Annual Industrial Security and Export Compliance Briefing 2014 This briefing is unclassified Presented by: Jamie Fisher FSO Contact information FSO contact: Jamie Fisher jfisher@innssi.com 937-630-3012 x100 DSS Rep Richard Leger Special Agent Industrial Security Representative Defense Security Service 513-243-9336 Export Controlled contacts: Steve Palluconi spalluconi@innssi.com 937-630-3012 x104 Grant McMillan gmcmillan@innssi.com 937-630-3012 x106 Purpose: This training is an annual requirement for any ISSI employee holding a clearance to enhance their security knowledge and raise awareness level To remind you of your responsibility and obligations while working with classified information Remote Training Instructions: How to Receive Credit Read through all course modules. E-mail SEC100 Completion Record to SecurityEd@sandia.gov or fax to (505) 844-7802 for credit. Completion Time Course completion time is estimated to be between 30-40 minutes. However, course completion times vary greatly, depending upon familiarity with the content, reading speed, number of interruptions, and number of optional links accessed. Employees may charge up to 30 minutes to 0701-000 for their time to complete this training. Topics Welcome to your annual training! The topics you will review are…. • Industrial Security Program Overview • Know your work • Know your surroundings • Security Classification System • Threat Awareness • Safeguarding Classified • Classified Visits • Foreign Travel • Reportable Information • Adverse Information • Security Violations • Discipline Policy • Export Compliance Overview of the National Security Program As a Government Contractor, we are bound by Executive Order 12829, National Industrial Security Program. The NISP establishes rules and regulations to properly protect and control all classified material in our possession or under our immediate control. Our information is threatened by cyber hackers, foreign adversaries, malicious insiders, or inadvertent release. Some of the work that is done at ISSI is information that others want— whether classified or not. Security requirements are about ensuring that information and materials are kept from those who don’t have a need to know and the proper clearance. The Company Facility Clearance A Facility Clearance (FCL) is a determination that a company is eligible for access to classified information or award of a classified contract. The process involves an evaluation of the corporate organization; key leadership; outside corporate relationships; foreign influence, etc. The FCL means that the company may have access to contract specific classified information based on a government need and at a government approved location. ISSI is currently cleared at a top secret facility. Current contracts that ISSI has with classifications (DD254) are: FA8650-13-D-2343: Top Secret (Hoke’s group) FA8650-13-D-2337: Secret (Hsu’s group) FA8650-14-D-2317 TO 0001: Secret (Hsu’s group) Subcontract with GDIT: 2601: Secret (Lynn’s group) DD Form 254 DD Form 254 outlines the security specifications for each classified contract issued to a prime contractor from the government. This form is also flowed down to any and all subcontractors that require access and or storing to classified information. Below is a copy of the DD 254 that is issued. FA8650-13-D-2343 Atch 2 24 Jan Page ; 1 of 5 2013 i 1. CLeARANCE AND SAFEGUARDING DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION a. (The requirements of the DoD Industrial Security Manual apply 10 all security aspects of this effort-) b 2. THIS SPECIFICATION IS FOR: (X and complete as ppticabte) a PRIME CONTRACT NUMBER X I YES DAT!! (YYYYMMOD} c FINAL (Complete Item 5 In all cases) L K _ j N O . II Yes, complete lhe !ollowino: (Preceding Contract Number) is transferred to !his follow-on cor)tract. Classified material received or generated under 5. IS THIS A FINAL CD FORM 254? :!OprJJ I4 OATE ('ftr'YYMMDD) I REVISION NO. (Suporselles 811 previous specs) DUE DATE (YYYYMMDD) _j I None b. REVISED 4. IS THIS A FOLLOW-ON CONTRACT? I LEVEL OF SAFEGUARDING REQUIRED X FA8650-13-D-2343 c SOLICITATION OR OTHER NUMBER I TOP SECRET 3. THIS SPECIFICATION IS: (X and complete as applic bte) 01\TE (YYYYMMDD) a ORIGINAL (Complete date In all cases) b SUBCONTRACT NUMBER I L X _ j N O . II Yes. complete tile lollowtng: l _ j Y E S • retention of the elassllied material is authorized for Ihe period cf In response to the contractors request dated 6. CONTRACTOR (Include Commerr;i,1f Bnd Government En lily {CAGE) Code) ·b. CIIGECOOE a. NAME, ADDRESS-:- AND ZIP CODE lnnnvnlivc Scientilic Solutions Inc. (ISS I) 0:12G3 I c. COGNIZANT SECURITY OFFICE (Nome, Aric!IeS$ . and·ZJp Cocie) Deft!nsc Security Services (lOFN D) 423 I 17177 N. Laurel Park Drive, Suite Livonin, MI48152-265Y 2766 lmlian Ripple Rd. D >IUIL FACIU1Y CLEARANCE REQUIRED U1145·H0-363X I 734-793-2320 Fax: 734-464-0490 I ' ' 7. SUBCONTRACTOR a NAME. ADDRESS . AND ZIP CODE b. CAGE CODE NIA N/A c. COGNIZANT SECURITY OFFICE (Namo, lit/dress, M d Zip C cie) Nil\ ! 