Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core 106 SECURITY Fleet Weather Center Norfolk 1 EIDWS Common Core 106 SECURITY • Objectives: – Discuss the directives that govern personnel security – Define and discuss the classification categories – Explain “need to know” – Identify the different types of security investigation – Indentify SAER – Define SSO and events that are reported to the SRO – Define and discuss a SCIF – Identify and discuss the various forms used in security procedures – Discuss safe combinations – Define the purpose of the DCS – Explain the various procedures for the transportation of classified material – Explain the TSCO – Define and discuss THREATCON and Force Protection – Explain RAM – Define EAP Fleet Weather Center Norfolk 2 EIDWS Common Core 106 SECURITY • Objectives (cont): – Explain EMD – Define SCI – Explain vault recertification and recurring inspections – Discuss access lists, 2 person integrity and documentations logs – Explain the DoD escort policy – Define and discuss COMSEC, INFOSEC, COMPUSEC, PSP and ATFP – Explain the purpose of the ICD system – Identify and discuss the SSO – Identify and discuss the CSM – Define and discuss JPAS – Define and discuss DONCAF – Define and discuss INFOCON and its levels – Discuss the procedures for magnetic and electronic media Fleet Weather Center Norfolk 3 EIDWS Common Core 106 SECURITY • References: • SECNAVINST M-5510.30 Series • DoD 5105.21-M-1 • http://www.archives.gov/isoo/security-forms/ • DoD 5200.33 Series • SECNAVINST M-5510.36 Series • OPNAVINST 3300.53 Series • EKMS 1A • ICPG 705.5 • ICPG 705.2 • ICD 2005-1 • http://www.navysecurity.navy.mil • SD 527-1 • Joint DoDIIS/Cryptologic SCI Information Systems Security Standards • DODI 8410.01 Series • NAVY FOREIGN DISCLOSURE MANUAL • SECNAVINST 3300.3 Series • SECNAVINST 5239.3 series • ACP-122E Fleet Weather Center Norfolk 4 EIDWS Common Core 106 SECURITY • Identify the directives that govern personnel security: – 1. DoD 5105.21-M-1 – 2. SECNAV M-5510-30 – 3. DCID 6/4 and 6/9 – 4. JOINTDODISS Fleet Weather Center Norfolk 5 EIDWS Common Core 106 SECURITY • Define the following classification categories, how they differ, and the color codes used to idenify each one : • a. TOP SECRET - Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Color Code is Orange. • b. SECRET- Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security. Color Code is Red. • c. CONFIDENTIAL –Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security. Color Code is Blue. • d. UNCLASSIFIED – Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause little to no damage to the national security. Color Code is Green. Fleet Weather Center Norfolk 6 EIDWS Common Core 106 SECURITY • Explain what is meant by „need to know‟: • Access to classified information is not authorized by the favorable conclusion of a clearance eligibility determination. Access is only permitted to eligible individuals after determining that the individual has a “need-to-know.” – a. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. – b. Need-to-know is one of two information points that must be determined by every authorized holder of classified information prior to relinquishing that classified information to a prospective recipient. • 1.) The authorized holder of classified information must determine that the intended recipient has security clearance eligibility established at (or above) the level of access required. • 2.) The authorized holder must determine that the prospective recipient needs-to-know that information in order to perform lawful and authorized government functions. • 3.) These determinations must be based on reliable information, obtained formally or informally, from chain of command supervisors, security managers, or other sources in a position to know the prospective recipients security clearance eligibility and/or duties and organizational functions in relation to the specified classified information intended for release. – c. Need-to-know is a preventative measure to identify and deter unauthorized access. • 1.) Knowledge, possession of, or access to classified information is not provided to any individual solely by virtue of the individual’s office, rank, or position. • 2.) Although access can only be authorized for individuals with established security clearance eligibility at or above the level of classified information required, having security clearance eligibility DOES NOT equate to need-to-know. – d. Classified discussions are prohibited in public areas; hallways, cafeterias, elevators, rest rooms or smoking areas because the discussion may be overheard by persons who do not have a need-to-know. (Individuals are obliged to report violations of the need-to-know principle to their security manager.) – e. Need-to-know requires a level of personal responsibility that is challenging, particularly since it conflicts with human nature and the desire to share information with co-workers and colleagues. It is therefore critical to frequently focus on need-to-know requirements during security education briefings and refresher training. Fleet Weather Center Norfolk 7 EIDWS Common Core 106 SECURITY • State the type of investigation and how often it is updated for access to the following classification levels: • a. Top Secret - The investigative basis for Top Secret clearance eligibility is a favorably completed SSBI, SSBI-PR or PPR. For those who have continuous assignment or access to Top Secret, critical sensitive positions, SCI, Presidential Support Activities, COSMIC Top Secret, LAA, PRP, IT-1 duties or SIOP-ESI, the SSBI must be updated every five years by a PR. • b. Secret/Confidential - The investigative basis for a Secret clearance eligibility is a favorably completed NACLC or ANACI. Clearance eligibility established based on ENTNAC's, NAC's or NACI's prior to NACLC or ANACI implementation remain valid. For a Secret Clearance, the investigation is updated every 