the attack but instead were asked to volunteer their own insights.
In total, 99 case studies were collected from organisations that were willing to participate. To ensure anonymity and due to nondisclosure agreements, organisations cannot be named here; however, the types of organisations included are financial sector (64 cases, from five organisations), retail sector (16 cases from two organisations), public sector (six cases from three organisations), telecommunications providers (four cases from two organisations), high school (two cases from two organisations), labourer business (two cases from two organisations), insurance provider (one case), courier business (one case), nursery (one case), warehouse (one case), and prison (one case). Interviews were conducted face-to-face and the duration of each interview for each case study typically ranged from 30 min to 2 hr. When clarification was needed a second interview was conducted.
Participants
Participants in this study included individuals working in the types of organisations described earlier. For ethical and legal reasons, we cannot disclose the names of these organisations. Participants included are managers, fellow employees, HR personnel, heads of security and their teams, and law enforcement officers dealing with the case.
Grounded theory analysis
Given the dearth of literature available on insiders and the lack of systematic research, grounded theory was deemed an appropriate methodology for this study (Glaser & Strauss, Reference Glaser and Strauss1967). Grounded theory allows researchers to keep an open mind to newly emerging theories from the data. It is an inductive, theory discovery methodology that allows the researcher to develop theory, while at the same time grounding the theory in data collected in empirical research.
Notably, there are different schools of thought regarding the implementation of grounded theory. In fact, sometime after their seminal work, Glaser and Strauss famously disagreed about how this method ought to be carried out. Strauss and Corbin’s (Reference Strauss and Corbin1988) understanding of grounded theory is implemented in this research. In this approach, data can be examined to develop new theories (inductive analysis) but previous theory and hypotheses need not be ignored (deductive analysis). In this type of analysis, there is initially open coding, followed by axial coding (a reduction and clustering of categories), a final development of selective coding, and finally the development of theory. These steps are highlighted in the results and interpretation section.
Results and Interpretation
Sample description
The types of attacks reported in our case studies are fraud (80%), reputational damage (7%), theft (7%), IP/data theft (6%), identity theft (3%), money laundering (2%), procurement fraud (2%), and working illegally (1%), where 10% of cases involved more than one type of insider attack. The much higher number of fraud cases might be because (a) these types of attacks are more frequent across organisations and/or (b) organisations are more likely to detect this threat and/or (c) organisations feel more comfortable reporting fraud compared with other types of threats (e.g., IP theft).
In most cases there was a person working in isolation (68%); however, 32% of the cases involved a group (some of which included outsiders). In 50% of the cases the insider received a custodial sentence, 13% received a community service order, and 15% received a suspended sentence; 80% of the insiders were dismissed and 3% resigned. Among the participants, 62% of the insiders were males and 38% were females, with ages ranging from 19 to 62 years (mean=31.39 years).
Analysis
Open coding was conducted in this first phase of the analysis, followed by axial coding, where a reduction and clustering of categories were carried out. All the data were independently coded by two coders and where discrepancies arose, we discussed the coding to arrive at an agreed category. There were only three incidents where we disagreed. The discrepancies in coding were on the personality characteristics. These were discussed, and an agreement was made as to how to code these three incidents. As a further note, interviewees were not asked to code for personality but rather to describe the personality of the insider. We opted for this method given that most interviewees were not trained psychologists. The coders, however, were trained psychologists – making it more appropriate for them to code the participants’ descriptions of the insiders’ personality.
Phase 1: Open coding
In the first round of coding (open coding), the following categories were identified: psychological, behavioural, and social characteristics of the insider; motivations of the insider; opportunities to commit the attack; and how the attack was discovered. Perhaps not surprisingly, these initial categories are similar to previous work (described in the introduction of this paper). The novelty of this research emerged in the new insights gained from an in-depth analysis of the themes and subthemes identified under each of these categories.
Phase 2: Axial coding
Axial coding was next conducted where themes under each of the main categories were reduced and clustered. The coding conducted in this phase can be found in Tables 1–4. Furthermore, Table 5 sets out the archetypal ‘insider fraudsters’ identified in this phase of the analysis. These are also discussed in detail in the table.
