UNCLASSIFIED

advertisement
UNCLASSIFIED
SCI Overview Seminar
SCI Today
DNI Special Security Center
v. July 2007
UNCLASSIFIED
UNCLASSIFIED
Welcome and Objectives
• Classification level
• Seminar room/SCIF
– No cell phones or other personal electronic devices
– Only authorized classified discussion area
• Seminar Objectives
– Reinforce the fundamental security basic practices
– Describe your responsibilities in security and in the
protection SCI
– Correlate our changing world to your responsibilities
– Inform of changes in SCI and the security world
UNCLASSIFIED
-2-
UNCLASSIFIED
Your Seminar Host
DNI Special Security Center
• Established “To strengthen security in the
Intelligence Community and wherever SCI and
intelligence information is processed or held.”
• Government and contractor personnel
dedicated to:
– Security policy creation and implementation
– Security coordination and liaison
– Security services
UNCLASSIFIED
-3-
UNCLASSIFIED
About You…
• Your Organization
• Your job responsibilities
• Greatest security challenge
• What do you hope to get from
this session
UNCLASSIFIED
-4-
UNCLASSIFIED
Security Fundamentals
A Refresher…
UNCLASSIFIED
-5-
UNCLASSIFIED
Personnel Security – You Must Report…
• Changes in personal status
– Marriage, separation, divorce, cohabitation
Personnel Security
• Personal problems
– Drugs & alcohol –misuse, abuse
– Finances
• Legal involvements
– Litigation, arrest, court summons, etc.
•
•
•
•
Improper solicitations for information
Foreign-based outside employment
Adverse information about others
Contact with media
UNCLASSIFIED
-6-
UNCLASSIFIED
Report Foreign Travel
Personnel Security
Report foreign travel in advance
– Day trips to Mexico or Canada can
be reported upon return
• Pre-travel briefing may be
required
• Report unusual trip incidents
UNCLASSIFIED
-7-
UNCLASSIFIED
Report Foreign Contacts
Personnel Security
• Reportable
– Close continuing relationship, business or personal, with
a citizen, resident or representative of foreign country
(this includes contact via internet; email, chatrooms)
• Not reportable
– Casual contacts at social gatherings unless
• Foreign contact displays strong interest in
employment
• Is not satisfied with answers
• Follow up contact is sought
UNCLASSIFIED
-8-
UNCLASSIFIED
Report Security Incidents
Personnel Security
• Violations
– Involve loss, compromise, or suspected compromise
of classified information
and/or
– Involve gross security carelessness
• Infractions
– When the rules have not been followed
• Systemic weaknesses and anomalies
• Internal, Disgruntled Employees: externalActivist Groups
UNCLASSIFIED
-9-
UNCLASSIFIED
Pre-publication Review
Personnel Security
• Any written material that contains or purports
to contain SCI
– Material may contain description of activities that
produce or relate to SCI
• Anything entering public domain must be
approved
– Speeches, articles, white papers, advertisements
– Web pages, web sites
• Internet is an unclassified communication
system
– Do not write “around” classified subjects
UNCLASSIFIED
- 10 -
UNCLASSIFIED
Unauthorized Disclosure
Personnel Security
• DCID 6/8
– Currently being re-written to reflect the Office of the Director of
National Intelligence
– Will be titled Intelligence Community Directive (ICD) 708 and
708.1
• Purpose
– Emphasizes the responsibilities of the IC to protect intelligence
information
– Defines a process and establishes roles and responsibilities to
deter, investigate and promptly report unauthorized
disclosures, security violations, compromises of intelligence
information
– Ensures appropriate protective and corrective actions are
taken
UNCLASSIFIED
- 11 -
UNCLASSIFIED
Unauthorized Disclosure (cont)
• Policy
Personnel Security
– To guard against, investigate report and redress
unauthorized disclosures and other security violations
– Continuously emphasize security and counterintelligence
awareness
– Promptly notify ODNI of any security violation,
unauthorized disclosure of other compromise
– Notification requirement includes persons deliberately
disclosing classified information to the media – “leaks”
– Includes classified information accidentally or
intentionally disclosed across computer systems – “spills”
UNCLASSIFIED
- 12 -
UNCLASSIFIED
What Should You Do?
