The leak severely impacted the confidentiality and integrity of agency operations, exposing sensitive information.
Id
: incident--ef88113a-27a0-4a56-8f70-e8a5fd4541e6Cia effect
:- Confidentiality (C) — The protection of information from unauthorized access or disclosure
Incident type
:- Espionage (E) — The covert or illicit practice of spying on a foreign government, organization, entity, or person to obtain confidential information for military, political, strategic, or financial advantage
Incident subtype
:- Government (E.2) — Covert intelligence-gathering activities to obtain government or military secrets for the benefit of another government to obtain political or military advantage
Outcome
:- Data Deleted (DD) — Data was deleted from the victim organization's systems
- Monetary Losses (ML) — Indirect loss of money through damage, detriment, or suffering related to the incident
- Safety Impact (SI) — There was an impact or potential for impact to safety as a result of the incident
- Data Read (DR) — Organizational data was read by the insider
- Data Stolen (DS) — Any organizational information or assets that are stolen
Status
: Closed (C) — All investigations and legal proceedings are closedSummary
: Oliver Griffin, a former software engineer at a government agency, leaked sensitive documents to an unauthorized entity. These documents detailed the agency's secret tools and techniques, causing severe damage to national security, exposing operations and personnel, and costing the agency substantial financial resources. Griffin was charged with unauthorized access to computer systems, dissemination of classified information, and other related crimes. He was convicted and sentenced to 35 years in prison.Brief summary
: Oliver Griffin leaked sensitive documents to an unauthorized entity, detailing cybersecurity tools and techniques. This caused severe national security damage and financial costs. Griffin was convicted of multiple charges and sentenced to 35 years in prison.
Oliver James Griffin had a history of social and mental health issues. He showed concerning behaviors, such as repeated technical policy abuse and conflicts with his supervisor as well as browsing dark web forums. The insider had multiple workplace incidents.
Id
: insider--5460491c-eacd-4074-aef9-f6f584893a59Incident role
: Primary (1) — Insider is the primary perpetrator of the incidentMotive
:- Revenge (8) — The insider wanted revenge for an actual or perceived wrong
Predispositions
:- Social and Mental Health Issues (['1', '1.1']) — A history of behaviors related to the insider's mental health or unacceptable social behavior
- A History of Rule Violations (['2', '2.4']) — A history of violating the law or violating rules at other organizations
- Suspicious Associations (['3', '3.2']) — A history of associating with criminal or otherwise objectionable persons or entities
Concerning behaviors
:- Technical Policy Abuse (['2', '2.2']) — Violating policies regarding the use of the organization's IT systems
- Interpersonal Issues (['3', '3.2']) — Conflicts with others in the organization or human resources (HR) issues
first_name
: Olivermiddle_name
: Jameslast_name
: Griffinsuffix
: Jralias
: ['OGriffin', 'Silent Hawk', 'Shadow Walker', 'Dark Avenger']city
: New Yorkstate
: NYcountry
: USpostal_code
: 10001country_of_citizenship
: ['US']nationality
: ['US']gender
: Mage
: 35education
: 5marital_status
: 1number_of_children
: 0
Id
: organization--d1472454-0236-4b66-9013-65d0f916ee48Name
: Government AgencyCity
: WashingtonState
: DCCountry
: USPostal code
: 20500Small business
: FalseIndustry sector
: Public Administration (92) — Federal/State/Local administration and the oversight of public programs.Industry subsector
: National Security (92.811) — This industry comprises government establishments of the Armed Forces, including the National Guard, primarily engaged in national security and related activities.Business
: A government agency responsible for various administrative and regulatory functions within the federal government of the United States.Incident role
: Primary Victim (V) — The organization was the primary victim organization of the insider's actions.Parent company
: United States Government
Id
: organization--19f19fa9-d96e-4407-901e-06ecaefd71b5Name
: Global News NetworkSmall business
: FalseIndustry sector
: Information (51) — Hardware or software systems related to the processing, communications, and accessing of information.Industry subsector
: Web Search Portals, Libraries, Archives, and Other Information Services (51.9) — Industries in the Web Search Portals, Libraries, Archives, and Other Information Services subsector group establishments supplying information, storing and providing access to information, searching and retrieving information, and operating websites that use search engines to allow for searching information on the Internet. The main components of the subsector are libraries, archives, and web search portals.Business
: Global News Network is a nonprofit organization that publishes news and media content from various sources.Incident role
: Beneficiary (B) — The organization accepted trade secrets, customer lists, intellectual property, etc. that the insider obtained through the incident.
