Presentation is loading. Please wait.

Presentation is loading. Please wait.

Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 1 Special Security Office, Army SCISECURITY ORIENTATION ORIENTATIONTRAINING.

Similar presentations


Presentation on theme: "Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 1 Special Security Office, Army SCISECURITY ORIENTATION ORIENTATIONTRAINING."— Presentation transcript:

1

2 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 1 Special Security Office, Army SCISECURITY ORIENTATION ORIENTATIONTRAINING

3 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 2 Security Message The protection of government assets, people and property, both classified and official but unclassified, is the responsibility of each and every member of the Department of Defense (DoD); regardless of how it was obtained or what form it takes. Our vigilance is imperative in the protection of national security information. Everyone with SCI access to these vital resources has an obligation to protect it.

4 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 3 Security Message It is your personal responsibility to know that the person you are dealing with is both properly cleared and has a need to know. You must never reveal or discuss classified information with anyone other than those that are properly cleared and have a need to know. CL BL VL Clearance Administrative action usually involving a background investigation Need to Know SCI indoctrination/Duties requiring you to work with SCI Access Availability to classified information =

5 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 4 Summary Why SCI Security Orientation Foreign Intelligence Threat Awareness Security Classification Management Individual Duties and Responsibilities Reporting Obligations and Requirements Marking, Handling, and Safeguarding of Classified Information Publication Review Requirement Information Security Identification of Local SCI Security Official/Security POC’s Local Procedures

6 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 5 Why is this required? Personnel are required by DOD 5105.21-V3, Sensitive Compartmented Information (SCI) Administrative Security Manual and Intelligence Community Policy Directive 704 to be reminded annually of their Security Responsibilities regarding: - Personnel Security (PERSEC) - Physical Security (PHYSEC) - Information Security (INFOSEC) If your status has changed over the past year please contact the Special Security Office (SSO)

7 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 6 Foreign Intelligence Threat 1.THE FOREIGN INTELLIGENCE THREAT BRIEF (FITB) addresses efforts by Foreign Intelligence Services (FIS), foreign commercial enterprises, foreign terrorists, or foreign computer intruders to acquire U.S. classified, sensitive, or proprietary information or material, and the unauthorized disclosure of such information or material to foreign sources. 2.The FITB discusses the Source and the Threat, OPSEC, Type of Information Being Targeted. Insider Threat, Volunteer Spies, Personal Security Indicators that would indicate Improper or Suspicious Activity, and the Technical/Non-HUMINT Threat. 3.Think about it! How does the FIS Agent gather information about you or your organization? Your detailed signature block on your e-mail that lists your home, work, cell phone, e-mail, and physical address;

8 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 7 Foreign Intelligence Threat yours or family members’ personal web sites such as My Space or Facebook Pages; conversations with fellow commuters about the frustrations of the day soon to turn into discussions about where you work, what you do, family, the cost of housing, kids college, and other financial woes, cell phone conversations with clients or co-workers discussing work, setting up meetings, going over slides to correct errors; organizational websites highlighting new technology and specifications, news releases, deployment photos, social calendars, and much more is collected to be used against us. 4. How much did you disclose? What has the FIS agent gained? Who have you endangered? What damaged have you caused? When the puzzle of information is put together and the dots connected, you may have disclosed sensitive and classified information.

9 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 8 Foreign Intelligence Threat you have placed your family, co-workers, yourself, troops overseas, and your Nation in Grave Danger! The damage you have caused is irreparable and the devastation can be seen in body bags and grave sites! 5.You can protect yourself and your organization by maintaining situational awareness, practicing OPSEC, and staying educated by using the resources available within the Intel Community. Unclassified information on the current Foreign Intelligence Threat, and other CI publications can be found on the Office of the Director National Intelligence/Office of the National Counterintelligence Executive webpage http://www.ncix.gov/http://www.ncix.gov/ 6.The following invaluable resources are located in the NCIX Archives, Publications, CI Issues Sections, and Threats from Foreign Entities: a. A highly recommended resource for industry that details current intel