Personnel Security
• Gather your facts
• Report it immediately
• Notify your immediate supervisor
• Notify your security office
UNCLASSIFIED
- 13 -
UNCLASSIFIED
Physical Security
Physical Security
• Sensitive Compartmented Information
Facility (SCIF)
– Sole place for producing, processing, storing or
discussing SCI
• Only SCI approved persons are unescorted
• Locked and alarmed when unattended
• Classified talk stops at SCIF door
UNCLASSIFIED
- 14 -
UNCLASSIFIED
Information Systems Security
Information Systems Security
• Information systems security is a significant IC concern
• Information sharing is a significant government initiative
UNCLASSIFIED
- 15 -
UNCLASSIFIED
Information Systems Security
Critical to ISS
• Configuration integrity critical for
approved SCI systems
• Media: declared and approved
– “Once in the SCIF, always in the SCIF”
– Security review prior to removal of any media or
printed output
UNCLASSIFIED
- 16 -
UNCLASSIFIED
Password Protection
Information Systems Security
• Passwords build security integrity
• Protection Techniques
– Memorize passwords
– Do not share them
– Use a smart password - see your ISSO
• Combination of a minimum of 8 numbers,
letters, special characters and capitalization
• Change every six months
C!mePasu2
UNCLASSIFIED
- 17 -
UNCLASSIFIED
Viruses
Information Systems Security
• Information Systems
• Protection Techniques
– Have ISSO scan incoming media
– React to any virus suspicion
• Notify ISSO or system administrator
immediately
UNCLASSIFIED
- 18 -
UNCLASSIFIED
Telephone Communications
Information Systems Security
• Non-Secure (Open) Telephones
– No talking around classified information
– Ensure classified conversations cannot be
picked up by open line
• Secure
– Lots of colors – Red, Grey, Green
– STUIII/STE
• Key to common level
• Telephone protocol - confirm to whom
you are talking
UNCLASSIFIED
- 19 -
UNCLASSIFIED
Information Systems Security
Personal Electronic Devices
• Electronic devices that can store, record and/or
transmit digital text, digital image/video, or audio
data.
• May interact electrically or optically with other
information systems in an accredited SCIF
• Learn PED ground rules for the SCIFs you work in
– See ISSO before introducing and PEDs into a SCIF
UNCLASSIFIED
- 20 -
UNCLASSIFIED
Information Systems Security
Internet Discipline
• The Internet is an unclassified communication
system
– Do not “write around” classified subjects
• The U.S. Government has invested significantly
in classified information systems for the
purpose of performing classified work
– Use them!
UNCLASSIFIED
- 21 -
UNCLASSIFIED
Classification Management
Classification Management
• Process for determining nature of information
and assigning proper classification, markings,
dissemination and declassification instructions
• Required by EO 12958, as amended; Director of
Central Intelligence Directives (DCIDs)
– E.O. 12958 establishes 3 levels of classification
• TOP SECRET: may cause exceptionally grave
damage to national security
• SECRET: may cause serious damage
• CONFIDENTIAL: may cause damage
UNCLASSIFIED
- 22 -
UNCLASSIFIED
Classification Management
National Security Information
•
Military plans, weapons systems or operations
•
Foreign government information
•
Intelligence activities (including special activities), intelligence
sources and methods or cryptology
•
Foreign relations or diplomatic activities of the US, including
confidential sources
•
Scientific, technological or economic matters relating to national
security, which includes defense against transnational terrorism
•
Program for safeguarding nuclear materials or facilities
•
Vulnerabilities or capabilities of systems, installations,
infrastructures, projects/plans relating to national security
•
Foreign Government Information and weapons of mass destruction
UNCLASSIFIED
- 23 -
UNCLASSIFIED
Spies, Lies and Myths
UNCLASSIFIED
UNCLASSIFIED
- 24 -
UNCLASSIFIED
Espionage Since World War II
• 151 persons convicted of espionage
– 140 male/11 female
– 100 government/51 non-government
– Most held “Secret” clearances or above
• Six million non-spies held clearances during
the period
• The latest case: Brian Regan
UNCLASSIFIED
- 25 -
UNCLASSIFIED
Brian Regan
“If I commit esponage (sic) I will be putting my self and family at
great risk. If I am caught I will be enprisioned (sic) for the rest of
my life, if not executed for this deed.”
