UNCLASSIFIED SCI Overview Seminar SCI Today DNI Special Security Center v. July 2007 UNCLASSIFIED UNCLASSIFIED Welcome and Objectives • Classification level • Seminar room/SCIF – No cell phones or other personal electronic devices – Only authorized classified discussion area • Seminar Objectives – Reinforce the fundamental security basic practices – Describe your responsibilities in security and in the protection SCI – Correlate our changing world to your responsibilities – Inform of changes in SCI and the security world UNCLASSIFIED -2- UNCLASSIFIED Your Seminar Host DNI Special Security Center • Established “To strengthen security in the Intelligence Community and wherever SCI and intelligence information is processed or held.” • Government and contractor personnel dedicated to: – Security policy creation and implementation – Security coordination and liaison – Security services UNCLASSIFIED -3- UNCLASSIFIED About You… • Your Organization • Your job responsibilities • Greatest security challenge • What do you hope to get from this session UNCLASSIFIED -4- UNCLASSIFIED Security Fundamentals A Refresher… UNCLASSIFIED -5- UNCLASSIFIED Personnel Security – You Must Report… • Changes in personal status – Marriage, separation, divorce, cohabitation Personnel Security • Personal problems – Drugs & alcohol –misuse, abuse – Finances • Legal involvements – Litigation, arrest, court summons, etc. • • • • Improper solicitations for information Foreign-based outside employment Adverse information about others Contact with media UNCLASSIFIED -6- UNCLASSIFIED Report Foreign Travel Personnel Security Report foreign travel in advance – Day trips to Mexico or Canada can be reported upon return • Pre-travel briefing may be required • Report unusual trip incidents UNCLASSIFIED -7- UNCLASSIFIED Report Foreign Contacts Personnel Security • Reportable – Close continuing relationship, business or personal, with a citizen, resident or representative of foreign country (this includes contact via internet; email, chatrooms) • Not reportable – Casual contacts at social gatherings unless • Foreign contact displays strong interest in employment • Is not satisfied with answers • Follow up contact is sought UNCLASSIFIED -8- UNCLASSIFIED Report Security Incidents Personnel Security • Violations – Involve loss, compromise, or suspected compromise of classified information and/or – Involve gross security carelessness • Infractions – When the rules have not been followed • Systemic weaknesses and anomalies • Internal, Disgruntled Employees: externalActivist Groups UNCLASSIFIED -9- UNCLASSIFIED Pre-publication Review Personnel Security • Any written material that contains or purports to contain SCI – Material may contain description of activities that produce or relate to SCI • Anything entering public domain must be approved – Speeches, articles, white papers, advertisements – Web pages, web sites • Internet is an unclassified communication system – Do not write “around” classified subjects UNCLASSIFIED - 10 - UNCLASSIFIED Unauthorized Disclosure Personnel Security • DCID 6/8 – Currently being re-written to reflect the Office of the Director of National Intelligence – Will be titled Intelligence Community Directive (ICD) 708 and 708.1 • Purpose – Emphasizes the responsibilities of the IC to protect intelligence information – Defines a process and establishes roles and responsibilities to deter, investigate and promptly report unauthorized disclosures, security violations, compromises of intelligence information – Ensures appropriate protective and corrective actions are taken UNCLASSIFIED - 11 - UNCLASSIFIED Unauthorized Disclosure (cont) • Policy Personnel Security – To guard against, investigate report and redress unauthorized disclosures and other security violations – Continuously emphasize security and counterintelligence awareness – Promptly notify ODNI of any security violation, unauthorized disclosure of other compromise – Notification requirement includes persons deliberately