6. ACTUAL PERFORMANCE a LOCATION b. CAGE CODE N/A Nlt\ c COGNIZANT SECURITY OFFICE (Name, Address. ami Zip Coda; N/A ' 9. GENERAL IDENTIFICATION OF THIS PROCUREMENT Ad v nced l'rupulsinn Concep ts ami Cycles • Develo p mal evuluak mly;mced Gnmbu tiOI'I und propulsion C(liiCCpts l(,,r uir-bn:athing 5y ten.s . These id ;1s iii'C often pur. ued with I hi! i n\'oh• :menl ot' .:nginc manu1ilctur.:rs through contract - Ocsign, lilt>ricalc. wwlyz.:. lest. and cvuhmtc conccp1s. util izitl!; A FRI. fhcili l ics. tn invcslignte t chnolt>gi ::; Lhut cnublc 10. CONTRACTOR WILL REQUIRE ACCESS TO: a COMMUNI(;ATIQNS CUR IT'((COMSF.C) INFORMATION b --YES NO X RESTRICTED DATA c CRITICAL NUCLEf\R VI€APON DESIGN INI'ORMATION d FORMERLY RESTRICTED DATA -._ e INTEtUG NCE INFORMATION X X (1) SenSIIive Compartmented lnlotTnotion !SCI) (2)NOI\-SCI r SPECIAl ACCESS INFORMATION g NATOINFORMATION h FOREIGN GOVERNMENT INFORMATION i LIMITED 0\SSEMINA fiON INFOHMATION FORQFr.ICIAL USEONLY 1Nf'ORI\1ATIQN k. OTHER !Specify! I DO FORM 254, DEC 1999 advanced propul . • COI-1'1t<A<.;IUK:>C J , x I'! J X ' & W l ' F f J I . w YES NO I lJIHt:H x ·1 - b. RECEIVE CLASSIFIED DOCUMENTSONLV X c RECEIVE AND GENERATE CLASSIFIF.C MATERIAl X X o. FABRICATE, MODIFY,ORSTORECLASSIFIED HARDWARE X I e. PERFORM SERVICES I ONLY r _pUERTO RII:_CL(£' up:;, 17JEU1f ,! jJ J'f.sH u- h ' j oW\ R1S1I1'C1O;N.:DiAtAtY -..l.IS'.t- gB}i I T f•H I:Wl INFORMATIOtl 1 N 1:t< IUII'-'1 cLU 1.»<0 H o1 hn REQUIRE ACOMSEC ACCOVNT I liAVE TEMPEST REQUIREMENTS Q X X 11. IN PERFORMING THIS CONTRACT, THE CONTRACTOR W ILL : X X X X X - ion cycles. 2 , - X X X I. OTHER (Specify) PREVIOU "' EDITION IS OBSOLETE. X X X I i- HAVEOPERATIONS SECURITY (Q EC) REQUIREMENTS k BEAUTHORIZED TOUeE lHGOEFE!N!l!! CCl\JiliER SERVICE X AI'FARS 5352.20-1-9000 applies. X X Sec B l k 13. .>dot.! Prarewontt 70 Security Procedures and Duties Applicable to Employee Job A person who has become a cleared and briefed employee has certain responsibilities. These responsibilities include, but are not limited to: Completion of initial and annual refresher briefings Be knowledgeable of Reporting Requirements as well as classified Security Violations or Infraction policies and procedures Periodic Reinvestigation, in accordance with level requirements (conducted every 5 years for Top Secret, 10 for Secret and 15 for Confidential) Adhere to Classified Safeguarding Guidelines and Restriction Safeguarding Classified You are the first line of defense in protecting our nation’s information. An easy way to do this is by applying the core principles of Operations Security, or OPSEC: • Think: recognize and acknowledge that you are at risk • Assess: Evaluate your routines and environment. Where are you vulnerable? • Protect: Make security part of everything that you do. Protect information. Never hesitate to call your FSO, Jamie Fisher, 937-630-3012 x100 or DSS rep Richard Legere 513-243-9336 with questions on any security related issues. Security Classification System: Classified information is official government information that has been determined to require protection in the interest of national security. All classified information is under sole ownership of the US Government, and employees possess no right, interest, title, or claim to such information. – Confidential: Information which, in the event of unauthorized disclosure, could reasonably be expected to cause identifiable damage to national security – Secret: Information which, in the event of unauthorized disclosure, could reasonably be expected to cause serious damage to the national security – Top Secret: Information which, in the event of unauthorized disclosure, could reasonably be expected to cause exceptionally grave damage to the national security Access Requirements • • • • Security clearance does not give you approved access to all classified information. It gives you access only to: – Information at the same or lower level of classification as the level of clearance granted; and – Information that you have a need-to-know in order to perform your work Failure in implementing the need-to-know principle can cause serious damage to our organization Need-To-Know imposes a responsibility on you and all authorized holders of protected information You are expected to refrain from discussing protected information in hallways, cafeterias, elevators, any place where the discussion may be overheard by persons who do not have a need-to-know Report any violations to your security office What causes mistakes? • Being in a hurry: rushing causes us to lose focus. Slow down to stay safe and secure. • Not taking the risk seriously: If you don’t believe there’s a threat, you won’t implement protections. • Disruption in routine: Establishing routines helps us, whether it’s storing our personal electronic devices in the morning or locking our computers when we leave our offices. It is when we do something out of the ordinary that we make mistakes, such as rushing to an appointment and leaving classified unattended. Stop and take a few moments to make sure that everything is securely put away. • Being interrupted/distracted: A coworker walking in to discuss an urgent issue or receiving an emergency call form home can cause us to forget what we were doing. Be mindful of when your actions may disrupt others and cause them to make an error. Did you know? New Mexico is a hot spot for spies. Counterintelligence expert and Acting NNSA Director Bruce Held says, “For many international intelligence