Griffin's unauthorized activities were detected by the government's security team and subsequently investigated by law enforcement. Detection involved technical means such as monitoring access logs, audit logs, database logs, remote access logs, and system file logs.
Id
: detection--bd545866-663f-4d62-a39a-da3672842c9fFirst detected
: 2001-03-07T00:00:00ZWho detected
:- Law Enforcement (LE) — Law enforcement discovered the insider's illegal activity (e.g., police noticed that the insider was gaining access to the company after hours)
- Security Team (ST) — Technical or personnel security team discovered the insider's activity
Detected method
:- Technical Means (2) — The insider's activity was detected via analysis or anomalies in technical systems and software
- Security Software (4) — The insider's activity was detected by security software (e.g., the insider tried to download a document with trade secrets and an automatic alert detected the download)
Logs
:- Access Logs (AC) — File or system access logs
- Audit Logs (AU) — Logs generated specifically for auditing purposes
- Database Logs (DB) — Logs from traditional or non-traditional database servers or services
- Remote Access Logs (RA) — Logs from remote access servers or clients
- System File Logs (SF) — File logs (create, delete, modify, etc.) from workstations, servers, and other systems
The leak included approximately 5 highly sensitive documents.
Id
: impact--2d4ed800-002d-4ce5-bbb0-c89acc1f4254High
: 5Low
: 5Metric
: Files (7) — Number of physical or digital files stolen, read, or compromisedEstimated
: True
The financial impact of the breach was substantial, with estimates ranging from hundreds of millions to a billion dollars for damage control and security improvements.
Id
: impact--5f3ee38d-2d4c-4ea9-9857-41f9537477eaHigh
: 1,000,000,000Low
: 100,000,000Metric
: Dollars (5) — Specific financial impact of money stolen, restitution ordered, etc.Estimated
: True
Id
: target--2a6f542f-a3e6-43e9-b628-cc9c97765276Asset type
: Information (2) — Data or business materials that contain important details belonging to a specific target ownerCategory
: Government/Law Enforcement Information (2.3) — Classified or sensitive government or law enforcement informationSubcategory
: Classified Information (2.3.1) — Information that is restricted by the government for reasons of national securityFormat
: Electronic (1) — Technological digital formatOwner
: Organization (O) — The organization, rather than its employees or customers, owns the targetSensitivity
:- Secret (4) — Public disclosure would cause serious damage to national security
- SecretNoForn (5) — Secret / restricted to country of source
- Top Secret (TS) (6) — Top secret - unauthorized disclosure would cause exceptionally grave damage to national security
- TS/SCI (7) — Top secret / Sensitive compartmented information
Description
: Classified agency information related to hacking tools and techniques disclosed to an unauthorized entity.
Griffin left the agency in November of 2001. Before departing from the agency, he planted a service to still allow remote access to government files and databases, which he used to access classified information post departure.
Id
: response--f42fc7ae-48a1-48f9-bf84-0d4b13f7a64ctechnical_controls
: [['1', '2001-11-01'], ['2', '2001-11-01']]behavioral_controls
: [['9', '2001-11-01']]investigated_by
: ['2', '3']investigation_events
: [['3', '2002-03-07'], ['1', '2002-03-07'], ['2', '2003-06-18']]
This case involved multiple charges against Oliver Griffin, including unauthorized access to classified information, computer hacking, unauthorized access to government computer systems, and causing transmission of harmful computer commands.