disclosing classified information to the media – “leaks” – Includes classified information accidentally or intentionally disclosed across computer systems – “spills” UNCLASSIFIED - 12 - UNCLASSIFIED What Should You Do? Personnel Security • Gather your facts • Report it immediately • Notify your immediate supervisor • Notify your security office UNCLASSIFIED - 13 - UNCLASSIFIED Physical Security Physical Security • Sensitive Compartmented Information Facility (SCIF) – Sole place for producing, processing, storing or discussing SCI • Only SCI approved persons are unescorted • Locked and alarmed when unattended • Classified talk stops at SCIF door UNCLASSIFIED - 14 - UNCLASSIFIED Information Systems Security Information Systems Security • Information systems security is a significant IC concern • Information sharing is a significant government initiative UNCLASSIFIED - 15 - UNCLASSIFIED Information Systems Security Critical to ISS • Configuration integrity critical for approved SCI systems • Media: declared and approved – “Once in the SCIF, always in the SCIF” – Security review prior to removal of any media or printed output UNCLASSIFIED - 16 - UNCLASSIFIED Password Protection Information Systems Security • Passwords build security integrity • Protection Techniques – Memorize passwords – Do not share them – Use a smart password - see your ISSO • Combination of a minimum of 8 numbers, letters, special characters and capitalization • Change every six months C!mePasu2 UNCLASSIFIED - 17 - UNCLASSIFIED Viruses Information Systems Security • Information Systems • Protection Techniques – Have ISSO scan incoming media – React to any virus suspicion • Notify ISSO or system administrator immediately UNCLASSIFIED - 18 - UNCLASSIFIED Telephone Communications Information Systems Security • Non-Secure (Open) Telephones – No talking around classified information – Ensure classified conversations cannot be picked up by open line • Secure – Lots of colors – Red, Grey, Green – STUIII/STE • Key to common level • Telephone protocol - confirm to whom you are talking UNCLASSIFIED - 19 - UNCLASSIFIED Information Systems Security Personal Electronic Devices • Electronic devices that can store, record and/or transmit digital text, digital image/video, or audio data. • May interact electrically or optically with other information systems in an accredited SCIF • Learn PED ground rules for the SCIFs you work in – See ISSO before introducing and PEDs into a SCIF UNCLASSIFIED - 20 - UNCLASSIFIED Information Systems Security Internet Discipline • The Internet is an unclassified communication system – Do not “write around” classified subjects • The U.S. Government has invested significantly in classified information systems for the purpose of performing classified work – Use them! UNCLASSIFIED - 21 - UNCLASSIFIED Classification Management Classification Management • Process for determining nature of information and assigning proper classification, markings, dissemination and declassification instructions • Required by EO 12958, as amended; Director of Central Intelligence Directives (DCIDs) – E.O. 12958 establishes 3 levels of classification • TOP SECRET: may cause exceptionally grave damage to national security • SECRET: may cause serious damage • CONFIDENTIAL: may cause damage UNCLASSIFIED - 22 - UNCLASSIFIED Classification Management National Security Information • Military plans, weapons systems or operations • Foreign government information • Intelligence activities (including special activities), intelligence sources and methods or cryptology • Foreign relations or diplomatic activities of the US, including confidential sources • Scientific, technological or economic matters relating to national security, which includes defense against transnational terrorism • Program for safeguarding nuclear materials or facilities • Vulnerabilities or capabilities of systems, installations, infrastructures, projects/plans relating to national security • Foreign Government Information