An outsiders perspective on insider risk

Article

• 2 mins

In January 2024, a historic integrity screening of over 307,000 police personnel was conducted in response to a review commissioned by Baroness Casey1 in the aftermath of the tragic murder of Sarah Everard by a serving Metropolitan Police Officer, Wayne Couzens.

Although a significant step, Professor Paul Martin, a UK national security expert, cautions that screening alone cannot fully address the complexities of the problem facing UK policing. This challenge, arising from insiders – people who betray trust – is rooted in complex human behaviour, and requires a different security response.

What is insider risk?

Wayne Couzens’ crimes exemplify insider risk. The UK National Technical Authority, the National Protective Security Authority (NPSA) defines an insider as ‘a person who exploits or has the intention to exploit their legitimate access to an organisation’s assets for unauthorised purposes’.2

Couzens exploited his role as a police officer to commit a heinous crime, resulting in devastating personal tragedy and damaging the police’s reputation—an asset crucial for its operations.

Organisations face significant security risks from insiders yet many lack an adequate understanding of insider risk and personnel security – the system of protective security measures to protect them against it, which can inadvertently foster conditions in which insiders can thrive. Martin states that physical, personnel and cyber security are hugely interdependent and should therefore be managed holistically. Insiders with authorised access can defeat most physical and cyber defences. However, many organisations have security structures that are far from holistic, with cyber and physical security managed separately while personnel security – referred to by Martin as the ‘Cinderella of protective security’ is commonly underfunded and overlooked as an HR responsibility.

Insider risk can manifest itself in many ways. Insiders steal personal data and intellectual property. They leak secrets, perpetrate fraud and sabotage infrastructure.

Some have committed acts of terrorism and physical violence, as seen in US army psychiatrist Major Nadal Hasan’s attack in 2019, the worst since 9/11 causing 13 deaths and injuring 43.3 Hasan had just been promoted and was a trusted insider. Martin highlights that while hundreds of people have been killed over the years by trusted insiders, cyber-attacks have not directly caused any fatalities.4

Forget the rotten apples

A commonly used term when referring to insiders is ‘a few rotten apples’. It is based on the idea that that the workforce can be split between the great majority who are entirely trustworthy and a few so-called ‘rotten apples’ who are inherently evil. Martin argues that it falsely implies that insider risk is purely the property of the individual, ignoring the crucial influence of work and home  environments, along with other external factors, in shaping an individual’s tendency to commit insider acts. Research suggests workplace experiences such as job demands and interactions with
managers and colleagues play a significant role in developing insider intentions.5 

Furthermore, it appears that most harmful insiders turn rogue during their time in the workplace, rather than joining with malicious intent. A 2013 study revealed just 6% of insider incidents were deliberate infiltrations6, indicating insider behaviours and intentions typically develop gradually.

It’s all about trust

The best detectors of insider risk are the workforce itself. Martin emphasises the critical need to cultivate environments where there is a high level of trust between employees, the organisation, and stakeholders. High trust correlates with reduced insider risk7, and such organisations are often more innovative, agile, and better equipped to handle change. They’re also more inclined towards openness, collaboration, and risk-taking.

Trust must also extend to the organisation’s reporting  mechanisms, like hotlines and ‘speak up’ channels. If the workforce lacks trust in these systems, they won’t use them to report suspicious behaviour. It’s crucial that employees believe the information they provide will be handled sensitively and lead to appropriate actions without negative repercussions.

Yet Martin warns against complacency, “A high-trust organisation doesn’t mean assuming that everyone is trustworthy.” He highlights a common thread in insider incidents is the failure to act on early warning signs such as the case of Hasan8 who displayed multiple red flags such as openly supporting extremist beliefs and sending alarming emails about martyrdom which were overlooked. The Hasan incident underscores the critical need for prompt action in response to potential threats.

The best personnel security systems excel at identifying the subtle, early indicators of potential insider risks, preventing them from escalating into full blown insider behaviour. According to Martin, one way of doing this is through a compassionate aftercare welfare approach, in which the organisation seeks to help individuals with whatever problems might be nudging them onto the developmental path towards insider action.9 The welfare approach recognises most people are not going to turn into harmful insiders. An organization that actively provides support and fosters a caring culture is often able to address and resolve potential issues early on10.

Prevention is better than the cure

Organisations often want a silver bullet to manage insider risk yet Martin points out that no single technology can fully safeguard against it. Popular strategies like automated monitoring software for detecting forbidden activities on IT systems or pre-employment screening processes are limited as they fail to address the fact that most incidents happen after hiring. Furthermore, cases like Couzens and serial rapist police officer, David Carrick, show that risks can occur beyond the workplace. Therefore, relying on compliance processes might only treat the symptoms, not prevent the risks. Martin emphasises, “Personnel security requires an-depth defence system of complementary measures. The fundamental reason is that insider risk is an emergent property of a complex adaptive system. Systems problems require systems solutions, not silver bullets.”