Id
: court-case--0e430311-72ee-4776-be74-3c1969d141c0Case number
: 1:22-cr-00123-JMFCase title
: USA vs. GriffinCourt country
: United StatesCourt state
: New YorkCourt district
: Southern District of New YorkCourt type
: Federal (1) — Top level government courtCase type
: Criminal (2) — A case dealing with a violation of criminal lawDefendant
:- Oliver Griffin
Plaintiff
:- United States of America
Id
: charge--2bc9e36b-53c3-44fa-8997-ccb5d8ac9418Title
: 18 U.S.C.Section
: 793(e)Nature of offense
: Illegal gathering and transmission of national defense information.Count
: 3Plea
: Not Guilty (3) — The defendant pleaded not guilty to the chargePlea bargain
: FalseDisposition
: Convicted (2) — Pleaded or found guilty by a court
Id
: charge--0572191b-beef-484c-841f-149a9f17fd8fTitle
: 18 U.S.C.Section
: 641Nature of offense
: Theft of government property.Count
: 1Plea
: Not Guilty (3) — The defendant pleaded not guilty to the chargePlea bargain
: FalseDisposition
: Convicted (2) — Pleaded or found guilty by a court
Id
: charge--868f7fd1-b492-40a4-b21f-f5a31cd5e219Title
: 18 U.S.C.Section
: 1030(a)(1)Nature of offense
: Unauthorized access to a computer to obtain classified information.Count
: 1Plea
: Not Guilty (3) — The defendant pleaded not guilty to the chargePlea bargain
: FalseDisposition
: Convicted (2) — Pleaded or found guilty by a court
Id
: charge--d59dd57a-96b5-472f-a788-dcdb30ec5cb6Title
: 18 U.S.C.Section
: 1030(a)(2)Nature of offense
: Unauthorized access to a computer to obtain information from a department or agency of the U.S.Count
: 1Plea
: Not Guilty (3) — The defendant pleaded not guilty to the chargePlea bargain
: FalseDisposition
: Convicted (2) — Pleaded or found guilty by a court
Id
: charge--cc6be1c8-5c76-4286-84a0-2b456a288c13Title
: 18 U.S.C.Section
: 1030(a)(5)(A)Nature of offense
: Causing transmission of harmful computer commands.Count
: 1Plea
: Not Guilty (3) — The defendant pleaded not guilty to the chargePlea bargain
: FalseDisposition
: Convicted (2) — Pleaded or found guilty by a court
Id
: charge--9259e182-5643-4a4d-b078-4bb251fe2595Title
: 18 U.S.C.Section
: 1519Nature of offense
: Obstruction of justice.Count
: 1Plea
: Not Guilty (3) — The defendant pleaded not guilty to the chargePlea bargain
: FalseDisposition
: Convicted (2) — Pleaded or found guilty by a court
Id
: sentence--21e74a96-ba47-46fe-8338-736ab19552baSentence type
: Incarceration (9) — ImprisonmentQuantity
: 35Metric
: Year(s) (4) — Imposed sentence is in terms of years (e.g. five years no Internet access)Concurrency
: False
Lifetime supervised release, to run concurrently.
Id
: sentence--1141c372-543a-42f5-a640-c88b8ab16ae2Sentence type
: Supervised Release (16) — Defendant is released into the community, subject to special conditions and restrictions, after the completion of a prison sentenceQuantity
: 60Metric
: Year(s) (4) — Imposed sentence is in terms of years (e.g. five years no Internet access)Concurrency
: True
The insider was investigated and charged for multiple offenses, including unauthorized disclosure of classified information, computer hacking, and possession of illicit digital content. The judgment date is in relation to the charges specifically related to the dissemination of stolen classified files.