10 and 15-years, respectively. • c. Confidential - The investigative basis for a Confidential clearance eligibility is a favorably completed NACLC or ANACI. Clearance eligibility established based on ENTNAC's, NAC's or NACI's prior to NACLC or ANACI implementation remain valid. For a Confidential clearance, the investigation is updated every 10 and 15-years, respectively. • d. SCI - The investigative requirement for access to SCI is a favorably adjudicated SSBI. A SSBI-PR is required to be submitted every five years. The requirements for SCI access are established under Director of National Intelligence (DNI) authority (reference (d) applies). When military personnel are ordered to billets requiring SCI access, the transfer orders will identify the requirement. The losing command's Security Manager/SSO must ensure the required investigative requests are submitted promptly prior to transfer. If an individual is indoctrinated for SCI access, the commanding officer may not administratively lower the individual's security clearance below the Top Secret level without approval of the DON CAF. Fleet Weather Center Norfolk 8 EIDWS Common Core 106 SECURITY • Idenitfy what a SAER is and its purpose: • Security Access Eligibility Report - Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance. Fleet Weather Center Norfolk 9 EIDWS Common Core 106 SECURITY • Identify the events that should be reported to the SSO: • The following events should be reported to the Special Security Officer (SSO): • 1. Involvement in activities or sympathetic association with persons which/who unlawfully practice or advocate the overflow or alteration of the United States Government by unconstitutional means. • 2. Foreign influence concerns/close personal association with foreign nationals, Foreign citizenships, or foreign monetary interests. • 3. Sexual behavior that is criminal or reflects a lack of judgment or discretion • 4. Unwillingness to comply with rules and regulations or to cooperate with security processing • 5. Change of Marital Status or Marriage/Cohabitation with a foreign national. Fleet Weather Center Norfolk 10 EIDWS Common Core 106 SECURITY • Identify who has overall authority of, and controls access to, a SCIF: • The Special Security Officer (SSO) will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO. Fleet Weather Center Norfolk 11 EIDWS Common Core 106 SECURITY • Identify the use of the following forms: • a. SF 700 – Security Container Information; this form contains vital information about the security container in which it is located. This information includes location, container number, lock serial number, and contact information if the container is found open and unattended. • b. SF 701 – Activity Security Checklist; this form is a checklist that is filled out at the end of each day to insure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered. • c. SF 702 – Security Container Check Sheet; this form provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information. • d. SF 703 – Top Secret Cover Sheet (Orange); this form is used as a cover sheet for Top Secret documents. • e. SF 153 – COMSEC Material Report; this form is not listed in the reference provided, however it can be found in the GSA Forms library: http://www.gsa.gov/portal/forms/download/468A17F7987B41AE85256D41004B4F0A – according to GSA, it is no longer in available for order through their archives; last revision was Sept 1988 • f. SF 312 – Classified Information Nondisclosure Agreement; this form provides is a contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information. By signing the SF-312, the cleared employee agrees never to disclose classified information to an unauthorized person. Fleet Weather Center Norfolk 12 EIDWS Common Core 106 SECURITY • State when safe combinations should be changed: • Combinations will be changed when one of the following occurs: • a. When first placed in use • b. When an individual knowing the combination no longer requires access unless other sufficient controls (e.g., security in-depth) exist to prevent access to the lock; • c. When subjected to compromise • d. When taken out of service. Built-in combination locks will then be reset to the standard combination 50-25-50; combination padlocks will be reset to the standard combination 10-20-30 Fleet Weather Center Norfolk 13 EIDWS Common Core 106 SECURITY • What is a FDO and state their responsibilites: • Foreign Disclosure Officer. • This individual will process all foreign visit requests to the command. The FDO is also responsible for any foreign disclosure of information to foreign nationals. Fleet Weather Center Norfolk 14 EIDWS Common Core 106 SECURITY • State the purpose of the DCS: • The Defense Courier Service (DCS) is a Joint Command and direct reporting unit (DRU) under the Commander in Chief United States Transportation Command (CINCTRANS). The DCS establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material. • The Defense Courier Service (DCS) is established under the United States Transportation Command (USTRANSCOM), and is a global courier network for the expeditious, cost-effective, and secure distribution of highly classified and sensitive material. Operational control of global courier activities is exercised through USTRANSCOM's Defense Courier Division (TCJ3-C). The division oversees and synchronizes activity of 18 courier stations worldwide to service over six thousand accounts. Major accounts include the White House, the Department of Defense, the State Department, other federal agencies, authorized government contractors, and allied nations. • The DCS directly supports the President, Unified and Specified COCOMs, joint military operations, the Joint Chiefs of Staff, National Security Agency, Central Intelligence Agency, U.S. allies, State Department, and other federal agencies. • -The DCS was formerly the Armed Forces Courier Service (ARFCOS) but was reorganized and renamed in 1985 