10 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 9 Foreign Intelligence Threat threat against corporations is the, Annual Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011 http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_20 11.pdf http://www.ncix.gov/publications/reports/fecie_all/Foreign_Economic_Collection_20 11.pdf b. CI Reader: An American Revolution into the New Millennium Volumes I, II, and III http://www.ncix.gov/publications/ci_references/index.phphttp://www.ncix.gov/publications/ci_references/index.php 7. Additional information is posted on these IC and security-related sites: a. Economic Espionage http://www.fbi.gov/hq/ci/economic.htmhttp://www.fbi.gov/hq/ci/economic.htm b. Research & Technology (RPT) Program http://www.infragard.net/http://www.infragard.net/ c. State Department http://www.state.gov/http://www.state.gov/

11 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 10 Foreign Intelligence Threat d. Office of the Director of National Intelligence http://www.dni.gov/index.php/newsroom/testimonies http://www.dni.gov/index.php/newsroom/testimonies e. DSS Industrial Security Counterintelligence http://www.dss.mil/ci/index.htmlhttp://www.dss.mil/ci/index.html 8. The key to reducing the Foreign Intelligence Threat is to practice and remember OPSEC! If you feel you have been targeted; contact your local CI official, force protection officer or law enforcement agency. National security is everybody’s business!

12 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 11 Security Classification Management a.Improper use of the classification management system is prohibited b.If holders of information have substantial reason to believe that the information is improperly or unnecessarily classified, they shall communicate that belief to their security manager or the OCA to bring about any necessary correction. This may be done informally or by submitting a formal challenge to the classification in accordance with DoDM 5200.01-V1, Encl 4, para 22a. c.Additional guidance that pertains to classified national security information can be found in Executive Order (E.O.) 13526, E.O. 13556, Information Security Oversight Office (ISOO) and Controlled Access Program Coordination Office (CAPCO).

13 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 12 Original Classification - Original Classification is the initial decision to designate a certain item of information as classified. Original Classifying Authority (OCA) is granted by position: Commanding General, Deputy Chief of Staff, G-2 is an OCA Derivative Classification - The act of incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the markings of the source information. Security Classification Management Individuals will derivatively classify documents based on guidance from a source document, Security Classification Guide (SCG) or other documented guidance from your OCA.

14 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 13 Intelligence Sources & Methods Examples Open Source Intelligence (OSINT) Signals Intelligence (SIGINT) Imagery Intelligence (IMINT) Human Intelligence (HUMINT) Electronic Intelligence (ELINT) Measurement and Signature Intelligence (MASINT) Foreign Instrumentation Signal Intelligence (FISINT) Compartments SI – Communications Intelligence (COMINT) G – (GAMMA) TK – Talent Keyhole HCS – (HUMINT) Control System Classification Management

15 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 14 IAW ICD 710, Para F; the classification markings allowed on classified information are TOP SECRET, SECRET, and CONFIDENTIAL. No other term or phrase shall be used to identify classified information. Levels of Classification CONFIDENTIAL - Unauthorized Disclosure Could Cause Damage to National Security. SECRET – Unauthorized Disclosure Could Cause Serious Damage to National Security. TOP SECRET – Unauthorized Disclosure Could Cause Exceptionally Grave Damage to National Security. Classification Management

16 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 15 SI//TK G HCS Sample SCI Cover Sheets Marking, Handling, and Safeguarding Classified Information

17 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 16 Marking/Handling and Safeguarding Classified Information Unclassified Illustration SECRET//HCS//MR SECRET//HCS//MR DEPARTMENT OF HOMELAND SECURITY WASHINGTON D.C. 20220 MEMORANDUM FOR DCAs January 20 2006 FROM:Security SUBJECT: Marking Original Classified Documents (U) 1.(C) This memorandum reflects the proper marking of an original classified document. (U) Note how each subject, paragraph, and subparagraph are portion marked. (S//HCS) Also note the overall classification conspicuously marked on the top and bottom. 2.(C) The “Classified by” line below reflects the name and position of the Original Classification Authority. The “Classified by” line reflects the source of classification. Finally, the “Declass on” line reflects the declassification instructions as specified on the source. Unclassified Training Sample Classified by: DNI Report, 5/20/05 Subj: Training Declassify On: 20281031 Overall Page Markings Portion Markings Original Classification Marking Declassification Marking