Id
: legal-response--b318c37b-2f76-421f-bf12-0833e836b00cLaw enforcement contacted
: 2002-03-07Insider arrested
: 2002-08-24Insider charged
: 2003-06Insider pleads
: 2003-06Insider judgment
: 2004-07-13Insider sentenced
: 2005-02-01
The insider was employed as a software engineer in a high-security governmental agency, where they had access to sensitive and classified information.
Id
: job--e76248a2-82df-4c7d-b7a0-bf86eb85c570Job function
: Computer and Mathematical (15) — Computer and MathematicalOccupation
: Computer Occupations (15.1) — Computer Systems Analysts, Information Security Analysts, Network Support Specialists, User Support Specialists, Network Architects, Systems Administrators, Software Developers, Web Developers, Interface Designers, etc.Title
: Software EngineerPosition technical
: TrueAccess authorization
: Administrator/Root (2) — Authorized full administrative accessEmployment type
: Full-time (FLT) — Individual who is directly employed by the organization and works at least 35 hours per week or is classified by the organization as a full-time employeeHire date
: 2001-01-01Departure date
: 2006-11-11Tenure
: P5Y10M10D
Oliver Griffin's internal disputes and a hostile work environment at the agency (self-imposed) contributed to his decision to steal and leak classified information as revenge for mistreatment.
Id
: stressor--28ecfbf3-5eb1-429f-8a55-c2e16f08ebcdDate
: 2002Category
: Organizational Issues (2) — The insider's employer had problems or changes that directly or indirectly affected the insiderSubcategory
: Hostile Work Environment (2.12) — A work environment that is difficult or uncomfortable for another person to work in due to discrimination of any kind
Id
: ttp--a181e814-aa3a-411e-ae79-79ceba48e36aDate
: 2002-04-20T14:00:00ZSequence num
: 1Observed
: TrueNumber of times
: 2TTP vocab
: IIDESTactic
: Data Exfiltration (7) — Data (or copies of data) is removed from the organization without permission or explicitly against permission to use in an unauthorized wayTechnique
: Email (7.3) — Data exfiltration through electronic mail (e.g., the insider e-mailed confidential information to competitor)Location
:- On-site (1) — Action taken while on site at an organizational facility
Hours
:- During Work Hours (1) — Insider took the action during their normal working hours
Device
:- Company Desktop (1) — Organization owned desktop workstation
Channel
:- Company Email (1) — An email account the company controls
- Online Forum (4) — Private or public forum accessed via the Internet
- Personal Email (5) — An email account the organization does not control or monitor
Description
: Griffin used a personal email account to exfiltrate classified agency information from the organization's database server to his personal computer.
Id
: ttp--a154e814-aa3a-411e-ae79-79ceba48e79bDate
: 2002-04-20T14:00:00ZSequence num
: 2Observed
: TrueNumber of times
: 1TTP vocab
: IIDESTactic
: Data Exfiltration (7) — Data (or copies of data) is removed from the organization without permission or explicitly against permission to use in an unauthorized wayTechnique
: Removable Media (7.2) — Data exfiltration through digital equipment or media (e.g., the insider had trade secrets owned by the victim organization on a flash drive and sent the flash drive to the competitor to be copied)Location
:- Remotely (2) — Action taken while remote (i.e., not at an organizational facility)
Hours
:- Outside of Work Hours (2) — Insider took the action outside of their normal working hours
Device
:- Personal Computer (7) — Personally owned computer
Channel
:- Other (9) — Other type of channel not listed in this vocabulary
Description
: Griffin then loaded the data on a removable media disk.
Id
: ttp--a154e814-aa3a-411e-ae79-79ceba48e77bDate
: 2002-04-20T14:00:00ZSequence num
: 2Observed
: TrueNumber of times
: 2TTP vocab
: IIDESTactic
: Malware (4) — Malicious software is usedTechnique
: Backdoor (4.1) — A malicious program that allows an attacker to perform actions on a remote system, such as transferring files, acquiring passwords, or executing arbitrary commandsLocation
:- On-site (1) — Action taken while on site at an organizational facility
Hours
:- During Work Hours (1) — Insider took the action during their normal working hours
Device
:- Company Desktop (1) — Organization owned desktop workstation
Channel
:- Other (9) — Other type of channel not listed in this vocabulary
Description
: Before leaving the agency, Griffin planted a backdoor into the agency network.