after the Walker spy case. Fleet Weather Center Norfolk 15 EIDWS Common Core 106 SECURITY • Describe the procedures for preparing hard copy classified material for transportation via: • a. DCS - the following procedures must be followed: – 1. No item entering the DCS shall weigh over 300 pounds, or exceed dimensions 45 1/2" X 26" X 22", except those items for which the physical structure prohibits breakdown into smaller units. The minimum size of a "flat" (envelope) entered into the DCS shall meet the standard 8 1/2" X 11" in size; small boxes and/or packages shall have a minimum total dimension of 26"; e.g., girth (twice its width plus twice the height) added to the length. Requests for exception to weight or size restrictions shall be submitted to the servicing DCS station, in advance. – 2. Items shall be addressed with the standardized DCS two-line address; the Army/AirPost Office, the Fleet Post Office, and the street addresses shall not be used. – 3. Envelopes, labels, or tags with visible "postage and fees paid" indicia shall not be used. – 4. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. – 5. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper. – 6. Detailed information on wrappings, marking, and preparing material for movement is available from the servicing DCS station. – 7. Packaging Material • Generally, all packaging materials are permissible if they afford contents with concealment and protection, preclude physical and/or visual access, are sturdy, and pose no hazard to handlers. Use of metal strapping is specifically prohibited. For assistance and clarification, customers should contact their servicing DCS station. • U.S. Postal Service bags, pouches, or sacks shall not be used for DCS material. • DoS bags, pouches, or sacks shall not be used for non-DoS material, except in specific, previously coordinated situations. Fleet Weather Center Norfolk 16 EIDWS Common Core 106 SECURITY • Describe the procedures for preparing hard copy classified material for transportation via: • b. Handcarry - the following procedures must be followed: – 1. Prepare classified information for shipment by packaging and sealing it with tape which will retain the impression of any postal stamp, in ways that minimize risk of accidental exposure or undetected deliberate compromise. Classified information shall be packaged so that classified text is not in direct contact with the inner envelope or \container. – 2. Enclose classified information transported outside the command in two opaque, sealed covers (e.g., envelopes, wrappings, or containers) durable enough to conceal and protect it from inadvertent exposure or tampering. The following exceptions apply: • If the classified information is an internal component of a packageable item of equipment, the outside shell or body may be considered as the inner cover provided it does not reveal any classified information. • If the classified information is an inaccessible internal component of a bulky item of equipment, the outside or body of the item may be considered a sufficient cover provided observation does not reveal classified information. • If the classified information is an item of equipment that is not reasonably packageable and the shell or body is classified, it shall be concealed with an opaque covering that conceals all classified features. • Specialized shipping containers, including closed cargo transporters, may be considered the outer wrapping or cover when used. • Refer to the appropriate reference in paragraph 9-5 of SECNAV M-5510.36 preparation of special types of classified and controlled unclassified information for transmission or transportation. Fleet Weather Center Norfolk 17 EIDWS Common Core 106 SECURITY • State the responisbilites of the TSCO: • The commanding officer shall designate, in writing, a command TOP SECRET CONTROL OFFICER (TSCO) for commands handling Top Secret information. Top Secret Control Assistants (TSCA) may be assigned as needed (see paragraph 2-4.3 of SECNAV M-5510.36). The TSCO reports directly to the security manager or the security manager may serve concurrently as the TSCO. The TSCO shall: • a. Maintain a system of accountability (e.g., registry) to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information, less SCI and other special types of classified information. • b. Ensure that inventories of Top Secret information are conducted at least once annually, or more frequently when circumstances warrant (see chapter 7, paragraph 7-3 of SECNAV M-5510.36). As an exception, repositories, libraries, or activities that store large volumes of classified documents may limit their annual inventory to that which access has been given in the past 12 months, and 10 percent of the remaining inventory. Fleet Weather Center Norfolk 18 EIDWS Common Core 106 SECURITY • State the THREATCON recognition and Force Protection levels and discuss what each represents: – a. FPCON NORMAL describes a situation or no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, most likely civilian police forces. – b. FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted. – c. FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public. – d. FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. e. FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked. Fleet Weather Center Norfolk 19 EIDWS Common Core 106 SECURITY • Explain what a RAM is: • Random Antiterrorism Measures. – To maximize the effectiveness and deterrence value, RAM should be implemented without a set pattern, either in terms of the measure selected, time, place, or other variables. RAM, at a minimum, shall consist of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Random use of other physical security measures should be used to supplement FPCON measures. Fleet Weather Center Norfolk 20 EIDWS Common Core 106 SECURITY • Explain and state the purpose of an EAP: • An Emergency Action Plan (EAP) is utilized when anticipating natural