and weapons of mass destruction UNCLASSIFIED - 23 - UNCLASSIFIED Spies, Lies and Myths UNCLASSIFIED UNCLASSIFIED - 24 - UNCLASSIFIED Espionage Since World War II • 151 persons convicted of espionage – 140 male/11 female – 100 government/51 non-government – Most held “Secret” clearances or above • Six million non-spies held clearances during the period • The latest case: Brian Regan UNCLASSIFIED - 25 - UNCLASSIFIED Brian Regan “If I commit esponage (sic) I will be putting my self and family at great risk. If I am caught I will be enprisioned (sic) for the rest of my life, if not executed for this deed.” • In a letter to Saddam Hussein, Brian Regan demanded $13 million in exchange for providing data such as detailed information about US reconnaissance satellites UNCLASSIFIED - 26 - UNCLASSIFIED Brian Regan Facts • USAF assignee to NRO (7/95 – 8/00) • Considered espionage in late 1998 to solve financial problems ($100,000+) • Began downloading from Intelink in 1999 • Removed 15,000 pages, CD-Roms and video tapes from NRO • Hired by TRW October 2000 • Brought back to NRO but monitored – Surfs Libya, Iraq and China on Intelink • Arrested/indicted/convicted (8/01 – 2/03) – (Attempted espionage and gathering national security information) UNCLASSIFIED - 27 - UNCLASSIFIED Brian Regan’s Behavior • The Telltale Indicators – Deeply in debt – Worked odd hours – Foreign national spouse – Late nights in copy room – Non-reporter of foreign travel – “Top Fifty” user of Intelink UNCLASSIFIED - 28 - UNCLASSIFIED Myths About Spies • Get rich • Are insane • Realize they are bad people • Consumed by guilt • Driven by excitement • Plan their final escape • Display deteriorating job performance • Show outwardly suspicious behavior • Caught by co-workers • Control their own destiny Source: www.fbi.gov and www.ncix.gov UNCLASSIFIED - 29 - UNCLASSIFIED Sensitive Compartmented Information (SCI) A special category of national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems UNCLASSIFIED UNCLASSIFIED National Security Information National Defense Information (military plans, weapons, OPS) •Collateral (C/S/TS) •SAPs Foreign Relations and Foreign Government Information •Collateral (C/S/TS) •SAPs Homeland Security Information (Infrastructure, national resources, vulnerabilities and capabilities) •Collateral (C/S/TS) •SAPs Scientific/Technological/ Economic Information •Collateral (C/S/TS) •SAPs Nuclear Information (program for protecting nuclear materials/ facilities) •Collateral (Q/L) •SAPs National Intelligence Information (terrorism, international threats, sources, methods) •Collateral (C/S/TS) •SAPs - SCI - Non-SCI Weapons of Mass Destruction (WMD) Information •Collateral (C/S/TS) •SAPs UNCLASSIFIED - 31 - UNCLASSIFIED National Security and SCI Protection Policies • National security policies – Come from National Security Council – In the name of President – As Executive Orders, Presidential or National Security Decision Directive • SCI protection policies – In name of DNI – as IC Directives (ICDs) formerly DCIDs – DNI SSC • Facilitated and coordinated rewrite of security series of ICDs UNCLASSIFIED Executive Orders; Presidential Decision Directives EO 12958 EO 12968 EO 12333 President George W. Bush DCID 6/3 DCID 6/4 DCID 6/9 DNI J. M. McConnell - 32 - UNCLASSIFIED How We Collect Intelligence • Open Source Intelligence (OSINT) • Geospatial Intelligence (GEOINT) • Human Intelligence (HUMINT) • Signals Intelligence (SIGINT) UNCLASSIFIED - 33 - UNCLASSIFIED Signals Intelligence (SIGINT) • Collecting verbal and nonverbal signals from land, sea and satellite • Protected within COMINT Control System managed by D/NSA • Categories: – Communications Intelligence (COMINT) – Electronic Intelligence (ELINT) – Foreign Instrumentation Signals Intelligence (FISINT) UNCLASSIFIED - 34 - UNCLASSIFIED COMINT (SI) Control System • Special access program designed to protect signals intelligence • Named for first product it afforded protection: – COMINT (Communications intelligence) • Also