Table 1 Observed psychological and social characteristics (including traits, behaviours, and emotions)
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20211130171918272-0388:S1833367218000573:S1833367218000573_tab1.png?pub-status=live)
Table 2 Motivations for committing the crime
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20211130171918272-0388:S1833367218000573:S1833367218000573_tab2.png?pub-status=live)
Table 3 Opportunities for committing the crime
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20211130171918272-0388:S1833367218000573:S1833367218000573_tab3.png?pub-status=live)
Table 4 Discovery
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20211130171918272-0388:S1833367218000573:S1833367218000573_tab4.png?pub-status=live)
Table 5 Archetypal insider fraudsters
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20211130171918272-0388:S1833367218000573:S1833367218000573_tab5.png?pub-status=live)
Psychological, behavioural, and social characteristics
Psychological, behavioural, and social characteristics were broken down into the following subcategories: traits (e.g., extraversion, narcissism); life circumstances and actions before employment (e.g., criminal record, working illegally in the country); behaviours displayed at work before the attack (e.g., work affiliation, misconduct); emotions displayed during and leading up to the attack (e.g., stress, anxiety, depression); behaviours and life circumstances during the attack (e.g., showing off newly acquired wealth; unusual hours; increased time logged into secure areas) (see Table 1). As stated earlier, most participants did not have psychological training, and so naming specific personality traits would have proved difficult for them. Instead, the researchers categorised personality traits based on participants’ descriptions of the insiders. They did so by drawing from established psychological questionnaires.
Some of the psychological, behavioural, and social characteristics of the insiders identified in this study were similar to previous work. Importantly, novel findings were also identified, especially with respect to the behavioural and social characteristics. Many of these characteristics have not been identified in previous work, such as an increased amount of time logged into secure areas and a change in attitude towards the workplace. Furthermore, archetypal insider fraudsters were identified, which are set out later in this paper (see Table 5). This adds to the literature on types of insiders, which has mostly focussed on the disgruntled employee (as highlighted in the introduction). Some examples of descriptions of psychological, behavioural, and social characteristics are provided in the summarised case studies, which are as follows:
-
∙ This individual perpetrated her fraud over the course of 6 years and accumulated over £278,000 before she was caught. She targeted an aged, vulnerable customer who was blind and suffering from advanced Parkinson’s disease. In a long-term strategy, she manipulated the customer into signing forged documents transferring power of attorney to her, as well as writing a will, which would have transferred his entire estate to her husband and son when the customer died. Colleagues described her as domineering and assertive, with a clear aim of obtaining as much power within the organisation as possible. Although she was not senior to her peers, it appears that she manipulated them into subservience and saw herself as the ‘ersatz store manager’. According to HR, this was not an unreal expectation given that she was a capable employee. When caught, the insider had available funds far exceeding the amount stolen and had been using the funds to send her son to private school as well as to purchase a lavish wedding for her daughter. Although the insider had narcissistic tendencies, more significant was her ability to cynically plan, deceive, coldly manipulate others in pursuit of power and financial goals (indicative of a Machiavellian and psychopathic subclinical personality). (53-year-old female. Personal Banker at a bank – Insider Fraud: £278,000.)
-
∙ Over the course of seven months, this individual defrauded two vulnerable customers of £40,000, primarily by obtaining signed cheques. The crime was motivated by greed and financial problems, with funds being spent on a holiday and a laptop computer. Colleagues described the individual as a ‘troublesome employee’ showing a pattern of emotional instability/neuroticism and stress-like symptoms, which might have suggested a potential threat to the organisation. After the individual was sentenced to a 16-month custodial term, she took a ‘craft knife’ that she had hidden about her person and started slashing at her arms and legs in an apparent effort to commit suicide. (26-year-old female. Cashier at a bank – Insider Fraud: £40,000.)
-
∙ This individual claimed £20,000 worth of fraudulent travel and entertainment expenses over the course of two and a half years. Reports from the investigation identified him as a ‘disgruntled employee’ as he believed that he was entitled to a promotion due to his recent performance but ultimately did not receive the promotion. It was thought that he had started to live according to the salary he thought he deserved and was incurring extensive credit card debt (£60,000). (47-year-old male. Head of Key Accounts at a large Insurance Provider. Insider Fraud: £20,000.)
-
∙ It was reported that this individual had Asperger’s syndrome. He was very hard working and showed a strong affiliation to the organisation for which he worked. He deliberately breached the security of the building (understanding the seriousness of this breach) in which he worked by gaining repeated access to online and physical spaces to which he was not authorised. He used the information he gained from security breaches, including plans of the building, to replicate the building in Second Life. The motivation for this breach appeared to be an opportunity to show off his skills, although it is possible that his motivations were more sinister. He understood that he would most likely be dismissed for breaching security but still decided to take this risk. (Mid-50s male. Security guard. Security breach – risking the reputation and security of the organisation.)