disasters. All activities located within the U.S and its territories that hold classified COMSEC or CCI material will maintain an up-to-date, written Emergency Action Plan for the protection of COMSEC material appropriate for natural disasters likely to occur in their region of the country (e.g., hurricanes in the South, tornados and floods in the mid-West, wild fires in the West, etc.). In addition, all activities located within the U.S and its territories will have conducted an initial written risk assessment and must maintain an up-to-date copy of the risk determination document that assesses the potential for hostile actions against their facilities (such as terrorist attack, rioting, or civil uprising). Based on the sensitivity of the operations, or the facility, the cognizant security official will either certify that the review has determined no need for the Emergency Plan to consider hostile actions, or, if it is determined that a potential risk exists, develop EDPs for inclusion in their Emergency Plan. Fleet Weather Center Norfolk 21 EIDWS Common Core 106 SECURITY • Explain and state the purpose of Emergency Destruction Procedures: • An Emergency Destruction Procedures (EDP) is utilized when anticipating a hostile action. Planning for hostile actions must concentrate on procedures to safely evacuate or securely destroy the COMSEC material, to include providing for the proper type and a sufficient number of destruction devices to carry out emergency destruction. Planning for hostile action shall also include the necessary training for all individuals who might perform emergency destruction. By contrast, planning for natural disasters should be directed toward maintaining security control over the material until the situation stabilizes, taking into account the possible loss of normal physical security protection that might occur during and after a natural disaster. The operating routines for COMSEC facilities should be structured so as to minimize the number and complexity of actions that must be taken during emergencies to protect COMSEC material. – 1. Only the minimum amount of COMSEC material should be held at any one time; i.e., routine destruction should be conducted frequently and excess COMSEC material disposed of in accordance with department or agency directives. COMSEC requirements should be reviewed at least annually to validate need for material on hand. – 2. COMSEC material should be stored and inventoried in ways that will facilitate emergency evacuation or destruction. Fleet Weather Center Norfolk 22 EIDWS Common Core 106 SECURITY • State who can give the order to initiate Emergency Destruction: • The Commanding Officer/OIC or official responsible for safeguarding COMSEC material. Fleet Weather Center Norfolk 23 EIDWS Common Core 106 SECURITY • Explain how, and in what order, material is destroyed during Emergency Destruction: • Material will be identified for emergency destruction/removal following the general guidelines listed below: – 1. Priority One: All cryptographic equipment and documents – 2. Priority Two: All operational SCI codeword material which might divulge targets and successes, documents dealing with U.S. SCI activities and documents concerning compartmented projects and other sensitive intelligence materials and TOP SECRET collateral. – 3. Priority Three: Less sensitive administrative SCI material and collateral classified material not included above. Fleet Weather Center Norfolk 24 EIDWS Common Core 106 SECURITY • Define SCI: • Sensitive Compartmented Information - Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. Fleet Weather Center Norfolk 25 EIDWS Common Core 106 SECURITY • List the items prohibited in a SCIF and the security risks associated with them: • No devices that transmits, receives, records or stores data is authorized into a SCIF without prior approval (i.e CO or SSO or ISSM). Also, no photography in or around a SCIF without CO approval. The ISSM must approve ALL IT software prior to its use in a SCIF. Fleet Weather Center Norfolk 26 EIDWS Common Core 106 SECURITY • Define the difference between a security violation and a practice dangerous to security: • Fleet Weather Center Norfolk 27 EIDWS Common Core 106 SECURITY • Explain the secuirty requirements for the following: Fleet Weather Center Norfolk 28 EIDWS Common Core 106 SECURITY • Explain vault recertification and recurring inspections: • The container or vault door must be inspected and recertified by a person specifically trained and authorized by the GSA before it can be used to protect classified material. Upon completion of the inspection, a “GSA Approved Recertified Security Container” label will be applied and the container/vault door is then considered authorized for storage/protection of classified material. If the container fails inspection, it must be repaired in accordance with Federal Standard 809, “Federal Standard Neutralization and Repair of GSA-Approved Security containers,” before the recertification label can be applied. Fleet Weather Center Norfolk 29 EIDWS Common Core 106 SECURITY • Discuss the need for access lists, required documenation logs, and two-person integrity: • Access Lists are lists that specify who or what is allowed to access the object or place of interest. This applies to personnel who do not have to sign in when they enter a space. Per NCTAMSLANTINST 5510.1C, Access Lists must always be kept up to date and posted in the applicable space. Visitors who are not part of the command are required to sign the visitor’s log in the specific space that they are visiting. Fleet Weather Center Norfolk 30 EIDWS Common Core 106 SECURITY • Explain the DoD escort policy: • If an escort is required for the visitor, a military, civilian or a cleared contractor assigned to the command being visited may be assigned escort duties. • As a matter of convenience and courtesy, flag officers, general officers and their civilian equivalents are