2012 annual security refresher briefing

2013
ANNUAL SECURITY
REFRESHER
BRIEFING
IIF DATA SOLUTIONS, INC.
PURPOSE
• Satisfy the NISPOM requirement that
all cleared employees receive a
MANDATORY Annual Security
Refresher Briefing
• Employee Reporting Responsibilities*
•
*IT IS EXTREMELY IMPORTANT TO KNOW
YOUR RESPONSIBILITIES FOR REPORTING!
• Educate cleared employees on their
personal security responsibilities
• Overview of the classification system
~ Back to the Basics
• Threat Awareness/Trends
• Defensive Security
• NATO
• Where to go for help
A SECURITY CLEARANCE
• Having a security
clearance is a
privilege – not a
right
When you accept the privilege
of access to classified
information you are also
accepting the
responsibilities that
accompany it. The SF312 is
a contractual agreement
between the U.S.
Government and you. This
agreement is binding upon
you for life (even if you no
longer require a security
clearance)
SF-312
Security Training
reinforces information
provided during the
initial security briefing
and is intended to
reinforce security
requirements of all
cleared personnel
CLASSIFIED
INFORMATION
NONDISCLOSURE
AGREEMENT
Refusal to sign the SF312
must be reported and
access will be denied
REPORTING REQUIREMENTS
SELF REPORTING
• Foreign Contacts (either within or
YOU ARE REQUIRED TO
REPORT TO SECURITY:
•
•
•
Change in Personal Status
(married, divorced…)
Change of Name
Loss or Compromise of
Information (Classified or other
sensitive information)
outside the scope of your official duties
where unauthorized access is sought to
classified or otherwise sensitive
information / if you acquire relativesthrough marriage- who are residents or
citizens of a foreign country
• Financial Problems
~Filing for Bankruptcy / Foreclosures
~Excessive Debt / Credit card charge off
~Eviction for failing to pay rent
~Garnishment of wages
~Having a lien placed upon your property
(failing to pay a creditor)
~Credit Card Charge offs
ADDITIONAL SELF REPORTING REQUIREMENTS
•
•
•
•
•
•
•
•
Change in Cohabitation
Change of Address
Citizenship Change
Suspicious Contact
Coercion, blackmail or
recruitment attempts
Participation in an alcohol or
drug abuse rehabilitation
program
Arrests
Psychological Counseling
~Psychological treatment:
Do not report if it is not court ordered and is for marital, family or
grief counseling (not related to violence by you) or is related to
adjustment from military service in a combat environment
(Seeking help for routine life crises does not reflect adversely on
an individuals judgment.)
REPORT ANY CONCERNS YOU MAY HAVE TO YOUR
FACILITY SECURITY OFFICER
REPORTING REQUIREMENTS
YOU ARE REQUIRED TO REPORT:
 Unauthorized disclosures
 Loss of classified information
 Taking classified information home (or any unauthorized location)
 Deliberate failure to comply with security regulations
 Sharing and unauthorized use of someone else’s password
 Inadvertent or deliberate removal of classified material from a classified area
 Behaviors in yourself and others that may signal a need for assistance
 Downloading, storing or transmitting classified on or to unauthorized software,
hardware or systems
 Discussing classified information in a non secure area or over non secure lines
 Requests for classified material through improper channels
 Any security violation or possible compromise of classified information
If you have any questions or concerns, please check with security
regarding reporting requirements.