called – Special Intelligence Control System – SI Control System • Its information is only available to holders of SI access approval • Managed by D/NSA UNCLASSIFIED - 35 - UNCLASSIFIED COMINT (SI) Control System • The original SIGINT • Intercepted communications: – Telephone, email, fax, etc. • Still referred to as Special Intelligence or SI • Must protect – What was collected – How collection was accomplished – tactics, equipment – Intelligence implications – Degree of success – Plans and targets • Sharing with foreign partners UNCLASSIFIED - 36 - UNCLASSIFIED TALENT-KEYHOLE (TK) Control System • SAP established by DCI for products from satellite reconnaissance (1960) • To protect most sensitive details of satellite collection capabilities and derived information • Consistent with EO 12333 and EO 12958 directing DCI to develop programs to protect intelligence sources and methods and analytical procedures UNCLASSIFIED - 37 - UNCLASSIFIED TALENT-KEYHOLE (TK) Control System • Must protect – What’s being collected – Collection techniques – Intelligence implications – System effectiveness – Plans and targets – Operational information formerly known as “B” material – Operational, engineering and technical information UNCLASSIFIED - 38 - UNCLASSIFIED IC Program Managers Director, CIA National Clandestine Service HUMINT Control System Manual Open Source Intelligence (OSINT) Center Director, NSA/CSS SIGINT Program Signals Intelligence Security Regulations Director, DIA GDIP MASINT Program MASINT Policy Series Director, NRO National Reconnaissance Program RESERVE Control System Manual Executive Assistant Director, National Security Branch Counterterrorism Counterintelligence Director, NGA Geo-spatial Intelligence (GEOINT) Imagery Policy Series UNCLASSIFIED - 39 - UNCLASSIFIED A Changing World UNCLASSIFIED - 40 - UNCLASSIFIED The Day That Changed The World… September 11, 2001 The Pentagon World Trade Center Shanksville, PA UNCLASSIFIED - 41 - UNCLASSIFIED The Post 9/11 World “We will never be the same” • New threat matrix – Terrorism in forefront – Espionage still here • New Security perspectives – – – – From nation states to threatening groups Global view with moving targets Focus on foreign involvements and influences Hardening of facilities • Greater emphasis on information sharing – Analysis and risk management UNCLASSIFIED - 42 - UNCLASSIFIED Today’s Delicate Balance INFORMATION PROTECTION (NEED TO KNOW) VS. INFORMATION SHARING (Criteria for Access) UNCLASSIFIED - 43 - UNCLASSIFIED Global Warfare • Current state of affairs – The world's major intelligence agencies employ the latest technologies available in collection, communication and analysis of information from abroad – Counterintelligence agencies employ other technologies in efforts to identify and eliminate foreign spies at home Extracted from Spies in the Digital Age, H. Keith Melton UNCLASSIFIED - 44 - UNCLASSIFIED Global Warfare • Some important changes to come – The primary targets of spies for all intelligence services have shifted – The traditional roles of "friends and foes" continue to blur – New technologies are changing the traditional methods and techniques (called "tradecraft") by which spies operate – Traditional tradecraft of spies are applied in new ways Extracted from Spies in the Digital Age, H. Keith Melton UNCLASSIFIED - 45 - UNCLASSIFIED National Threats The single greatest threat to world peace in the early part of this century will be the utilization of weapons of mass destruction―nuclear, chemical, biological and digital―by fundamentalist terrorist organizations Extracted from Spies in the Digital Age, H. Keith Melton UNCLASSIFIED - 46 - UNCLASSIFIED National Threats • Terrorist organizations are already using Internet to: – Recruit and communicate members with similar fundamentalist beliefs – Coordinate terrorist activities with other aligned groups that share interests in a common outcome – Raise money through computer based cyber-crime – Attack national information