search menu icon-carat-right cmu-wordmark

An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases

Technical Note
In this report, the authors provide an overview of techniques used by malicious insiders to steal intellectual property.
Publisher

Software Engineering Institute

CMU/SEI Report Number
CMU/SEI-2011-TN-006
DOI (Digital Object Identifier)
10.1184/R1/6571895.v1

Abstract

Since 2001, the Insider Threat team at the Software Engineering Institute's CERT program has built an extensive library and comprehensive database containing more than 550 cases of insider crimes. More than 80 of those crimes involved theft of an organization's intellectual property by a malicious insider. These crimes can be particularly damaging to an organization because it is often difficult or impossible to recover from a loss of confidentiality. This report provides an overview of techniques employed by malicious insiders to steal intellectual property, including the types of assets targeted and the methods used to remove the information from a victim organization's control. The report closes with a brief discussion of mitigating factors and strategic items that an organization should consider when defending against insider attacks on intellectual property.

Cite This Technical Note

Hanley, M., Dean, T., Schroeder, W., Houy, M., Trzeciak, R., & Montelibano, J. (2011, February 1). An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases. (Technical Note CMU/SEI-2011-TN-006). Retrieved May 20, 2024, from https://doi.org/10.1184/R1/6571895.v1.

@techreport{hanley_2011,
author={Hanley, Michael and Dean, Tyler and Schroeder, Will and Houy, Matt and Trzeciak, Randall and Montelibano, Joji},
title={An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases},
month={Feb},
year={2011},
number={CMU/SEI-2011-TN-006},
howpublished={Carnegie Mellon University, Software Engineering Institute's Digital Library},
url={https://doi.org/10.1184/R1/6571895.v1},
note={Accessed: 2024-May-20}
}

Hanley, Michael, Tyler Dean, Will Schroeder, Matt Houy, Randall Trzeciak, and Joji Montelibano. "An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases." (CMU/SEI-2011-TN-006). Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, February 1, 2011. https://doi.org/10.1184/R1/6571895.v1.

M. Hanley, T. Dean, W. Schroeder, M. Houy, R. Trzeciak, and J. Montelibano, "An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases," Carnegie Mellon University, Software Engineering Institute's Digital Library. Software Engineering Institute, Technical Note CMU/SEI-2011-TN-006, 1-Feb-2011 [Online]. Available: https://doi.org/10.1184/R1/6571895.v1. [Accessed: 20-May-2024].

Hanley, Michael, Tyler Dean, Will Schroeder, Matt Houy, Randall Trzeciak, and Joji Montelibano. "An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases." (Technical Note CMU/SEI-2011-TN-006). Carnegie Mellon University, Software Engineering Institute's Digital Library, Software Engineering Institute, 1 Feb. 2011. https://doi.org/10.1184/R1/6571895.v1. Accessed 20 May. 2024.

Hanley, Michael; Dean, Tyler; Schroeder, Will; Houy, Matt; Trzeciak, Randall; & Montelibano, Joji. An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases. CMU/SEI-2011-TN-006. Software Engineering Institute. 2011. https://doi.org/10.1184/R1/6571895.v1