ADDITONAL REPORTING REQUIREMENTS
Unexplained Affluence
Substance Abuse
Frequent Foreign Travel
Close Association with a Foreign National
Frequent Evening/Weekend Hours
Drastic Change in Behavior
Unauthorized entry into Classified Automated Information Systems/
Copiers/Fax Machines/Computers/Printers
MODIFYING INFORMATION ON ANOTHER PERSONS ACCOUNT
WITHOUT FORMAL CONSENT
If you witness any of the above you are required to
report it to your corporate FSO or the security office
of the location where you are working
BACK TO THE BASICS
Overview of Security Classification System
Top Secret: Could be expected to cause
exceptionally grave damage to
national security
Secret: Could be expected to cause
serious damage
Confidential: Could be expected to cause
damage
CFR, Title 32 and DCID 6/1 require the use of
cover sheets
 Used to protect against unauthorized visual
access
 Warn the reader
 Remind the holder
MORE BASICS
Access = Eligibility + Need-to-Know
•
Each time you allow access to
classified material you should verify:
•
•
•
•
•
The intended recipient has a
security clearance equal to or
higher than the information to be
made available (eligibility), and
The recipient requires the
information to fulfill a specific task
or service essential to a classified
contract or program (need-toknow).
It is your responsibility as the
holder of the classified information
to determine the need-to-know.
Establishment of need-to-know is
essential. It is the responsibility of
the possessor of classified
information to ensure the proper
clearance and need-to-know of the
recipient.
The possessor must also advise
the recipient of the classification of
the information disclosed.
•
•
Need-to-know confirmation for
both internal employees and
visitors should come from a
security department advisor or
representative. If there is doubt as
to whether or not a person has a
need-to-know, check with the
proper authority prior to release of
any classified information. It is far
better to delay release to an
authorized person than to
disclose classified information to
one who is unauthorized.
A reminder – Unauthorized
disclosures of classified
information in the public domain
do not alter the classified status of
the information or automatically
result in declassification of the
information.
Classified information, whether or
not already posted on public
websites or disclosed to the
media, remains classified and
must be treated as such by DoD
employees and contractors until it
is declassified by an appropriate
original classification authority.
MORE BASICS
ORIGINAL/DERIVATIVE CLASSIFICATION
 Original Classification: An initial determination that
information needs protection in the interests of
national security
 Must have written authority to originally classify
information
 Derivative Classification: The process of determining
whether information that is to be included in a
document or material has been classified and, if it has,
ensuring that it is identified as classified information by
marking or similar means. Information is derivatively
classified whenever it is extracted, paraphrased,
restated, or generated in a new form. Application of
classification markings to a document or other
material as directed by a security classification guide
or other source material is derivative classification.
MORE BASICS
Marking Classified Information
New Marking Changes :
•
Executive Order (EO) 13526, Classified National Security Information,
dated December 2009, changed and added some marking requirements.
•
All portion markings must now be placed before the portion. This includes
subjects, titles, graphics, tables, charts, lists (e.g., bullets), statements,
sub-paragraphs.
•
The declassification date must be entered in one of these forms:
Month, day, and year (e.g, May 27, 2011) or
YYYYMMDD (20110527)
•
The establishment of a “Classified By” line.
•
When a document is derived from “Multiple Sources,” a listing of the
source materials used must be in or attached to each copy of each
derivatively classified document.
•
EO 13526 also updates the list of unauthorized markings and gives
additional guidance on determining declassification instructions for
derivatively classified documents.
MORE BASICS
MARKING CLASSIFIED INFORMATION
Paragraph / Portion Markings
SECRET
Overall Classification Marking
(U) This memo is for training purposes only
(U) This paragraph contains unclassified information
(S) This paragraph contains secret information relating to U.S. National Security
(U) This paragraph contains unclassified information
Classify By line or Derive From line
Classified By: Amanda Ray, Under Secretary for Economic Affairs
Reason: 1.4 (e) through (h)
Reason Line
Declassify on: 20151206
Declassification Date/Event
SECRET
Overall Classification Marking
MORE BASICS
MARKING CLASSIFIED INFORMATION
The following marking requirements apply to all classified documents and classified emails, briefings ,
memos, etc. The only exception is Working Papers which do not have to have all markings until
they are 180 days old for Secret and 30 days old for Top Secret.
•
All classified documents must have the overall classification of the document at the top and
bottom of each page. The overall classification will be the highest level of classified information in
the document. For example, if a document contains Confidential and Secret material, the overall
classification will be Secret.