not required to sign visitor records or display identification badges when being escorted as visitors. Identification of these senior visitors by escorts will normally be sufficient. The escort should be present at all times to avoid challenge and embarrassment and to ensure that necessary security controls are met. If the visitor is not being escorted, all normal security procedures will apply. Fleet Weather Center Norfolk 31 EIDWS Common Core 106 SECURITY • Discuss the procedures for sanitizing an area: • The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. Properly sanitized media may be subsequently declassified upon observing the organization’s respective verification and review procedures Fleet Weather Center Norfolk 32 EIDWS Common Core 106 SECURITY • Discuss each of the following, giving their definition and the purpose of each: • a. COMSEC - Communications Security (COMSEC) material is that material used to protect U.S. Government transmissions, communications, and the processing of classified or sensitive unclassified information related to national security from unauthorized persons and that material used to ensure the authenticity of such communications. – The protection of vital and sensitive information moving over government communications systems is crucial to the effective conduct of the government and specifically to the planning and execution of military operations. To this end, a system has been established to distribute, control, and safeguard COMSEC material. This system, which consists of production facilities, COMSEC Central Offices of Records (CORs), distribution facilities (i.e., depots), and EKMS accounts, is known collectively as the CMCS. The CMCS, as currently established, will continue to function until such time as the Electronic Key Management System (EKMS) is fully implemented. – COMSEC material is managed in EKMS/COMSEC accounts throughout the federal government to include departments and civil agencies as well as the civilian sector supporting the federal government. • b. INFOSEC – (covered later in this training) • c. COMPUSEC - Computer Security (COMPUSEC) is the protection of computing systems against threats to confidentiality, integrity, availability, and accountability. It must address the threats to electronic transactions and files. The context of computer security is always changing, due to rapidly changing technology, decentralization, networking, privacy issues, and the potential for fraud and abuse. • d. PSP - The objective of the Personnel Security Program (PSP) is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements. • e. ATFP - Fleet Weather Center Norfolk • 33 EIDWS Common Core 106 SECURITY • State the purpose of the ICD systems: • Intelligence Community Directive. The Director of National Intelligence (DNI) established Intelligence Community Directives (ICDs) as the principal means by which the DNI provides guidance, policy, and direction to the Intelligence Community. Fleet Weather Center Norfolk 34 EIDWS Common Core 106 SECURITY • Idenitfy SSO Navy: • The Director, Security and Corporate Services (ONI-05) as Special Security Officer for the DON (SSO Navy) has been designated as the Cognizant Security Authority (CSA). As CSA, SSO Navy is responsible for implementing SCI security policy and procedures and performs management and oversight of the Department’s SCI security program. Fleet Weather Center Norfolk 35 EIDWS Common Core 106 SECURITY • List the duties and responsibilites of the SSO: • Commands in the DON accredited for and authorized to receive, process and store SCI will designate a Special Security Officer (SSO). The SSO is the principal advisor on the SCI security program in the command and is responsible to the commanding officer for the management and administration of the program. SCI security program responsibilities are detailed in reference (d). The SSO will be afforded direct access to the commanding officer to ensure effective management of the command's SCI security program. The SSO will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO. – a. The SSO and a subordinate SSO will be appointed, in writing, and each will be a U.S. citizen and either a commissioned officer or a civilian employee GS-9 or above, and must meet Director, Central Intelligence Directive (DCID) 6/4, "Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI)" (NOTAL)standards. The same grade limitations apply to assistant SSOs. The security manager cannot function as the SSO unless authorized by the Director, ONI or Commander, NETWARCOM (IOD). – b. Although the SSO administers the SCI program independent of the security manager, the security manager must account for all clearance and access determinations made on members of the command. There is great need for cooperation and coordination between the SSO and security manager, especially for personnel security matters. For individuals who are SCI eligible, the security manager and the SSO must keep one another advised of any changes in status regarding clearance and access and of information developed that may affect eligibility. The security manager and SSO must also advise each other of changes in SCI and command security program policies and procedures as they may impact on the overall command security posture. Fleet Weather Center Norfolk 36 EIDWS Common Core 106 SECURITY • Idenitfy who can be a CSM: • The command security manager may be assigned full-time, part-time or as a collateral duty and must be an officer or a civilian employee, GS-11 or above, with sufficient authority and staff to manage the program for the command. The security manager must be a U.S. citizen and have been the subject of a favorably adjudicated Single Scope Background Investigation (SSBI) completed within five years prior to assignment. • The security manager shall be identified by name on command organizational charts, telephone listings, rosters, or other media. Reference (c) recommends