• In a letter to Saddam Hussein, Brian Regan demanded $13 million in
exchange for providing data such as detailed information about US
reconnaissance satellites
UNCLASSIFIED
- 26 -
UNCLASSIFIED
Brian Regan Facts
• USAF assignee to NRO (7/95 – 8/00)
• Considered espionage in late 1998 to solve
financial problems ($100,000+)
• Began downloading from Intelink in 1999
• Removed 15,000 pages, CD-Roms and video
tapes from NRO
• Hired by TRW October 2000
• Brought back to NRO but monitored
– Surfs Libya, Iraq and China on Intelink
• Arrested/indicted/convicted (8/01 – 2/03)
– (Attempted espionage and gathering national security
information)
UNCLASSIFIED
- 27 -
UNCLASSIFIED
Brian Regan’s Behavior
• The Telltale Indicators
– Deeply in debt
– Worked odd hours
– Foreign national spouse
– Late nights in copy room
– Non-reporter of foreign travel
– “Top Fifty” user of Intelink
UNCLASSIFIED
- 28 -
UNCLASSIFIED
Myths About Spies
• Get rich
• Are insane
• Realize they are bad people
• Consumed by guilt
• Driven by excitement
• Plan their final escape
• Display deteriorating job performance
• Show outwardly suspicious behavior
• Caught by co-workers
• Control their own destiny
Source: www.fbi.gov and www.ncix.gov
UNCLASSIFIED
- 29 -
UNCLASSIFIED
Sensitive Compartmented
Information (SCI)
A special category of national
intelligence information concerning or
derived from intelligence sources,
methods, or analytical processes,
which is required to be handled within
formal access control systems
UNCLASSIFIED
UNCLASSIFIED
National Security Information
National Defense Information
(military plans, weapons, OPS)
•Collateral (C/S/TS)
•SAPs
Foreign Relations and Foreign Government Information
•Collateral (C/S/TS)
•SAPs
Homeland Security Information
(Infrastructure, national resources, vulnerabilities and
capabilities)
•Collateral (C/S/TS)
•SAPs
Scientific/Technological/ Economic Information
•Collateral (C/S/TS)
•SAPs
Nuclear Information
(program for protecting nuclear materials/ facilities)
•Collateral (Q/L)
•SAPs
National Intelligence Information
(terrorism, international threats, sources, methods)
•Collateral (C/S/TS)
•SAPs
- SCI
- Non-SCI
Weapons of Mass Destruction (WMD) Information
•Collateral (C/S/TS)
•SAPs
UNCLASSIFIED
- 31 -
UNCLASSIFIED
National Security and SCI Protection Policies
• National security policies
– Come from National Security Council
– In the name of President
– As Executive Orders, Presidential or
National Security Decision Directive
• SCI protection policies
– In name of DNI
– as IC Directives (ICDs) formerly DCIDs
– DNI SSC
• Facilitated and coordinated rewrite
of security series of ICDs
UNCLASSIFIED
Executive Orders; Presidential Decision Directives
EO 12958
EO 12968
EO 12333
President
George W. Bush
DCID 6/3
DCID 6/4
DCID 6/9
DNI
J. M. McConnell
- 32 -
UNCLASSIFIED
How We Collect Intelligence
• Open Source Intelligence (OSINT)
• Geospatial Intelligence (GEOINT)
• Human Intelligence (HUMINT)
• Signals Intelligence (SIGINT)
UNCLASSIFIED
- 33 -
UNCLASSIFIED
Signals Intelligence (SIGINT)
• Collecting verbal and nonverbal signals from
land, sea and satellite
• Protected within COMINT Control System
managed by D/NSA
• Categories:
– Communications Intelligence (COMINT)
– Electronic Intelligence (ELINT)
– Foreign Instrumentation Signals Intelligence (FISINT)
UNCLASSIFIED
- 34 -
UNCLASSIFIED
COMINT (SI) Control System
• Special access program designed to protect signals
intelligence
• Named for first product it afforded protection:
– COMINT (Communications intelligence)
• Also called
– Special Intelligence Control System
– SI Control System
• Its information is only available to holders of SI
access approval
• Managed by D/NSA
UNCLASSIFIED
- 35 -
UNCLASSIFIED
COMINT (SI) Control System
• The original SIGINT
• Intercepted communications:
– Telephone, email, fax, etc.