•
If any of the information is special requirements material (NATO, RD, FRD, CNWDI), these
markings must also be at the top and bottom of each page along with the classification marking
(e.g., SECRET//RESTRICTED DATA).
•
Each portion in the document must be marked with the appropriate classification level (C), (S),
(TS) or with (U) if the information is unclassified. If the portion contains special requirements
information, the portion must reflect this also (e.g., (S//RD)).
•
The overall classification level and any special requirements markings must be on the back
cover/page.
•
The document will reflect a “Classified By,” “Derived From,” “Downgrade To” (if appropriate) and
“Declassify By.” These markings are usually on the front cover, title page or first page.
•
The NISPOM also requires that all classified material show the name and address of the
contractor responsible for its preparation and the date of preparation. This information is required
on the face of all classified documents.
MORE BASICS
MARKING CLASSIFIED INFORMATION
Working Papers:
•
•
•
The only time you can have a classified document, CD, or DVD that does
not have all the required classification markings is if the document, CD, or
DVD is a working paper. To be a working paper, the document, CD, or
DVD must be marked “Working Paper.” Recommend you use a Working
Paper cover sheet.
If the document, CD, or DVD is a Working Paper, it needs only the title,
the date it was created, the overall classification marking, and any special
handling markings until it reaches the 180-day* mark. After 180 days or if
the document, CD, or DVD leaves PIPS (whichever comes first), the
Working Paper must be completely marked just as you would a final
document – it must have the overall classification, any special handling
markings (NATO, RD, FRD, CNWDI), portion markings, and Classified
By, Derived From, and Declassify On statements. (*After 30-days for Top
Secret information.)
Recommend you portion-mark Working Papers as they are created and
use a derivative worksheet to keep track of the classified sources. The
worksheet will help you determine the proper declassification date when
many sources are used.
MORE BASICS
TRANSPORTATION OF CLASSIFIED INFORMATION




All classified material must have a
classified cover sheet and have
the overall classification marked
on the back of the document.
When carrying classified material,
double wrap the material and
address it for mailing.
If you transport classified
information, you are required to
carry a courier card. If you are
traveling on a commercial airliner
with classified information, you are
required to carry a courier card
and a courier letter. For more
information on the courier letter
process, contact your FSO.
Do not:
Leave the classified material
unattended
Work on the material in public
Go shopping or to bars with the
material
Take the material home with you
Give the material to unauthorized
persons
MORE BASICS
TRANSPORTATION OF CLASSIFIED INFORMATION
How does someone send and receive classified
material?
•
•
•
•
•
•
•
•
Outgoing classified material by mail or courier must go through
the FSO for proper wrapping and the creation of a receipt. You
must go through the FSO even when using a courier bag. They
will document where the classified material is going and prepare
a receipt.
Couriers must have a courier card and briefing.
Confidential and Secret can be mailed via U.S. Postal Service
Registered Mail or Express Mail and by Federal Express
You may send Top Secret by:
Courier
Defense Courier Service
Always use a STE/STU-III telephone for classified calls
The FSO must sign for and accept classified packages
MORE BASICS
Controlled Unclassified Information (CUI)
Executive Order 13556 November 4, 2010 establishes the CUI program.
The purpose is to standardize the way the Executive Branch handles
sensitive unclassified material.