18 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 17 Marking/Handling and Safeguarding Classified Information Unclassified Illustration SECRET//HCS//MR SECRET//HCS//MR DEPARTMENT OF HOMELAND SECURITY WASHINGTON D.C. 20220 MEMORANDUM FOR DCAs January 20 2006 FROM:Security SUBJECT: Marking Derivatively Classified Documents (U) 1.(C) This memorandum reflects the proper marking of a derivatively classified document. (U) Note how each subject, paragraph, and subparagraph are portion marked. (S//HCS) Also note the overall classification conspicuously marked on the top and bottom. 2.(C) The “Derived From” line below reflects the name and position of the Derivative Classification Authority. The “Derived From” line reflects the source of classification. Finally, the “Declass on” line reflects the declassification instructions as specified on the source. Unclassified Training Sample Derived From: CIA Report, 5/20/05 Subj: Training Declassify On: 20281031 Overall Page Markings Portion Markings Derivative Classification Marking Declassification Marking

19 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 18 Sensitive Compartmented Information Facility (SCIF) ICD 705 An accredited area, room, group of rooms, buildings, or installation where SCI may be stored, used, discussed and/or electronically processed. DOD permanent SCIFs can only be accredited by DIA. Must be properly locked and alarmed when unattended. Un-cleared personnel must be escorted at all times. Individual Duties and Responsibilities

20 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 19 Temporary Secure Working Area (TSWA) No storage of SCI Operational less than 40 hrs/month Tactical /Temporary SCIF (T-SCIF) The perimeter shall be guarded by walking or fixed guards to provide observation of the entire controlled area. Under field or combat conditions 24/7operations mandatory. SIOs at ACOM, ASSC, and DRU will approve T-SCIFs for a period not to exceed one year. Individual Duties and Responsibilities

21 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 20 Individual Duties and Responsibilities - SCIF PROTOCOL Contact your Local SCI security officials for: Regulatory guidance and local standing operating procedures in the areas of personnel and physical security that will allow employees to operate in a secure SCI environment. Information on the SCIF’s Emergency Action Plan (EAP) and emphasize the importance of the emergency destruction and removal guidelines for national security information.

22 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 21 Reporting Obligations and Requirements Change of name, marital status, citizenship Foreign Contact/Travel (business and pleasure) Close and continuing relationships with non-US citizens Financial difficulties Alcohol or drug abuse Coercion, blackmail, or recruitment attempts Contact with Foreign Intelligence Service (FIS) Unauthorized disclosure of media leaks Major financial deposit (i.e., large inheritance, lottery, gambling, etc., over $10,000) Willful violation or security regulations Adverse information, such as DUI, arrest, or conviction IAW DoDM 5105.21- V3, You Must Report It!

23 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 22 Security Risks with New Technology Mass Storage Miniaturization Imaging Technology Wireless Technology Advances THE FOLLOWING SLIDES DEPICTS DEVICES THAT ARE CAPABLE OF ELECTRONICALLY GATHERING/COPYING INFORMATION "Protecting Our Nation's Intelligence"

24 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 23 Handheld Scanner - Top model can store 3000 pages of text Has IR transfer capability $100 - $200 Casio Watch Camera: Recording system JPEG (176 x 144 pixels), 16,770,000-color data Recording medium Built-in Flash Memory (1 MB) Memory capacity Up to 100 images*1 (JPEG format); Zoom 2X digital zoom Shooting mode Outdoor, Indoor, Dusk; brightness control IR Data Communication Bluetooth Smart wireless transmitter USB charging dock with magnetic alignment Works with apps including MapMyRun, Runkeeper, Strava and more Connects to iPhone 5 or iPhone 4S Casio Audio Recorder: 30 Second Record capability 30 Pages of TeleMemo Data $69 Security Risks with New Technology

25 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 24 Security Risks with New Technology These devices can easily be carried in a SCIF, intentionally or unintentionally. UNLESS PRE-APPROVED BY SSO OR IA PERSONNEL,THEY ARE NOT-AUTHORIZED IN A SCIF! BE ALERT!

26 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 25 Security Risks with New Technology Portable Electronic Devices pose a risk to SCI since they often include capabilities to interact with other information systems and can enable hostile attacks targeting classified information in Sensitive Compartmented Information Facilities (SCIFs) TRACKING DEVICES WIRELESS TRANSMITTERS WIFI DEVICES

27 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 26 The problem is real! Stolen military data for sale in Afghanistan despite crackdown, computer drives were found with names of HUMINT sources. Memory sticks (Thumb Drives) like these, on sale at the bazaar outside the U.S. military base in Bagrham, were found to contain U.S. intelligence data. Security Risks with New Technology

28 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 27 Security Risks with New Technology Defensive Measures Bottom Line Don’t assume the device is authorized in the facility. Contact the security office if you have any questions. Inquire about technical details of proposed purchases BEFORE ordering items. Educate yourself on new technology! Seek advice from your System Administrators and Information Systems Security Officers (ISSO). Be aware of possible risks and pay attention to those around you. Inquire about technical details of products you purchase.