operatives, the state’s name is nearly synonymous with espionage.” Know your work When you start new work or criteria for current work has changed, be sure to know the following: • What is sensitive or classified in your area • What may be subject to export controls • Who has a need-to-know for my program’s information If in doubt on current work or new work, ask questions. It’s better to be safe than sorry. Some common indicators that could lead an adversary down a pathway to more information: • Increased program activity that can be seen by the public (announcement of new contracts, sales/shipments of commercial items) • Information in presentations, articles, research papers, and journals. • Remember that all information intended for release outside of ISSI must go through Review and Approval, even open source or unclassified. Key Points If you have any doubt, check with your supervisor before releasing any classified information Possessing a badge that indicates clearance does not automatically grant individuals a Need-To-Know Determine the degree of Need-To-Know before sharing program or project information Need-To-Know principle applies to computers as well. Classified Visits How to access classified information “elsewhere” • A VAR (visit access request) must be submitted in JPAS (Joint Personnel Adjudication System) • Visit requests, both inbound and outbound, shall be forwarded to Security no later than 5 business days before the visit. – – – – Name of visitor(s) Destination’s SMO Code (A must for the JPAS VAR) Dates of the visit (Start and end) Point of Contact name and phone number (can’t be the security office) – Purpose of the visit (meeting, conference, etc.) • International visitors shall allow at least 30 days notice for classified visits abroad Foreign Travel Overseas travel increases the risk of being targeted by foreign intelligence activities. You can be the target of a foreign intelligence or security service at any time and place; however, the possibility is greater when you travel overseas. Foreign Travel Examples of spying tools include: • Wired hotel rooms • Intercept of fax and email transmissions • Recording of telephone calls/conversations • Unauthorized access and downloading, theft of hardware and software • Break-ins and/or searches of hotel rooms, briefcases, luggage, etc. • Bugged airline cabins • Substitution of flight attendants by spies/information collectors Foreign Travel A favorite tactic for industrial spies is to attend trade show/conference type events. This environment allows them to ask a lot of questions, including questions that might seem more suspect in a different type of environment. One estimate reflected that one in fifty people attending such events were there specifically to gather intelligence. Foreign Travel The overseas traveler and the information in their possession are most vulnerable when on the move. Stealing laptops is a common tactic. These portable devices may contain access capabilities that serve as doorways to additional information and systems. To avoid this type of situation: • Refrain from bringing portable electronics • Use removable hard drives • Data on portable electronic devices should contain only what is needed for the purpose of your travel Foreign Travel Remember that it is always cheaper for any country to elicit, improperly obtain or buy a new technology than it is for them to pay for the research and development of that technology themselves. There are more funds expended on R&D by the US Government and Industry than any other country in the world. This makes us a prime target. Think Defensively • Being mindful and thinking defensively will make it difficult for someone to obtain technical and/or classified information from you. As an ISSI employee, you are considered to be a source of information by those people involved in both classic and industrial or economic espionage. • Your increased awareness is essential when meeting with foreign nationals domestically and abroad or while vacationing outside the US. For current requirements and warnings for international travelers, visit http://travel.state.gov • When you travel, refrain from discussing business in public places. Report to Security any suspicious contacts from individuals that you do not know. Key Points Remember it is against the law to: – Disclose classified information to unauthorized persons. – Fail to report a known or suspected compromise of classified information Reportable Information Cleared employees shall contact Security if any of the following apply: • Name change • Change in marital status • Change in family status which results in having a foreign national as a relative • Reoccurring contacts with Foreign Nationals, or relationships with foreign businesses • Requests from anyone for unauthorized access to classified or export-controlled technical information Adverse Information Adverse information is any information that adversely reflects on the integrity or character of a cleared employee. Such information would suggest that his or her ability to safeguard classified information may be impaired, or, that his or her access to classified information clearly may not be in the interest of national security. It is the responsibility of all employees