• Still referred to as Special Intelligence or SI
• Must protect
– What was collected
– How collection was accomplished – tactics, equipment
– Intelligence implications
– Degree of success
– Plans and targets
• Sharing with foreign partners
UNCLASSIFIED
- 36 -
UNCLASSIFIED
TALENT-KEYHOLE (TK) Control System
• SAP established by DCI for products from
satellite reconnaissance (1960)
• To protect most sensitive details of satellite
collection capabilities and derived information
• Consistent with EO 12333 and EO 12958
directing DCI to develop programs to protect
intelligence sources and methods and
analytical procedures
UNCLASSIFIED
- 37 -
UNCLASSIFIED
TALENT-KEYHOLE (TK) Control System
• Must protect
– What’s being collected
– Collection techniques
– Intelligence implications
– System effectiveness
– Plans and targets
– Operational information formerly known
as “B” material
– Operational, engineering and technical
information
UNCLASSIFIED
- 38 -
UNCLASSIFIED
IC Program Managers
Director, CIA
National Clandestine Service
HUMINT Control System Manual
Open Source Intelligence (OSINT)
Center
Director, NSA/CSS
SIGINT Program
Signals Intelligence
Security Regulations
Director, DIA
GDIP MASINT Program
MASINT Policy Series
Director, NRO
National Reconnaissance
Program
RESERVE Control System
Manual
Executive Assistant Director,
National Security Branch
Counterterrorism
Counterintelligence
Director, NGA
Geo-spatial Intelligence
(GEOINT)
Imagery Policy Series
UNCLASSIFIED
- 39 -
UNCLASSIFIED
A Changing World
UNCLASSIFIED
- 40 -
UNCLASSIFIED
The Day That Changed The World…
September 11, 2001
The Pentagon
World Trade Center
Shanksville, PA
UNCLASSIFIED
- 41 -
UNCLASSIFIED
The Post 9/11 World
“We will never be the same”
• New threat matrix
– Terrorism in forefront
– Espionage still here
• New Security perspectives
–
–
–
–
From nation states to threatening groups
Global view with moving targets
Focus on foreign involvements and influences
Hardening of facilities
• Greater emphasis on information sharing
– Analysis and risk management
UNCLASSIFIED
- 42 -
UNCLASSIFIED
Today’s Delicate Balance
INFORMATION
PROTECTION
(NEED TO KNOW)
VS.
INFORMATION
SHARING
(Criteria for Access)
UNCLASSIFIED
- 43 -
UNCLASSIFIED
Global Warfare
• Current state of affairs
– The world's major intelligence agencies employ
the latest technologies available in collection,
communication and analysis of information from
abroad
– Counterintelligence agencies employ other
technologies in efforts to identify and eliminate
foreign spies at home
Extracted from Spies in the Digital Age, H. Keith Melton
UNCLASSIFIED
- 44 -
UNCLASSIFIED
Global Warfare
• Some important changes to come
– The primary targets of spies for all intelligence
services have shifted
– The traditional roles of "friends and foes"
continue to blur
– New technologies are changing the traditional
methods and techniques (called "tradecraft") by
which spies operate
– Traditional tradecraft of spies are applied in new
ways
Extracted from Spies in the Digital Age, H. Keith Melton
UNCLASSIFIED
- 45 -
UNCLASSIFIED
National Threats
The single greatest threat to world peace
in the early part of this century will be
the utilization of weapons of mass
destruction―nuclear, chemical,
biological and digital―by
fundamentalist terrorist organizations
Extracted from Spies in the Digital Age, H. Keith Melton
UNCLASSIFIED
- 46 -
UNCLASSIFIED
National Threats
• Terrorist organizations are already using
Internet to:
– Recruit and communicate members with similar
fundamentalist beliefs
– Coordinate terrorist activities with other aligned
groups that share interests in a common outcome
– Raise money through computer based cyber-crime
– Attack national information infrastructures of hostile
countries from thousands of miles away
Extracted from Spies in the Digital Age, H. Keith Melton
UNCLASSIFIED
- 47 -
UNCLASSIFIED