infrastructures of hostile countries from thousands of miles away Extracted from Spies in the Digital Age, H. Keith Melton UNCLASSIFIED - 47 - UNCLASSIFIED The 911 Commission (2004) • Concluded we should: – Attack terrorist organizations – Curb growth of radical Islam – Prepare for and protect against terrorist attacks • Recommendations DONE – Create a National Counterterrorism Center (NCTC) – Unify IC under a DNI – Strengthen FBI and homeland defenders – Unify and strengthen Congressional oversight UNCLASSIFIED - 48 - UNCLASSIFIED Intelligence Reform Act of 2004 • Establishes a Senate-confirmed Director of National Intelligence (DNI) • Re-designates the National Foreign Intelligence Program (NFIP) as the National Intelligence Program (NIP) UNCLASSIFIED - 49 - UNCLASSIFIED Director of National Intelligence (DNI) • Intelligence Reform and Terrorism Prevention Act of 2004 – Title 1, Reform of the Intelligence Community – Section 1001, Subtitle A, Establishment of the Director of National Intelligence UNCLASSIFIED - 50 - UNCLASSIFIED DNI Roles in Security • Promote intelligence information sharing • Protect intelligence sources and methods • Promote uniform procedures for SCI • Join government-wide security clearance reform – Reciprocity of security clearances – Process for investigation and adjudication to be performed quickly UNCLASSIFIED - 51 - UNCLASSIFIED New Intelligence Community Independent Agency DoD Intelligence Elements Departmental Intelligence Elements UNCLASSIFIED - 52 - UNCLASSIFIED National Intelligence Strategy Protection of National Intelligence Objective 7 “Create clear, uniform security practices and rules that allow us to work together, protect our nation’s secrets, and enable aggressive counterintelligence activities.” • “Dramatically change the basis of IC security and counterintelligence policies in order to remain effective.” • Rigorously assess threat, vulnerability and protection requirements • Establish uniform and reciprocal guidance UNCLASSIFIED - 53 - UNCLASSIFIED Parting Words Presidential direction: “. . .take the strongest possible precautions against terrorism by bringing together the best information and intelligence. In the war on terror, knowledge is power.” Your part: you have an individual responsibility and role in protection of SCI assets UNCLASSIFIED - 54 - UNCLASSIFIED Director of National Intelligence Organization Charts UNCLASSIFIED UNCLASSIFIED - 55 - UNCLASSIFIED ODNI Civil Liberties Protection Officer Mr. Alexander W. Joel Inspector General Mr. Edward Maguire Director of National Intelligence Mr. J. M. McConnell Principal Deputy Director of National Intelligence LTG Ronald Burgess, Acting General Counsel Mr. Benjamin A. Powell Equal Employment Officer Mr. John M. Robinson ADNI & Acting Director of Intelligence Staff Mr. David R. Shedd ADNI & Chief Information Officer Maj. Gen. Dale W. Meyerrose, Ret. ADNI for Science & Technology Dr. Eric C. Haseltine NCIX Mr. Joel Brenner DDNI for Customer Outcomes “Want It” LTG Ronald Burgess, USA DDNI for Analysis “Know It” Dr. Thomas Fingar DDNI for Collection “Get It” Mrs. Mary Margaret Graham DDNI for Acquisitions “Build It” Ambassador Patrick F. Kennedy Iran Mission Manager Ms. S. Leslie Ireland NCPC Ambassador Kenneth C. Brill NCTC VADM J. Scott Redd, Ret. North Korea Mission Manager Ambassador Joseph DeTrani Cuba-Venezuela Mission Manager J. Patrick Maher, Acting UNCLASSIFIED - 56 - UNCLASSIFIED DNI Special Security Center (SSC) DDNI for Acquisitions Ambassador Patrick F. Kennedy ADDNI for Security Ambassador Eric J. Boswell Director, Special Security Center Mr. John P. Fitzpatrick Administrative Assistant Ms. Kathleen Guisti Legal Counsel Mr. Sandy Sagalkin Deputy Director, Special Security Center Ms. Gina Otto Deputy Director, Policy and Planning Mr. Rick Hohman Deputy Director, Community Services Mr. William F. O’Neill Deputy Director, Oversight and Liaison Mr. Glenn Stampler UNCLASSIFIED Executive Officer TBD Deputy Director, CAPCO Mr. Wayne Belk - 57 -