Motivations
Participants were asked what they believed motivated the criminal in each case to engage in the attack. More than one motivation could be noted in many cases and in 8% of the cases, the motive was unknown. Greed was by far the most common motivation, followed by supporting an addiction, money needed for a personal hardship and coercion were the most common motives (see Table 2). Although personal hardships and coercion were coded under psychological, behavioural, and social characteristics, they were also included here as they could also be classified as motivations. Notably, although the literature on insiders focusses heavily on disgruntlement as a motivation, the research identified very few cases where disgruntlement was a reason for the attack. This is a key finding that moves the thinking about insiders in a new direction. The research in this paper demonstrates multiple insider motivations, thus highlighting that there are many pathways to criminality that managers need to consider. The work here shows that managers should not be too heavily focussed on the disgruntled employee, for if they do other insiders are likely to pass undetected. Some examples of descriptions of motivations are provided in the summarised case studies as follows:
-
∙ This individual was described by colleagues as ‘egotistical’ and highly. It was thought that he may have felt entitled to advancement and was already living beyond his means. The fraud was potentially part of a scam involving local businesses to defraud insurance companies in a ‘Cash for Crash’ scenario. The individual spent the proceeds of the crime on funding his lavish lifestyle, paying for his flashy car, socialising, and purchasing superficial goods. This insider never tried to hide any of his spending such as his expensive car. (26-year-old male. Cashier at a bank. Insider Fraud: £120,000.)
-
∙ The insider, who had recently separated from his partner, claimed to be coerced by two other insiders within the bank, who approached his house demanding money because his former partner owed them a substantial amount of money. When he refused, they beat him with a hammer and left him for dead. After recovering, the insider was again threatened and forced to take part in the theft operation and, fearing future assault, agreed. The two aggressors used their access to change customer information, which permitted the insider to pose as the customer and make cash withdrawals. This significant act of fraud (totalling £4,000,000) was only uncovered when the victim had difficulties in correctly answering security questions. (47-year-old male. Customer service staff in a bank. Insider Fraud: £4,000,000.)
Opportunities
The participants were asked about how the insider was able to commit the attack. Their responses were coded under opportunities (see Table 3). Almost half of the sample consisted of cases where the insider deliberately sought out a weakness in security at their organisation in order to carry out the attack. Notably, in approximately 20% of the cases, outside help was obtained to enable the attack. Examples of opportunities are presented below:
-
∙ The individual appeared to have identified himself as a financial expert to his family and taken over partial control of his niece’s charitable trust (his niece was a quadruple amputee). After doing so, he suggested that funds be sent overseas in order to optimise the return. When asked to return the funds, he was unable to do so, claiming that the money was tied up by offshore banks. In reality, he defrauded £315,000 from a charitable trust set up to provide his quadruple amputee niece with prostheses and equipment. In addition, he stole £65,000 from his grandmother. He covered his tracks with fake bank statements, and falsely claimed to have put the funds in an offshore account to gain higher interest but appeared unable to return funds. He took out a number of joint loans secured on the family home without the consent or knowledge of his wife, which caused his wife and daughter to be evicted and forced into bankruptcy after their divorce. (33-year-old male. Risk assessor at a bank. Insider Fraud: £230,000.)
-
∙ The two insiders targeted a wealthy retired customer’s account while the customer was on an overseas holiday. They transferred the money into an accomplice’s account, by using a blind cashier’s computer, turning off her speaking screen so she was unaware that they were using her computer to commit fraud. (21-year-old male. Counter staff at a bank. Insider Fraud: £96,000.)
-
∙ Prior to resigning from his role as a financial advisor with the bank, this individual emailed his entire customer portfolio to his personal email address and used this information to target victims in his later fraud. He defrauded four elderly and vulnerable customers (aged 84, 87, 94, 98 years respectively) over the course of a two-year period to the value of £120,000. He set up a false ‘investment club’ and recruited these former customers to invest in the fund. This individual failed to be clear that he no longer worked for the bank in his dealings with the victims. After he was arrested he appeared ‘devastated’ and cried during the initial interviews with police and corporate investigators, but gave the impression of being dismissive of the charges. Colleagues were surprised to learn that of his crime given they believed it to be ‘out of character’. (early 60s male. Financial advisor. Insider Fraud and IP theft: £120,000.)