that the security manager report to the commanding officer on functional security matters and to the executive officer for administration of the ISP Fleet Weather Center Norfolk 37 EIDWS Common Core 106 SECURITY • State the duties and responsibilites of a CSM: • The security manager is responsible for implementing the ISP and shall have direct access to the commanding officer. Some tasks may be assigned to a number of command personnel and may even be assigned to persons senior to the security manager. Nevertheless, the security manager shall remain cognizant of all command information, personnel, and industrial security functions and ensure that the security program is coordinated and inclusive of all requirements in this policy manual. The security manager shall: – a. Serve as the principal advisor and representative to the commanding officer in matters pertaining to the classification, safeguarding, transmission, and destruction of classified information. – b. Develop a written command security instruction (see exhibit 2A in SECNAV M-5510.36), to include provisions for safeguarding classified information during military operations or emergency situations. – c. Ensure that personnel in the command who perform security duties are kept abreast of changes in policies and procedures, and provide assistance in problem solving. – d. Formulate, coordinate, and conduct the command security education program. – e. Ensure that threats to security and other security violations are reported, recorded, and when necessary investigated. Ensure that incidents described in chapter 12 of SECNAV M-5510.36 are immediately referred to the nearest NCIS office. – f. Ensure that all security violations or incidents involving the possible compromise of classified information, to include those involving information technology (IT) systems, are investigated and reported in accordance with chapter 12 of SECNAV M-5510.36. Coordinate after-incident responses involving classified information processed on IT systems with the command Information Assurance Manager (IAM). Fleet Weather Center Norfolk 38 EIDWS Common Core 106 SECURITY • State the duties and responsibilites of a CSM (cont): – g. Coordinate the preparation and maintenance of security classification guides under the command's cognizance. – h. Maintain liaison with the command Public Affairs Officer (PAO) to ensure that proposed press releases and information intended for public release are subjected to a security review (see chapter 8 of SECNAV M-5510.36). – i. Coordinate with other command officials regarding security measures for the classification, safeguarding, transmission and destruction of classified information. – j. Develop security measures and procedures regarding visitors who require access to classified information. – k. Ensure that classified information is secured and controlled areas are sanitized when a visitor is not authorized access. – l. Implement and interpret, as needed, regulations governing the disclosure of classified information to foreign governments. – m. Ensure compliance with the requirements of SECNAV M-5510.36 when access to classified information is provided at the command to cleared contractors in connection with a classified contract. – n. Ensure that access to classified information is limited to appropriately cleared personnel with a need-to-know per reference (b) of SECNAV M-5510.36. Fleet Weather Center Norfolk 39 EIDWS Common Core 106 SECURITY • Explain and state the purpose of JPAS: • The Joint Personnel Adjudication System (JPAS) is a DoD system that uses NIPRNET to connect all DoD security personnel around the world with their Central Adjudication Facility (CAF). The JPAS web site runs on a secured port with secured socket layer (SSL) 128-bit encryption. • JPAS is the Department of Defense (DoD) personnel security clearance and access database. It facilitates personnel security program management for the Department of Defense Central Adjudication Facilities, for DoD security managers, and Sensitive Compartment Information (SCI) program managers. • JPAS interfaces with the Defense Security Service (DSS) and the Office of Personnel Management (OPM) to populate personnel security investigation data and the personnel systems, Defense Enrollment Eligibility Reporting System (DEERS) and Defense Civilian Personnel Data System (DCPDS), to populate identifying data. • JPAS is the system of record for personnel security adjudication, clearance and verification and history. Fleet Weather Center Norfolk 40 EIDWS Common Core 106 SECURITY • Explain and state the purpose of JPAS (cont): • JPAS has two applications. The Joint Adjudication Management System (JAMS) and the Joint Clearance and Access Verification System (JCAVS). – 1. JAMS is the application which supports central adjudication facilities personnel and provides capabilities and data such as case management/ distribution, adjudication history, due process history, revocations and denial action information, and will have the ability to electronically access personnel security investigative reports from either the DSS or the OPM. JCAVS is the application which supports command security personnel and provides capabilities and data such as local access record capabilities, debriefings, incident file reports and eligibility data, SAP access information and security management reports. – 2. Department of the Navy (DON) commands are required to use JCAVS exclusively to record all access determinations which includes temporary access, upgrades, downgrades, and suspensions. Commands must document interim security clearance determinations, execution of Nondisclosure Agreements (SF-189, SF-189A or SF-312), and personal attestations and use JCAVS to submit continuous evaluation reports, pass visit requests, determine security clearance and Sensitive Compartmented Information (SCI) access eligibility, determine status of requested personnel security investigation (PSI), record PSI submission dates and request DON CAF determinations, record all access determinations, JCAVS users will be responsible for changes to an individual’s access within the JCAVS. The minimum investigative standards required for access to JCAVS can be found in chapter 3-1. The minimum security clearance eligibility for access to JCAVS can be found in chapter 3-1. Data will be permanently retained within JPAS but it will not always be displayed. Data pertaining to individuals that retire or separate from the DON will be visibly retained for 24 months. However, if no action occurs on the individual record for twenty-four months, the record will be purged from display and archived. General Officer and Senior Executive Service employee data will be visibly retained indefinitely. Fleet Weather Center Norfolk 41 EIDWS Common Core 106 SECURITY • Explain and state the responsibilites of DONCAF: • The Department of the Navy Central Adjudication Facility (DONCAF), is a Naval Criminal Investigative Service (NCIS) organization, and is responsible for determining who within the Department of the Navy is eligible to hold a security clearance, to have access to Sensitive Compartmented Information (SCI), or to be assigned to sensitive duties. The aggregate body of DON personnel consists of Active Duty and Reserve components of the United States Navy and Marine Corps, as well as civilians and contractors. In addition, DONCAF makes SCI eligibility determinations for select contractor personnel. Collateral clearance determinations for contractor personnel are established by DISCO (Defense Industrial Service Clearance Office). • DONCAF also maintains an extensive database of its security decisions and provides overall operational support to the Navy’s personnel security program. • Adjudication is the review and consideration of all available information to ensure an individual’s loyalty, reliability, and trustworthiness are such that entrusting an individual with national security information or assigning an individual to sensitive duties is clearly in the best interest of national security. Our mission is to provide excellent customer service, accurate and timely adjudication, and implement innovative strategies for the DON Personnel Security Program. Fleet Weather Center Norfolk 42 EIDWS Common Core 106 SECURITY • Discuss how long a CO can administratively suspend access before DONCAF revokes a clearance: • SCI access suspension is a temporary measure designed to safeguard sensitive classified information or facilities. Suspension of SCI access will not exceed 90 days without the express consent of the SOIC or designee. Forward follow-up and final reports of investigation to the cognizant SOIC(Senior Official of the Intelligence Community) CAF (Central Adjudication Facility). Fleet Weather Center Norfolk 43 EIDWS Common Core 106 SECURITY • State the levels of INFOCON and what each signifies: • The Information Operations Condition (INFOCON) system provides a framework within which the Commander USSTRATCOM (CDRUSSTRATCOM), regional commanders, service chiefs, base/post/camp/station/vessel commanders, or agency directors can increase the measurable readiness of their networks to match operational priorities. • The INFOCONs mirror Defense Conditions (DEFCON) defined in CJCSM 3402.1B, (S) Alert System of the Chairman of the Joint Chiefs of Staff (U), and are a uniform system of five progressive readiness conditions - INFOCON 5, INFOCON 4, INFOCON 3, INFOCON 2, and INFOCON 1. (There is no direct correlation between INFOCON and DEFCON levels, though commanders should consider changes in INFOCON when DEFCON changes.) • INFOCON 5 is normal readiness and INFOCON 1 is maximum readiness. Each level represents an increasing level of network readiness based on tradeoffs in resource balancing (e.g., downtime versus level of assured confidence regarding malicious activity) that every commander must make. The INFOCONs are supplemented by Tailored Readiness Options (TRO), which are applied in order to respond to specific intrusion characteristics or activities, directed by CDRUSSTRATCOM or commanders. • INFOCON procedures focus on proactively establishing and re-establishing a secure baseline based on a periodic, operational rhythm. This cycle varies, based on perceived operational needs, from bringing systems back to a secure baseline every 180 days at INFOCON 5, to restoring that secure baseline every 15 days at INFOCON 1. • The definitions of each INFOCON are as follows: – – – – – INFOCON 5 - Normal Readiness Procedures INFOCON 4 - Increased Military Vigilance Procedures INFOCON 3 - Enhanced Readiness Procedures INFOCON 2 - Greater Readiness Procedures INFOCON 1 - Maximum Readiness Procedures Fleet Weather Center Norfolk 44 EIDWS Common Core 106 SECURITY • Discuss the secuirty rules and procedures for magnetic and electronic media: • a. Magnetic Media - For clarification, Magnetic storage media is considered to be any component of a system which, by design, is capable of retaining information without power. • The procedures contained below meet the minimum security requirements for the clearing, sanitizing, releasing, and disposal of magnetic media as well as guidance for other types of information storage media. These procedures will be followed when it becomes necessary to release magnetic media, regardless of classification, from Sensitive Compartmented Information (SCI) channels. Media that has ever contained SCI, other intelligence information, or Restricted Data cannot be sanitized by overwriting; such media must be degaussed before release. • Review of Terms. To better understand the procedures contained herein, it should be understood that overwriting, clearing, purging, degaussing, and sanitizing are not synonymous with declassification. The following are definitions: – 1. Clearing. Clearing is the process of removing information from a system or the media to facilitate