Id
: ttp--a154e814-aa3a-411e-ae79-79ceba48e76bDate
: 2002-04-20T14:00:00ZSequence num
: 3Observed
: TrueNumber of times
: 1TTP vocab
: IIDESTactic
: Data Exfiltration (7) — Data (or copies of data) is removed from the organization without permission or explicitly against permission to use in an unauthorized wayTechnique
: Other Technical/Digital (7.9) — Data exfiltration using other technical or digital means not listed in this vocabularyLocation
:- Remotely (2) — Action taken while remote (i.e., not at an organizational facility)
Hours
:- Outside of Work Hours (2) — Insider took the action outside of their normal working hours
Device
:- Database Server (4) — Database server
Channel
:- Company Email (1) — An email account the company controls
- Personal Email (5) — An email account the organization does not control or monitor
- Other (9) — Other type of channel not listed in this vocabulary
Description
: After leaving the agency, Griffin hosted a server on the agency's network to continue accessing and exfiltrating classified data.
The charges related to illicit digital content were included in the JSON because they are relevant to the overall investigation of Oliver Griffin. Although they do not directly pertain to the insider threat, they were pivotal in leading to his initial arrest and subsequent comprehensive charges.
Id
: note--b372b9ad-cb92-4db6-be28-1e3f62605858Author
: CMU ResearcherDate
: 2024-05-17T00:00:00Z
Id
: source--53455e706-d762-4b35-b54a-7e33b91cbec3Title
: Mock Case DescriptionSource type
: DOJ Press Release (2) — Press release from the Department of Justice or U.S. Attorneys' OfficeFile type
: HTML File (html) — A file in HTML formatDate
: 2024-07-18T00:00:00ZPublic
: TrueDocument
: ./source/example1desc.md
Id
: source--5565e706-d762-4b35-b54a-6f22a80badb2Title
: Oliver Griffin Charged with Unauthorized Disclosure of Classified Information and Other OffensesSource type
: DOJ Press Release (2) — Press release from the Department of Justice or U.S. Attorneys' OfficeFile type
: HTML File (html) — A file in HTML formatDate
: 2003-06-18T00:00:00ZPublic
: TrueDocument
: https://www.fakeurl.com/oliver-griffin-charged
Id
: source--d6a29cb3-519f-4d62-a1f6-a86439bef53dTitle
: Former Intelligence Officer Oliver Griffin Sentenced to 35 Years in Prison for EspionageSource type
: DOJ Press Release (2) — Press release from the Department of Justice or U.S. Attorneys' OfficeFile type
: HTML File (html) — A file in HTML formatDate
: 2004-01-18T00:00:00ZPublic
: TrueDocument
: https://www.fakeurl.com/oliver-griffin-sentenced
Id
: source--7e3ef93e-31b0-4e17-a32a-98540326fd05Title
: Intelligence Engineer Convicted of Largest Theft of Classified Data in Agency's HistorySource type
: Media (5) — News, blog, or similar publicationFile type
: HTML File (html) — A file in HTML formatDate
: 2002-07-13T00:00:00ZPublic
: TrueDocument
: https://www.fakeurl.com/intelligence-engineer-convicted
Id
: source--d36603a3-2510-4617-87eb-10eea6ab672eTitle
: USA v. Griffin Docket InformationSource type
: Court Document (1) — Legal document from a court caseFile type
: HTML File (html) — A file in HTML formatDate
: 2002-07-13T00:00:00ZPublic
: TrueDocument
: https://www.fakeurl.com/usa-v-griffin-docket