Discovery
This study was also interested in learning about how the attack was discovered, including when the alarm bells were raised and what evidence was needed to detect the attacker (see Table 4). Notably, fewer cases were detected in ‘real time’ (28%) compared with searching for evidence after the attack (61%). Moreover, of concern were the number of discoveries outside of the organisation, made by customers/clients (28%) and other organisations (9%). Examples of discoveries are presented below:
-
∙ Over the course of 2 weeks, this individual used colleagues’ login credentials to transfer monies totally £820 into his own account in order to fund a gambling addiction (online roulette) and pay off debts. He identified elderly wealthy customers with accounts showing infrequent activity (possibly hoping that his fraudulent activities might have been unnoticed). The fraud was noticed by a fellow employee and reported to police. (28 year-old-male. Accounts processor at a call centre. Insider Fraud: £820.)
-
∙ Over the course of two years, the insider stole funds deposited in a night safe. The funds in question were usually deposited uncounted and tallied by the bank staff before being deposited into the company’s account. This individual obtained access to the night safe (which usually required two operators) and skimmed £70,000 from the deposits. The company secretary became suspicious about the value of deposits being made and began to count the deposits before putting them in the safe. After the discrepancies were noticed, an investigation was launched. (27 year-old-male. Customer advisor at a bank. Insider Fraud: £70,000.)
Archetypal insider fraudsters
The analysis next moved to identify archetypal cases of insider fraudster – only fraudsters were examined in this part of the analysis given they were the majority of insider cases identified, providing enough data to form clusters. The archetypes do not set out the full details of the insiders’ psychological dispositions and pathways to the attack (as is set out in the conceptual model in the next phase), but rather provide additional insights into identifying types of insiders. Archetypes identified included those also found in previous research (e.g., disgruntled employee); however, new archetypes were also revealed in this analysis. Some of these archetypes, although not previously named, resonate with previous research (e.g., ‘the addict’), while others, arguably, provide new and novel insights into insiders (e.g., ‘the show off’, ‘birds of a feather’, and ‘clever clogs’). Notably, there was overlap between ‘the show off’ and ‘pure greed’; however, it was felt there were important differences between these groups making it important to separate. Moreover, the ‘show off’ might be easier to detect compared with the ‘pure greed’ archetype. Although further research is needed to confirm these findings, they go some way into developing new theories and understandings about the types of insiders.
Conceptual Model
In the last phase of the analysis, the data were reduced again and clustered to develop a conceptual model. Figure 1 sets out a model for organisations to draw from in the prevention and detection of insider attacks. As detailed in the model, prevention steps in the form of vetting and closing down opportunities are outlined before the recruitment of employees. Further prevention steps should be considered when: (a) new opportunities to attack are elucidated, and (b) when indicators detect a potential problematic employee. Closer monitoring of the indicators highlighted in this research might also help detect an insider. However, it is argued here that ethics, social acceptability, and the law should guide all steps in prevention and detection – to ensure employees are not discriminated against. Moreover, rather than treat an employee as a ‘potential insider’, it would be prudent to set out transparent and effective practices to support problematic employees to ‘nudge’ them away from carrying out harm to an organisation.
![](https://static.cambridge.org/binary/version/id/urn:cambridge.org:id:binary:20211130171918272-0388:S1833367218000573:S1833367218000573_fig1.png?pub-status=live)
Figure 1 Prevention and detection of insider attacks
As a further note, the analysis revealed many pathways to committing an insider attack and suggests that by following a particular pathway to detect a crime might be challenging and resource intense. The model proposed here, therefore, sets out indicators (both physical and cyber) that might be important to observe and used by organisations to prevent and detect insider threats/attacks and best practices to close down opportunities.
Importantly, the model is in flux. New data and re-combinations of data can be feed into the model as new insights are gained – both in scholarly research and as the organisation itself examines its own data. Methods to collect evidence are highlighted in the model, with the important caveat that the ethics, social acceptability, and legality of collecting this data must be considered before any collection and analysis. The components of the model are described in more detail below.
Closing down opportunities: This is highlighted at the start of the model. Closing down opportunities includes a combination of prevention and detection. As this research highlights, closing down opportunities (e.g., improved security measures, transparent policies for support for workers, and reporting problematic behaviours) needs to be considered before the recruitment of employees and also needs to be regularly considered and improved in light of new information. As discussed earlier in this paper, the Fraud Triangle includes opportunity as an element to explain why the fraud takes place – arguably, without opportunity there would be no fraud. Although this research concurs, it provides detail to the opportunities that need to be closed down and highlights that this is important with all types of insider threats.
