Phase II Amount
$1,296,389
This effort will focus on methods to identify, describe, justify, design, and prototype methodologies and mechanisms to detect acts indicative of malicious intent or behavior by trusted individuals and groups with access to sensitive information, systems, and sources in secure environments in time to mitigate potentially serious negative consequences of those acts.
Keywords: insider threat, digital forensics, inconsistency analysis, digital forensics, turning behavior