CUI Regulations:
•
Executive Order 13556 November 4, 2010
•
CUI Office Notice 2011‐01: Initial Implementation
•
Guidance for Executive Order 13556
•
FIPS PUB 200: Minimum Security Requirements for Federal
•
Information and Information Systems
•
FIPS PUB 199: Standards for Security Categorization of
•
Federal Information and Information Systems
•
NIST Special Publication 800‐53: Information Security
•
NIST Special Publication 800‐60: Information Security
•
Army Regulation 25‐2: Information Assurance
•
SECNAV M‐5239.1: DON Information Assurance Program
•
OPNAVINST 5210.20: Navy Records Management
•
DHS MD 11042: Sensitive But Unclassified Information
•
DHS 4300A: Information Technology Security Program
MORE BASICS
Media Markings
More Basics
Items prohibited inside secure areas
Cell phones
Two-way pagers
Recording devices (audio/visual)
Recordable greeting cards
Personal computer equipment
PDA’s
Telephone Security
Commercial Phones: Do NOT discuss classified
Do NOT attempt to “talk around” classified
Be Alert to Classified discussions around you
Be Aware that your non-secure phone call can be monitored
E-mail Correspondence
Always apply discretion with information about programs,
contracts, proposals, employees and job responsibilities
when sending or responding to e-mail. Your responsibility
with email is the same as with any other type of
communication. Know the rules and if in doubt - ask!
THREAT AWARENESS AND DEFENSIVE SECURITY
People are our greatest asset however our national security can be
compromised greatly by the following threats:
Foreign Intelligence Service
Hackers
Disgruntled workers
Individuals engaging in Industrial Espionage
How do you recognize these new threats? They may
be reps at a trade show, foreign students doing research,
foreign moles placed in American companies, liaison
officers at their foreign embassies here…It is not always
easy to recognize the foreign threat.
Classic espionage cases still occur but we are seeing
economic espionage not based just on theft of
classified information but on theft of high
technology information (classified or not)
and other proprietary types of information.
Be aware, be alert and be informed.
Suspect contact whether in person, via
telephone, e-mail or social networking sites should be reported to your FSO.
THE THREATS
America’s role as the dominant political, economic, and
military force in the world make it the Number 1 target
for foreign espionage. It is not just intelligence sources
that are targeting us. Other sources of the threat to
classified and other protected information include:
•
•
•
•
•
•
•
•
•
Foreign or multinational corporations
Foreign government-sponsored educational and scientific
institutions
Freelance agents (some of whom are unemployed former
intelligence officers)
Computer hackers
Terrorist organizations
Revolutionary groups
Extremist ethnic/religious organizations
Drug syndicates
Organized crime
THE THREATS
SOCIAL ENGINEERING
•
•
•
•
•
•
PHISHING: A technique of fraudulently obtaining private information.
Typically the phisher sends an e-mail that appears to come from a
legitimate business – a bank, or credit card company – requesting
“verification” of information. The email usually contains a link to a
fraudulent web page and has a form requesting everything from a home
address to an ATM card’s PIN.
BAITING: An attacker leaves a malware infected floppy disk, DC ROM,
or USB flash drive in a location sure to be found (bathroom, elevator,
sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing
label, and simply wait for the victim to use the device.
IVR or PHONE PHISHING: Technique that uses a rogue Interactive
Voice Response system to recreate a legitimate-sounding copy of a bank
or other institutions.
PRETEXTING: Act of creating and using and invented scenario (the
pretext) to engage a targeted victim in a manner that increases the
chance the victim will divulge information or perform actions that would be
unlikely in ordinary circumstances.
QUID PRO QUO: Something for something - may offer gift for password
or other information
SPOOFING: Cracking ID’s of people having popular email ID’s such as
Yahoo!, GMail, Hotmail…or cracking websites of companies or
organizations to destroy reputation.
THREATS – Targeting
Based on Industry Reporting to the Defense Security Service (DSS)
from fiscal year 2012, collection efforts linked to East Asia and the
Pacific represented the most significant and prolific threat against
information and technology resident in cleared industry. Suspicious
incidents reported by cleared industry and connected to East Asia
and the Pacific increased by 88 percent over fiscal year 2011.
Requests originating in or assessed as affiliated with East Asia and
the Pacific accounted for half of all industry reporting DSS received
in fiscal year 2012, an increase from 43 percent the year before.
The Near East entities continue to be among the most active at
attempting to obtain illegal or unauthorized access to sensitive or
classified information and technology resident in the U.S. cleared
industrial base – second only to East Asia and the Pacific. Reported
attempts increased by over 40 percent from fiscal year 2011.
