Focus on the Person, not Technology

“The foundation of a counter-insider threat program needs to start with recognizing there is a person at the other end,” says Keith Lowry, former Chief of Staff to the Deputy Under Secretary of Defense for Human Intelligence, Counterintelligence and Security at the Pentagon in this article on ZDNet: Fighting the person should be cybersecurity best practice When…

Management lessons from the espionage of Ana Montes

This excellent article was written by Anthony N. Bishop and published in CSO (Chief Security Officer) magazine in September 2016: The best IT security is not enough to protect against the determined insider The most important lesson American businesses can learn from the Montes case is that IT security measures will not be enough to prevent…

NOIR Featured in European Counterintelligence Journal

The following article by John Irvin appeared under the title NOIR: Neue Strategien zur Erkennung von Insiderspionen in Vol.10, Nr.1/2016 of the Journal for Intelligence, Propaganda and Security Studies [JIPSS], published by the Austrian Center for Intelligence, Propaganda and Security Studies [ACIPSS].[1]   ACIPSS was founded at the University of Graz, Austria, in 2004, “in order…

NOIR Benefit: Weakening of Spy - Handler Relationship

Predomination: Taking Advantage of an Advantage

Examining the critical Spy-Handler relationship and why a NOIR can alter it to our advantage and create the opportunity for predomination  By John Irvin “There are more spies in the United States today from foreign nation states than at any time in our history — including the Cold War,” stated former Rep. Mike Rogers (R-Mich.)…

Half a Solution is Not a Solution

The one constant is the human mind, the way we think, which is ultimately the source of all acts of espionage.  By John Irvin A friend drove up in the classic 1960s sports car he has just purchased at considerable expense to both his personal finances and his marital relationship.  It was a genuinely beautiful…

Is Insider Espionage Passé?

Despite the use of increasingly advanced technical means, the deception, duplicity, and betrayal of espionage are a human problem that requires a human solution.  By John Irvin, NOIR Team In all, around 3.6 million individuals were impacted by two breaches of Office of Personnel Management (OPM) electronic databases, one announced in June 2015 and the second…

The Causal Nexus of Insider Espionage, Part 2

By John Irvin NOIR Team The first part of this discussion [1] concluded with the fairly controversial statement that decades of counterintelligence (CI) focus on what have traditionally been considered the key motives for insider espionage, summarized in the acronym MICE (Money, Ideology, Compromise/Coercion, and Ego, further amended with the inclusion of disgruntlement/revenge, ingratiation, and thrills/self-importance) [2]…

The Causal Nexus of Insider Espionage, Part I

By John Irvin NOIR Team In True Psychology of the Insider Spy, Part One of NOIR: A White Paper, Dr. David Charney postulates that the core psychology of the insider spy is an intolerable sense of personal failure, as privately defined by that person.  It is this subjective experience that allows the would-be insider spy…