In this research, it was found that insiders sought out weaknesses in the security in order to carry out the attack and many abused their position of authority. Outsiders also helped the insider commit the crime. Prevention, therefore, might involve strengthening security and the development of workplace policy to close down on insider threat opportunities (e.g., not sharing passwords). However, as discussed earlier, prevention might also involve providing support for staff (e.g., disgruntled, those with addictions, personal hardships) – if staff feel supported they might be less inclined to seek out opportunities to create an attack.
In some cases, insiders were an inherent part of the workplace culture – where others were encouraged to enable another insider or sections within an organisation committing an attack (typically fraud) because they had noticed others engaging in such crimes. In other cases, the stress of not meeting targets was believed to lead to the attack. These examples suggest that in some cases the workplace culture needed to be improved to prevent insider attacks.
Finally, the monitoring of outside threats cannot be ignored when considering closing down opportunities for insider attacks. In 21% of the cases reported in this study, an outsider assisted the insider (sometimes instigating the attack and recruiting the insider by instructing them on how to undergo the attack). Therefore, an insider threat and prevention strategy should consider combining monitoring for external threats.
Prescreening characteristics are arguably important for any organisation. However, vetting processes need to be legal and nondiscriminatory. This research found that it would be unhelpful and discriminatory to vet according to personality characteristics. For example, while some psychological characteristics were highlighted as problematic, not all employees that exhibit these traits will go on to be insiders. Machiavellianism and narcissism might be useful traits in some types of roles, for example. Other characteristics that might be helpful to vet include criminal record, problematic work history, addictions, gang membership, working illegally, and forged documents. Ethical and nondiscriminatory practices also, however, need to be considered when prescreening for these variables. For example, a person with a criminal past may be reformed and possibly an asset to an organisation. It is noteworthy that for some cases in this research, characteristics that could have been vetted for were not noticed. For example, it is a concern that forged documents and employees who were working illegally were undetected.
Concerning behaviours in this model included those presented by the employees, including personality traits, weak work affiliation, addictions, gang membership, aggressive behaviours (towards staff and/or outside of work), misconduct at work, depression, anxiety, and stress. As with the prescreening characteristics, selective monitoring of some staff over others might be illegal and/or unethical. Moreover, this additional monitoring could potentially be a catalyst for an insider attack – if the employee experiences resentment for deferential treatment. These concerning behaviours and closing down opportunities are linked in both directions of the model. An employer, for example, might notice an employee who presents a problematic behaviour and provide them with support or closer monitoring to assist in prevention and detection. In turn, opportunities might be closed down to prevent some of these types of behaviours: for example, clear policies on aggressive behaviour might prevent or deter this behaviour in the workplace.
Change in behaviours/circumstances was perhaps the more interesting indicators revealed in the case studies. In hindsight, when asked to consider what the organisation knew or learnt subsequent to the attack, numerous indicators were noted that could become part of an organisations’ policy to monitor more closely or consider interventions to prevent impending harm to an organisation. The variables included addictions, personal hardship, coercion/blackmail, increased time logged into secure areas, showing off newly acquired wealth, change in attitude towards the workplace – from highly to lowly motivated, disgruntlement, working unusual hours, a star employee no longer meeting targets, absentee, downloading large volumes of data, depression, anxiety, and stress. Interestingly, this list included both cyber and physical behaviours. A change in behaviour/circumstances might be more important to monitor for those who do not necessarily join an organisation with characteristics that appear risky to an organisation. Again, an organisation should be mindful that selective monitoring of some staff over others might be illegal and/or unethical. Moreover, this additional monitoring could potentially be a catalyst for an insider attack – if the employee experiences resentment for deferential treatment.
