>>8774658 pb
NSTISSAM INFOSEC/1-99
This NSTISSAM focuses on the insider and the potential damage that such an individual could cause when targeting today's IS. It points out the various weaknesses (vulnerabilities) in today's IS an insider might exploit and highlights approaches to solving these problems.
In taking corrective action, it is necessary to consider technical and procudural steps in deterring the insider. Finally, we propose, in priority order, recommendations that mitigate the threat posed by the insider. Our approach is not to provide an exhaustive list, but rather offer recommendations that could have the greatest immediate return against this serious threat
https://www.cdse.edu/documents/toolkits-insider/ADA406622.pdf
1871
Aug 14, 2018 6:46:46 PM EDT
Q !!mG7VJxZNCI ID: 58bc71 No. 2601101
Ex 1.1
(MOS)
/ \
(Alt + US Media) (US Politicians)
/ \
(…………………..)(…………………….)
Those who scream the loudest….
Find the connections.
1:1:1:1
Primary>>AffiliateA>>AffiliateB>>AffiliateC>>
Marching to the same beat?
Coincidence?
Logical thinking.
Q