Source: https://www.dcsa.mil/Portals/91/documents/pv/mbi/Exploitation_of_Insider_Access.pdf