Collecting evidence: In addition to considering the sorts of variables an organisation might wish to monitor, the model highlights the data needed to detect an insider as well as to improve prevention methods. The data includes new insights within the organisation as well as being informed by scholarly research. In the main, this research found that the discovery of an attack happened after the event – often informed by an outsider or a fellow employee. It would be unwise, therefore, to abandon such methods. Nonetheless, such discovery methods might be improved. It was surprising how few managers and fellow employees reported suspicious behaviour until after a complaint from outside was made – and perhaps methods such as regular interviews/conversations with employees might help highlight problems before an attack. Well-communicated policies on how to report suspicious behaviours might also improve detection, while also being sensitive to problems experienced by employees who whistle-blow, particularly in the UK (see, e.g., Park, Blenkinsopp, Kemal Oktem, & Omurgonulsen, Reference Park, Blenkinsopp, Kemal Oktem and Omurgonulsen2008). Effective monitoring of employees in real time would have picked up the attack earlier in most cases. Moreover, future work could include the combination of physical and cyber indicators when monitoring employees. Physical observations might be combined with digital anomalies. Moreover, recent research is improving on the detection of psychological variables via digital communication (e.g., De Choudhury & Counts, Reference De Choudhury and Counts2013; Hogenboom, Bal, Frasincar, Bal, de Jong, & Kaymak, Reference Hogenboom, Bal, Frasincar, Bal, de Jong and Kaymak2013) and such findings might be incorporated into detection tools for insider threat.
Ethics, social acceptability, and the law: Finally, the model asks users to reflect upon and ensure that policy and methods in prevention and detection of insider threat are ethical, socially acceptable (including acceptable practices for that particular workplace and culture), and legal. These are important to consider in every aspect of the model. As a further note, if methods are employed that cause upset and distrust amongst the workplace, there is the risk that insider attacks might increase rather than be reduced (Greitzer & Frincke, Reference Greitzer and Frincke2010).
Conclusions
The work conducted in this paper provides a detailed examination of a large sample of insider cases. Interviewing a range of people who knew the insiders provided important insights. Previous work has mostly focussed on fraud or IP theft and rarely together. This study, instead, examined a range of different types of insider cases, providing a much richer picture.
The work here provides a radical re-thinking of the insider problem. To date, research has offered little in respect to pathways to criminality and when they have the models have been fairly basic. In this research, the Fraud Triangle, which is a popular model in criminology, was found to be quite limiting as a predictor of criminality. Previous linear models developed to explain pathways to insider criminality (e.g., Shaw & Stock, Reference Shaw and Stock2011) were also shown to miss the numerous pathways and motivations for committing an insider attack. The conceptual model offered in this paper highlights that pathways are not necessarily linear, that there are multiple pathways, and that there is an ongoing need to focus on closing down opportunities and to seek out behavioural change indicators. The model also emphasizes the need to help employees when concerning behaviours are presented rather than simply monitoring employees as if they were an insider on the pathway to an attack.
As highlighted in the introduction, the ‘disgruntled employee’ is often viewed as the archetypal insider. This research, however, demonstrated that there are many other typologies that managers need to consider. The addict was the more common insider in this research and highlights the need to deal head-on with this problem rather than ignore the issue or move employees with addictions around in an organisation in the hope the issue will disappear. ‘Harder times’ was the next common archetype – highlighting that problems that are external to an organisation might be much more important to consider compared with disgruntlement. Disgruntlement was, in fact, much further down the list, and while more research is needed to replicate these findings, this research has highlighted that the disgruntled employee is one of many concerns rather than the main issue.
The Internet has added a further threat to organisations providing more opportunities for employees to exploit this medium to cause harm to an organisation – making research in this area all the more urgent. This research found that strategies to closing opportunities for employees to commit insider attacks must also include ensuring all staff adhering to policies regarding good cybersecurity practices (e.g., not sharing passwords, writing passwords down, hacking into systems). In turn, cyber indicators might be used to identify potential insiders (e.g., download volumes, logging in and out times, security breaches). The findings from this study can be used to guide behavioural and automatic insider detection methods and tools.
Admittedly, this study is limited in a number of ways. It is not a representative sample (indeed it is hard to know what a representative sample of an unknown population would look like), and the majority of cases focussed on fraud attacks (given that organisations often prefer to be more closed about other types of attacks, to protect their reputations). The participants interviewed for the study might not be accurate in their insights about the insiders’ personality or interpretation of emotions. Moreover, the criminals’ perspective in these case studies was not obtained – which would have increased the validity of our findings. Nonetheless, the work here does provide researchers with a rich conceptual model that can be tested and researched in greater depth in future studies.
Acknowledgements
This research was conducted in the context of a collaborative project on Corporate Insider Threat Detection, sponsored by the UK National Cyber Security Programme in conjunction with the Centre for the Protection of National Infrastructure, whose support is gratefully acknowledged. The project brought together three departments of the University of Oxford, the University of Warwick, and Cardiff University. I would also like to thank Gordon Wright who assisted in the coding of case studies and Prof Mike Levi for his feedback on an earlier version of the paper.