The 911 Commission (2004)
• Concluded we should:
– Attack terrorist organizations
– Curb growth of radical Islam
– Prepare for and protect against terrorist attacks
• Recommendations
DONE
– Create a National Counterterrorism Center (NCTC)
– Unify IC under a DNI
– Strengthen FBI and homeland defenders
– Unify and strengthen Congressional oversight
UNCLASSIFIED
- 48 -
UNCLASSIFIED
Intelligence Reform Act of 2004
• Establishes a Senate-confirmed Director of
National Intelligence (DNI)
• Re-designates the National Foreign
Intelligence Program (NFIP) as the National
Intelligence Program (NIP)
UNCLASSIFIED
- 49 -
UNCLASSIFIED
Director of National Intelligence (DNI)
• Intelligence Reform and Terrorism Prevention
Act of 2004
– Title 1, Reform of the Intelligence Community
– Section 1001, Subtitle A, Establishment of the
Director of National Intelligence
UNCLASSIFIED
- 50 -
UNCLASSIFIED
DNI Roles in Security
• Promote intelligence information sharing
• Protect intelligence sources and methods
• Promote uniform procedures for SCI
• Join government-wide security clearance
reform
– Reciprocity of security clearances
– Process for investigation and adjudication to be
performed quickly
UNCLASSIFIED
- 51 -
UNCLASSIFIED
New Intelligence Community
Independent
Agency
DoD
Intelligence
Elements
Departmental
Intelligence
Elements
UNCLASSIFIED
- 52 -
UNCLASSIFIED
National Intelligence Strategy
Protection of National Intelligence
Objective 7
“Create clear, uniform security practices and rules
that allow us to work together, protect our
nation’s secrets, and enable aggressive
counterintelligence activities.”
• “Dramatically change the basis of IC security and
counterintelligence policies in order to remain
effective.”
• Rigorously assess threat, vulnerability and
protection requirements
• Establish uniform and reciprocal guidance
UNCLASSIFIED
- 53 -
UNCLASSIFIED
Parting Words
Presidential direction: “. . .take the
strongest possible precautions
against terrorism by bringing
together the best information and
intelligence. In the war on terror,
knowledge is power.”
Your part: you have an individual responsibility
and role in protection of SCI assets
UNCLASSIFIED
- 54 -
UNCLASSIFIED
Director of National
Intelligence
Organization Charts
UNCLASSIFIED
UNCLASSIFIED
- 55 -
UNCLASSIFIED
ODNI
Civil Liberties Protection Officer
Mr. Alexander W. Joel
Inspector General
Mr. Edward Maguire
Director of National Intelligence
Mr. J. M. McConnell
Principal Deputy
Director of National Intelligence
LTG Ronald Burgess, Acting
General Counsel
Mr. Benjamin A. Powell
Equal Employment Officer
Mr. John M. Robinson
ADNI & Acting Director of
Intelligence Staff
Mr. David R. Shedd
ADNI & Chief Information Officer
Maj. Gen. Dale W. Meyerrose, Ret.
ADNI for Science & Technology
Dr. Eric C. Haseltine
NCIX
Mr. Joel Brenner
DDNI for Customer Outcomes
“Want It”
LTG Ronald Burgess, USA
DDNI for Analysis
“Know It”
Dr. Thomas Fingar
DDNI for Collection
“Get It”
Mrs. Mary Margaret Graham
DDNI for Acquisitions
“Build It”
Ambassador Patrick F. Kennedy
Iran Mission Manager
Ms. S. Leslie Ireland
NCPC
Ambassador Kenneth C. Brill
NCTC
VADM J. Scott Redd, Ret.
North Korea Mission Manager
Ambassador Joseph DeTrani
Cuba-Venezuela Mission Manager
J. Patrick Maher, Acting
UNCLASSIFIED
- 56 -
UNCLASSIFIED
DNI Special Security Center (SSC)
DDNI for Acquisitions
Ambassador Patrick F. Kennedy
ADDNI for Security
Ambassador Eric J. Boswell
Director,
Special Security Center
Mr. John P. Fitzpatrick
Administrative Assistant
Ms. Kathleen Guisti
Legal Counsel
Mr. Sandy Sagalkin
Deputy Director,
Special Security Center
Ms. Gina Otto
Deputy Director,
Policy and Planning
Mr. Rick Hohman
Deputy Director,
Community Services
Mr. William F. O’Neill
Deputy Director,
Oversight and Liaison
Mr. Glenn Stampler
UNCLASSIFIED
Executive Officer
TBD
Deputy Director,
CAPCO
Mr. Wayne Belk
- 57 -
Download