29 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 28 Types of Security Incidents Security Violations A security violation is a compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of government security regulations; which is likely to result in compromise. A security violation requires investigation. Infractions An infraction (formerly known as a “practice dangerous to security”) is a failure to comply with provisions of government security regulations or any other action that causes a potential compromise of classified information. Per our discussion this morning, you are directed to complete Initial Security Orientation training due to a security infraction on 11 October 2014. Please log-in to AKO and go to Self Service, My Training, ALMS Portal, Mandatory Training, and then select "Initial Security Orientation." Please send me a copy of your certificate of completion no later than 7 November 2014. Thank you.

30 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 29 Report Security Incidents When Classified material, facility, or equipment is left unprotected Classified information is transmitted via unclassified email systems Downloading/uploading classified information on unclassified systems Unclassified faxes or scanners are used to transmit classified information Disclosure of classified to un-cleared personnel Copied on unauthorized equipment Unauthorized methods of destruction is used Classified information improperly marked Classified information is discussed in non-secured areas

31 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 30 Sample Security Incident A CG member properly transported SCI material to CGHQ for a presentation, however; the material was improperly processed and stored in a Secret space over night. Weakness: Failure to follow established policies and regulations. SCI can only be processed in a SCIF.

32 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 31 Sample Security Incident A CG member printed SCI material from a JWICS terminal, then only protected it at the collateral classification level (SECRET) vice at the SCI level. Weakness Inattention to classification markings. SCI can be Top Secret, Secret or Confidential, but must be protected within SCI security controls.

33 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 32 Sample Security Incident A CG member received a briefing packet with overall markings of Unclassified. Within the packet was a slide with classified SCI portion markings. Weakness: Failure to thoroughly check all documents before removing them from a classified space. Additionally, when the document was printed it wasn’t reviewed and marked at the highest overall level of classification.

34 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 33 Consequences for Security Incidents/Violations Additional training / changes in procedures Counseling Fines, Leave w/o pay Removal from position Loss of access/ clearances Criminal Prosecution $10,000, 10 years; life imprisonment;

35 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 34 Security review prior to release All SCI related or SCI developed information Any release outside SCI protected channels - Unclassified - Classified – collateral Examples Books and manuscripts Articles and reports Presentations Resumes and performance reports Email, blogs and chat rooms Clearance statement for resume-- - Cleared for Top Secret information and granted access to Sensitive Compartmented Information based on a single scope Background Investigation completed on (date) Prepublication Review Requirement

36 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 35 JWICS E-mail (whenever possible) Person to Person – In a SCIF Hand Carry - Authorized Courier Secure Fax Defense Courier Service (DEFCOS) SCI may Never be sent via US Postal Service Information Security Telephone SCI discussed in a SCIF only Across secure telecommunications equipment ie. STE, STU III, or Sectara Wireline Terminal

37 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 36 Information Security Packaging requirements for SCI - Double wrapped - inner wrap marked with classification - outer wrap marked only with name & address of sender and recipient Carrying between SCIFs within one building or compound - Locked container may serve as outer wrap written authorization (courier card) not required Top Secret material and higher delivered via the Defense Courier Service (DCS). Site Reg via link. Inner Packet TOP SECRET/SCI To be opened only by: SSO Outer Packet

38 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 37 Information Security Destruction of SCI Material Shredding NSA APPROVED SHREDDER ONLY Melting Grinding Acid-bath Incinerating Burn Bags

39 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 38 Protect Your Security Clearance Keep Security Advised Release Classified Information Only To cleared person with A Need-To- Know Never Leave Classified Information Unattended Never Take Classified Information Home Be Alert To Threats And Vulnerabilities When in doubt – Contact your SSO or Security Office Summary

40 Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 39 The very nature of our jobs dictates we lead the way in sound security practices. Anything less is simply------ UNACCEPTABLE Thank You!


Download ppt "Army G-2 AMERICA’S ARMY: THE STRENGTH OF THE NATION FOR OFFICIAL USE ONLY 1 Special Security Office, Army SCISECURITY ORIENTATION ORIENTATIONTRAINING."

Similar presentations


Ads by Google