to report to Security any adverse information concerning another cleared employee. Examples of Adverse Information: • Criminal activity • Use of illicit drugs or misuse of controlled substances • Any pattern of security violations or disregard for security regulations • Excessive indebtedness/recurring financial difficulties • Knowledge or suspicion of anyone providing or requesting sensitive, classified, export-controlled, or proprietary information to an unauthorized person or entity. • Obtaining a foreign passport or a business partnership with a foreign national. Security Violations • Minor violation-an unintentional or negligent failure to comply with security requirements which does not result in compromise, or suspected compromise of classified information • Major violation-a willful disregard of security requirements or a failure to comply with security procedures, regardless of intent, which results in compromise or suspected compromise of classified information Discipline Policy – Violation was not deliberate—the employee will receive a verbal discussion and be retrained on security – Violation was not deliberate but a pattern of negligence is noticed—written reprimand and may receive uncompensated furlough – Violation involved gross negligence—employee will receive a written reprimand and may receive uncompensated furlough and possible termination – Violation involved deliberate negligence—employment will be terminated Export Compliance – A Growing Requirement for ISSI • Foreign sales is the fastest growing component of ISSI’s commercial product success. • In 2012, commercial sales were responsible for 10 % of ISSI revenue and 49% of profit. • Although encouraged by State and Federal agencies, exporting involves potential threats to national security, foreign policy, and non-proliferation, • Compliance with U.S. export regulation is carefully monitored by multiple organizations within the Dept. of State, Dept. of Commerce, Dept. of Treasury and the Census Bureau. • ISSI is developing an Export Compliance Management System to ensure our compliance with the myriad regulations. • One requirement is that all ISSI employees have recurring training and basic familiarity with this program. What ISSI Base Employees Need to Know • The U.S. Government takes export laws very seriously. • Penalties for non-compliance are steep and can be ruinous to a small business. • Penalties can be levied on ISSI and/or on individual employees who were responsible for the violation. • Non-compliance by ISSI’s Commercial Products Group could directly impact our ability to engage in government contracting. • Non-compliance by ISSI Base employees could result in ISSI debarment from exporting. • Base employees can violate U.S. export laws even though you have no relationship to foreign sales. A Broad Range of Items are Subject to Export Controls… Exports can be … • • Physical – taking / sending / giving a part / data to a foreign countr y or pers on. Verbal - telling foreig n person • information about a controlled part / data. Visual - a foreig n p erson seeing controlled information – even if they see it on your laptop in a public place. Potential Export Violation Scenarios Example 1: – One of the AFRL/RQ test facilities is being upgraded and you need to obtain components for that upgrade. – To speed up the process of getting quotes, you contact potential U.S. suppliers, who request more information in order to customize the components to your requirements. – You provide them with facility drawings or specifications, with no statement about export restrictions…after all it is not a classified facility. – One U.S. company forwards this information to their manufacturer/supplier in China, who you are not even aware of. – Since U.S. military test equipment is typically covered by ITAR restrictions, but you did not alert the U.S. supplier, you potentially violated U.S. export laws. • What you should have done: – Before providing unclassified technical data on base equipment to a potential supplier, contact Tracy Frecker. She will work with Steve Palluconi (Export Empowered Official) to determine the applicable export restrictions and screen the potential suppliers. Potential Export Violation Scenarios (cont’d) • Example 2: – You are participating in a technical conference in the U.S. or overseas. – A foreign national approaches you who is interested in ISSI instrumentation for aerodynamic measurements in wind tunnels. – Although you are not involved with commercial sales, you have general information on our products and want to help ISSI build new business. – You proceed to share this information with the foreign national. – The foreign national is from a country that requires a license before we can market or sell to them. – You have potentially violated U.S. export laws. • What you should have done: – Thank the foreign national for their interest in ISSI instrumentation and refer them to a member of the Commercial Products Group, such as Steve Palluconi or Grant McMillan (Export Compliance Officer). Certification I have received, reviewed and understand the contents of this industrial security and export compliance briefing. Any questions that I raised were addressed by ISSI’s FSO and EO. Print Name: Signature: Date: