<?xml version="1.0"?>
<Module projectID="1378" moduleID="1756" filePath="disa/ia/cw/disa_ia_srldr_fy13/dev/M01_L01/data.xml" showTextDisplayMode="captionsAndHTML">
	<ModuleName>M01_L01</ModuleName>
	<AU>M01_L01</AU>
	<Title>Insider Threat</Title>
	<Subtitle>M01_L01</Subtitle>
	<LinkSet>links</LinkSet>
	<DefaultControlText name="Done" value="Submit"></DefaultControlText>
	<DefaultControlText name="NextFeedback" value="Next Feedback"></DefaultControlText>
	<DefaultControlText name="PreviousFeedback" value="Previous Feedback"></DefaultControlText>
	<DefaultControlText name="CloseFeedback" value="Close Feedback"></DefaultControlText>
	<DefaultControlText name="TryAgain" value="Try Again"></DefaultControlText>
	<DefaultControlText name="button_print" value="Print Certificate"></DefaultControlText>
	<NavBtns order="helpBtn,exitBtn,[PAGE],courseMapBtn,resourcesBtn,glossaryBtn,transcriptBtn,turnAudioDescriptionsOffBtn,turnAudioDescriptionsOnBtn,hideCCBtn,showCCBtn,rewindBtn,replayBtn,skipReverseBtn,skipForwardBtn,pauseBtn,resumeBtn,previousPgBtn,pageLocation,nextPgBtn," order_intro="">
		<NavBtn>
			<ControlType>ReadOnlyText</ControlType>
			<ID>pageLocation</ID>
			<RMAText>Page x of y</RMAText>
		</NavBtn>
		<NavBtn>
			<ID>helpBtn</ID>
			<Label>Help</Label>
			<RMAText>Help. Select this button to open the help panel.</RMAText>
			<ClickEventName>HelpButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit. Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>mainMenuBtn</ID>
			<Label>Main Menu</Label>
			<RMAText>Main Menu. Select this button to access the main menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Label>Glossary</Label>
			<RMAText>Glossary. Select this button open the glossary.</RMAText>
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button to access the resources for the course.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>hideCCBtn</ID>
			<Label>Hide Captions</Label>
			<RMAText>Hide Captions. Select this button to hide the caption text.</RMAText>
			<ClickEventName>HideCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>showCCBtn</ID>
			<Label>Show Captions</Label>
			<RMAText>Show Captions. Select this button to show the caption text.</RMAText>
			<ClickEventName>ShowCCButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOffBtn</ID>
			<Label>Turn Audio Descriptions Off</Label>
			<RMAText>Turn Audio Descriptions Off. Select this button to turn off audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOffButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>turnAudioDescriptionsOnBtn</ID>
			<Label>Turn Audio Descriptions On</Label>
			<RMAText>Turn Audio Descriptions On. Select this button to turn on audio descriptions.</RMAText>
			<ClickEventName>AudioDescriptionsOnButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipReverseBtn</ID>
			<Label>Skip Backward</Label>
			<RMAText>Skip Backward. Select this button to skip a few frames back.</RMAText>
			<ClickEventName>SkipReverseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>skipForwardBtn</ID>
			<Label>Skip Forward</Label>
			<RMAText>Skip Forward. Select this button to skip a few frames ahead.</RMAText>
			<ClickEventName>SkipForwardButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>transcriptBtn</ID>
			<Label>Transcript</Label>
			<RMAText>Transcript. Select this button for a transcript of the current page.</RMAText>
			<ClickEventName>ShowTextButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause. Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true" toggleOffSilent="false">
			<ID>previousPgBtn</ID>
			<Label>Back</Label>
			<RMAText>Back. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn h="19.1" nextBtn="true" toggleOffSilent="false" w="67.6">
			<ID>nextPgBtn</ID>
			<Label>Next</Label>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title></Title>
			<Subtitle></Subtitle>
			<Pages>
				<Page>
					<Title></Title>
					<Subtitle></Subtitle>
					<Filename>disaldr01_01</Filename>
					<PageNbr>1</PageNbr>
					<Sec508Data Page="disaldr01_01"></Sec508Data>
					<ShowText Page="disaldr01_01">
						<Txt frameNbr="5"><![CDATA[You've seen them in the news. You can imagine the potential harm to our national security. You've heard their reasons and]]></Txt>
						<Txt frameNbr="236">their justifications. But how do you deter and detect people like this in your organization? How do you prevent one of your</Txt>
						<Txt frameNbr="421">subordinates and your organization from becoming the next scandal to dominate the 24-hour news cycle? How do</Txt>
						<Txt frameNbr="615">you protect your mission?</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Identifying the Threat</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr01_02</Filename>
					<PageNbr>2</PageNbr>
					<Sec508Data Page="disaldr01_02"></Sec508Data>
					<ShowText Page="disaldr01_02">
						<Txt frameNbr="5"><![CDATA[At this point, we're all familiar with the suspicious behaviors that insider threats can exhibit: the odd work hours, the]]></Txt>
						<Txt frameNbr="174">unexplained wealth, the unreported foreign travel, the requests for information that they do not have a  need to</Txt>
						<Txt frameNbr="330">know.  Since we know what to look for, why are insider threats so difficult to identify before they cause such irreparable</Txt>
						<Txt frameNbr="506"><![CDATA[harm? First let's remember who could become an insider threat. An insider threat is any person with authorized access to any]]></Txt>
						<Txt frameNbr="713">United States Government resource, such as personnel, facilities, information, equipment, networks, or</Txt>
						<Txt frameNbr="883">systems, who wittingly or unwittingly causes harm to national security. Insider threat actions can result in grave</Txt>
						<Txt frameNbr="1080"><![CDATA[damage to an organization's mission through loss of resources and degradation of capabilities. And remember: an]]></Txt>
						<Txt frameNbr="1259">unwitting insider can cause as much harm as a malicious insider, revealing sensitive information without even</Txt>
						<Txt frameNbr="1430">realizing it. Because the insider threat can be anyone in your organization, they can easily evade notice. The fact that</Txt>
						<Txt frameNbr="1627"><![CDATA[insiders already have access means traditional access controls won't stop them. (pause) Making it even more]]></Txt>
						<Txt frameNbr="1813">difficult to identify these insiders, they can operate over an extended period of time, slowly stealing information and</Txt>
						<Txt frameNbr="1999">incrementally undermining the mission. Finally, due to either lack of training or reluctance to turn in their co-workers,</Txt>
						<Txt frameNbr="2178">employees tend not to report when insiders do display potential insider threat indicators.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Protecting Against the Insider Threat</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr01_03</Filename>
					<PageNbr>3</PageNbr>
					<Sec508Data Page="disaldr01_03"></Sec508Data>
					<ShowText Page="disaldr01_03">
						<Txt frameNbr="5">So, how do you, as a senior leader, protect your organization and mission from the insider threat? Especially</Txt>
						<Txt frameNbr="183">when it is so difficult to identify? Countering the insider threat consists of three activities: deterring people from becoming</Txt>
						<Txt frameNbr="412">insider threats, detecting when insiders might be at malicious work, and mitigating, or controlling, the harm they can</Txt>
						<Txt frameNbr="589">do. The success of these activities relies on the fundamentals of good security. As a senior leader, you should</Txt>
						<Txt frameNbr="769">monitor organizational security practices.   An important example would be your involvement with procedures for</Txt>
						<Txt frameNbr="928">safeguarding classified information and applying appropriate markings to help protect organizational files and</Txt>
						<Txt frameNbr="1088">removable media. In addition to being alert to and reporting any suspicious activity, behavior, or potential security incident that</Txt>
						<Txt frameNbr="1307">you see, you must foster a culture where your employees do the same. Be sure personnel in your organization know the</Txt>
						<Txt frameNbr="1499">potential indicators and required reporting procedures. Finally, always be diligent in ensuring that you and</Txt>
						<Txt frameNbr="1669">personnel in your organization are sharing information only with those individuals who are cleared at the appropriate level</Txt>
						<Txt frameNbr="1842">and have a  need-to-know.  Balancing strict enforcement of need-to-know with the need for information sharing to achieve</Txt>
						<Txt frameNbr="2033">mission objectives can be challenging. Minimizing the reach of an insider is essential to mitigating the damage they</Txt>
						<Txt frameNbr="2219">can cause. Security personnel within your organization can assist you in protecting your mission and conducting this</Txt>
						<Txt frameNbr="2394"><![CDATA[oversight at all levels in your organization. By working closely with security, you can better deter your organization's]]></Txt>
						<Txt frameNbr="2591"><![CDATA[personnel from becoming insider threats, detect insiders who pose a threat to your organization's mission, and]]></Txt>
						<Txt frameNbr="2770">mitigate the damage insider threats cause by curtailing their reach and</Txt>
						<Txt frameNbr="2875">responding proactively to potential insider threat indicators.</Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Insider Threat Program</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr01_04</Filename>
					<PageNbr>4</PageNbr>
					<Sec508Data Page="disaldr01_04"></Sec508Data>
					<ShowText Page="disaldr01_04">
						<Txt frameNbr="5">As a senior leader, you play a vital role in establishing how your organization will go about gathering, integrating,</Txt>
						<Txt frameNbr="184">analyzing, and responding to potential insider threat information. Beyond employing general security practices, you</Txt>
						<Txt frameNbr="376">should ensure that your agency creates a formal insider threat program. The goal of such a program is to deter, detect, and</Txt>
						<Txt frameNbr="573">mitigate the insider threat. In October 2011, the White House issued Executive Order 13587, requiring agencies to establish</Txt>
						<Txt frameNbr="814">their own insider threat programs. Subsequently, Presidential Memorandum Minimum Standards for</Txt>
						<Txt frameNbr="977">Executive Branch Insider Threat Programs outlined the minimum elements needed for agencies to implement effective</Txt>
						<Txt frameNbr="1133">programs. Although current insider threat policy is specific to classified information, the principles can help you protect</Txt>
						<Txt frameNbr="1314"><![CDATA[your organization's mission, regardless of the information it generates or protects.]]></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>Senior Leader Role in an Insider Threat Program</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr01_05</Filename>
					<PageNbr>5</PageNbr>
					<Controls>
						<RollOverButtonControl name="rollover1">
							<RMAText>Other responsibilities, 
Other senior leader responsibilities for an insider threat program:
Bullet	Provide resource recommendations
Bullet	Submit the implementation plan and annual report
Bullet	Ensure proper handling and use of records
Bullet	Consult with legal authorities
Sub Bullet	Office of the General Counsel
Sub Bullet	Civil liberty officials
Sub Bullet	Privacy officials
Bullet	Establish guidelines for record retention
Bullet	Facilitate oversight reviews to ensure policy compliance
</RMAText>
						</RollOverButtonControl>
					</Controls>
					<Sec508Data Page="disaldr01_05"></Sec508Data>
					<ShowText Page="disaldr01_05">
						<Txt frameNbr="1"><![CDATA[The Minimum Standards require each agency head to designate a senior official to oversee and manage the agency's insider threat program. Part of the senior leader's responsibility is to coordinate agency functions in establishing the insider threat program. This will help ensure your organization has the centralized capability necessary to execute its insider threat program. In the event your agency head designates you to lead up this effort, be sure to get to know the personnel who fill each of these functions in your organization. Knowing them, their roles, and their responsibilities, can assist you in establishing a successful program. ]]></Txt>
						<Txt frameNbr="1"></Txt>
					</ShowText>
				</Page>
				<Page>
					<Title>[Conclusion]</Title>
					<Subtitle></Subtitle>
					<Filename>disaldr01_06</Filename>
					<PageNbr>6</PageNbr>
					<Sec508Data Page="disaldr01_06"></Sec508Data>
					<ShowText Page="disaldr01_06">
						<Txt frameNbr="1"><![CDATA[[news broadcaster] Good evening. Tonight we have received word that an international manhunt is underway for the former Government employee who allegedly released a trove of classified documents to online media outlets last month.   The leaker's identity and location have not yet been released, but the U.S. State Department is seeking his extradition back to the United States.  Senior officials inside the Pentagon, who asked not to be named due to the ongoing investigation, say an announcement of the leaker's identity and last known whereabouts is  imminent.  [main narrator] Make sure the next time a malicious insider succeeds, it isn't in your organization. Know the threat and how to counter it. Protect your mission. ]]></Txt>
						<Txt frameNbr="1"></Txt>
					</ShowText>
				</Page>
			</Pages>
		</Topic>
	</Topics>
</Module>