Industry needs to remain vigilant in reporting attempts to gain
information. The Defense Security Service relies on the support of
U.S. cleared contract employee reporting and the U.S. intelligence
and law enforcement communities. Report any suspicious
contacts immediately to your FSO.
THREATS – The Trends
Top Targeted Technologies for 2012*:
Information Systems
Electronics
Laser, Optics, & Sensors
Aeronautics
Materials & Processes
Space Systems
Positioning, Navigation, & Time
Marine Systems
Information Security
Processing & Manufacturing
* 2013 Targeting U.S. Technologies, A Trend Analysis of Cleared Industry Reporting
THREATS – Methods of Operation
Top Methods of Operation 2012*
Suspicious Network Activity
Attempted Acquisition of Technology
Academic Solicitation
Request for Information
Solicitation or Marketing Services
Foreign Visit
Seeking Employment
Exploitation of Relationships
Surveillance
Criminal Activities
Search/Seizure
* 2013 Targeting U.S. Technologies, A Trend Analysis of Cleared Industry Reporting
DEFENSIVE SECURITY
DEALING WITH THE THREAT
“Limiting details is an easily applied countermeasure
that can decrease vulnerabilities while still
conveying the essential information.” ~Secretary Rumsfeld
•
•
•
•
•
•
•
•
•
•
•
Be alert
Be aware of your surroundings
Report suspicious activity
Protect your badge/CAC
Avoid predictable routines
Don’t be a target
Report suspicious contacts whether in person, by phone, or via
email or text
Know the emergency procedures for the location where you
work
Be familiar with the security rules and requirements - and who to
contact when you have a question
Shred sensitive/personal information
Practice good OPSEC
IN THE NEWS…
Snowden damage the worst, says ex-CIA No. 2
The former No. 2 man at the CIA says Edward Snowden's leak of classified intelligence
documents caused more damage to U.S. security than any other in history. Former CIA
Deputy Director Michael Morell, who also says the acrimony in Congress could be bad for
national security, speaks to John Miller for a 60 Minutes report to be broadcast Sunday,
Oct. 27 at 7 p.m. ET/PT.
Snowden is no whistle-blower as some have portrayed him, says Morell, but a traitor of the
worst kind. "I think this is the most serious leak-- the most serious compromise of
classified information in the history of the U.S. intelligence community," he tells Miller.
Of the hundreds of documents Snowden leaked, none was more damaging than the classified
document the CIA calls the "Black Budget." It's like a playbook, says Morell, revealing
where the U.S. spends its money on its intelligence efforts. It would give adversaries an
advantage. "They could focus their counterintelligence efforts on those places where we're
being successful. And not have to worry as much about those places where we're not
being successful," says Morell.
Morell says the information Snowden has leaked will hamper U.S. efforts to track and learn
about terrorists, taking away an advantage and blunting the war on terror. "What Edward
Snowden did has put Americans at greater risk because terrorists learn from leaks and
they will be more careful, and we will not get the intelligence we would have gotten
otherwise."
The CIA gathers intelligence about countries and one of the aspects of a nation it studies is its
economy. Morell tells Miller he believes the partisan rancor in Congress is bad for national
security. "What really keeps me up at night is the inability of our government to make
decisions that will push this country forward," says Morell. "...Any country's national
security is more dependent on the strength of its economy and on the strength of its
society than anything else.
"There's been a change from a willingness of the two parties to work together to get things
done to today, the two parties at each other's throat and simply trying to score political
points," Morell says.
© 2013 CBS Interactive Inc. All Rights Reserved.
WHERE TO GO FOR HELP
Your Corporate Facility Security Officer:
Tania Leppert, tania.leppert@iifdata.com
703-637-5192
The security office at your work location
The Defense Security Service Hotline
1-800-424-9098, www.dodig.mil/hotline
WHO IS RESPONSIBLE FOR SECURITY?
THERE IS NO
SEC_RITY
WITHOUT U!!!