continued use and to preclude the AIS system from recovering previously stored data. In general, laboratory techniques allow the retrieval of information that has been cleared, but normal operations do not allow such retrieval. Clearing can be accomplished by overwriting or degaussing. – 2. Sanitizing (Also Purging). Sanitizing is the process of removing information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. In general, laboratory techniques cannot retrieve data that has been sanitized/purged. Sanitizing may be accomplished by degaussing. – 3. Destruction. Destruction is the process of physically damaging media so that it is not usable and there is no known method of retrieving the data. – 4. Declassification. Declassification is an administrative process used to determine whether media no longer requires protection as classified information. The procedures for declassifying media require Designated Approving Authority (DAA) Representative (Rep) or Service Certifying Organization (SCO) approval. Fleet Weather Center Norfolk 45 EIDWS Common Core 106 SECURITY • Discuss the secuirty rules and procedures for magnetic and electronic media (cont): • b. Electronic Media - A portable electronic device is a generic term used to describe the myriad of small electronic items that are widely available. The rapid growth in technological capabilities of portable electronic devices/portable computing devices (PEDs/PCDs) has led to concerns about their portability into and out of Sensitive Compartmented Information Facilities (SCIFs). PEDs include cellular telephones, two way pagers, palm sized computing devices, two-way radios, audio/video/data recording, playback features, personal digital assistants, palm tops, laptops, notebooks, data diaries, and watches with communications software and synchronization hardware, that may be used to telecommunicate. These devices must be closely monitored to ensure effective control and protection of all information on our IS. • The use of PEDs in a SCI environment presents a high degree of risk for the compromise of classified or sensitive information. PEDs will only be used to fulfill mission requirements. Additionally, very specific handling procedures must be developed and made available to the user of the PED. The Agency in charge of any given SCIF is the authority for the procedures to move PEDs in or out of their facilities. Specific requirements/procedures are: • All of the following requirements must be satisfied prior to approving the use of portable electronic devices: – 1. Personal PEDs • Personal PEDs, hardware/software associated with them, and media are prohibited from entering/exiting a SCIF unless authorized by the Agency granting SCIF accreditation. • Personal PEDs are prohibited from operating within a SCIF unless authorized by the agency granting SCIF accreditation. If approved, the owner of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. • Connection of a Personal PED to any IS within a SCIF is prohibited. • PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. Fleet Weather Center Norfolk 46 EIDWS Common Core 106 SECURITY • Discuss the secuirty rules and procedures for magnetic and electronic media (cont): – 2. Government Owned PEDs • Government PEDs, hardware/software associated with them, and media must be controlled when entering/exiting a SCIF. • Government PEDs are prohibited from operating within a SCIF unless authorized and accredited by the agency granting the SCIF accreditation. As part of the accreditation requirements, the user of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. • Connection of a Government PED to any IS within a SCIF must be approved by the ISSM in writing. • PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. • Specified PEDs (i.e. Laptop Computers) may be used to process classified information. In addition, these PEDs may be granted approval to connect to ISs on a case-by-case basis in writing by the ISSM. Specified PEDs approved to process classified information must meet minimum technical security requirements. • If approved, the PED and associated media must be transported and stored in a manner that affords security sufficient to preclude compromise of information, sabotage, theft, or tampering. Procedures for handling the PED in a SCIF must be available and provided to the user. Fleet Weather Center Norfolk 47 EIDWS Common Core 106 SECURITY • Explain why the U.S. Navy only uses “.mil” email addresses on government systems: • In the Domain Name System (DNS) naming of computers, there is a hierarchy of names. There is a set of “top-level domain names” (TLDs). These are the generic TLDs and the two letter country codes from International Organization for Standardization (ISO) Standard Number 3166 (Reference (e) of DoD Instruction 8410.01). The Internet Assigned Numbers Authority (IANA) provides a list of the generic TLDs that presently includes twenty domains and descriptions. – A hierarchy of names usually exists under each TLD. For example, .MIL is a TLD, .OSD.MIL is a Second Level Domain (SLD) and TRICARE.OSD.MIL is a Third Level Domain (not usually referred to with an acronym). – Each of the generic TLDs was created for a general category of organizations. The country code domains (e.g., FR, NL, KR, US) are each organized by an administrator for that country. – All generic TLDs are international in nature, with the exception of two (.MIL and .GOV) that are restricted to use by entities in the United States. Descriptions for each follow: • a.) .GOV – Agencies of the U.S. Federal government have exclusive use of this domain. State and local agencies use the .US country domain. (See paragraph 4.h. of DoD Instruction 8410.01) DoD Components do not generally qualify for use of this domain. • b.) .MIL – The U.S. Department of Defense has exclusive use of this domain. Fleet Weather Center Norfolk 48 EIDWS Common Core 106 SECURITY QUESTIONS? Fleet Weather Center Norfolk 49