How do you detect insider behaviour? 

Research indicates that within the Big Five Personality traits, low levels of Agreeableness and Extraversion are associated with heightened insider risk.12 Additionally, among the Dark Triad personality traits13, narcissism is particularly predictive of insider risk.14 Narcissists are typically prone to intense anger and are more likely to seek revenge when provoked. Mental health issues also contribute to risk in certain instances.

 

The ongoing trustworthiness of individuals should also be assessed. The four key components of trustworthiness are as follows15:

  • Benign intentions

  • Competence

  • Integrity

  • Consistency

By carefully considering these factors, organisations can make informed strategic decisions that safeguard their interests and foster a trustworthy work environment. Ultimately, people are both the source and bearers of security risk which highlights the critical need for ongoing vigilance within organisations to reduce insider risks and build resilient, high-performing work cultures.

As Paul notes, trust is an organisation’s most valuable asset. No organisation is safe unless it can trust its people. 

Professor Paul Martin is Professor of Practice at Coventry University’s new London based Protective Security Lab, Security Practitioner with more than 30 years’ experience in the UK national security arena and the author of Insider Risk and Personnel security published in 2024.

 

 

Dr Paul Martin CBE
Professor of Practice and Police
Science Council Member,
Coventry University

 

  1. Metropolitan Police. (2023). The Baroness Casey Review: A review into the standards of behaviour and internal culture of the Metropolitan Police Service. Metropolitan Police. (https://www.met.police.uk/police-forces/metropolitan-police/areas/about-us/about-the-met/bcr/baroness-casey-review/)
  2. NPSA (formerly CPNI) has until 2023 defined an insider as “a person who exploits, or has the intention to exploit, their legitimate access to an organisation’s assets forunauthorised purposes”. This definition was utilised for the purposes of the research underpinning the 2009 and 2013 Insider Data Collection Study. NPSA Changes to Insider Risk Definitions | NPSAPersonnelCyberPhysical (https://www.met.police.uk/police-forces/metropolitan-police/areas/about-us/about-the-met/bcr/baroness-casey-review/)
  3. P. Martin (2024) Insider Risk and Personnel Security p.67
  4. P. Martin (2024) Insider Risk and Personnel Security p.26
  5. P. Martin (2024) Insider Risk and Personnel Security p.46 Factors thought to increase insider risk include unethical leadership, incompetent management, injustice, being made to feel undervalued or insufficiently rewarded, poor organisational culture, interpersonal conflict with managers or colleagues, chronic stress, job insecurity, excessive work demands, impending job loss and exposure to malign influencers.
  6. CPNI (2013). CPNI Insider Data Collection Study. Report of Main Findings. April 2013. (http://www.npsa.gov.uk/system/files/documents/63/29/insider-data-collection-study-report-of-main-findings.pdf)
  7. Searle R, R. et al. (2011). Trust in the employer: The role of high involvement work practices andprocedural justice in European organisations p.61. International Journal of Human Resource Management, 22: 1069-1092; Hope-Hailey, V., Searle, R., and Dietz, G. (2012). Where has All the Trust Gone? London:CIPD; Nerstad, C. G. L.et al. (2017). Perceived mastery climate, felt trust, and knowledge sharing. Journal of Organizational Behavior, 39:429-447; Kahkonen, T. et al. (2021). Employee trust repair: A systematic review of 20 years of empirical research andfuture research directions. Journal of Business Research, 130 98-109
  8. Fort Hood gunman Maj Nidal Hasan guilty on all counts - BBC News (http://www.npsa.gov.uk/system/files/documents/63/29/insider-data-collection-study-report-of-main-findings.pdf)
  9. P. Martin (2024) Insider Risk and Personnel Security p.66
  10. P. Martin (2024) Insider Risk and Personnel Security p.54-55
  11. The Big Five model arranges personality characteristics into five broad categories: Extraversion, Neuroticism, Conscientiousness, Agreeableness and Openness Nettle D (2007) Personality: What Makes You the Way You Are. Oxford: Oxford University Press
  12. P. Martin (2024) Insider Risk and Personnel Security p.44 The Dark Triad Traits include psychopathy (low empathy, manipulative, impulsive), narcissism (vain, egocentric, sense of entitlement, sensitive to criticism) and machiavellianism (cynically manipulative of others, charming, exploitative).
  13. Wilder, U.M. (2017). The psychology of Espionage and leaking in the digital age. Studies in Intelligence, 61: 1-36
  14. P. Martin (2024) Insider Risk and Personnel Security p.53

 

Top
Previous Article 08.

• 7 mins

Harnessing the power of artificial intelligence (AI) to tackle knife crime

Next Article 10.

• 7 mins

The value of taking risks