Presentation is loading. Please wait.

Presentation is loading. Please wait.

V. July 2007 UNCLASSIFIED DNI Special Security Center SCI Overview Seminar SCI Today UNCLASSIFIED.

Similar presentations

Presentation on theme: "V. July 2007 UNCLASSIFIED DNI Special Security Center SCI Overview Seminar SCI Today UNCLASSIFIED."— Presentation transcript:

1 v. July 2007 UNCLASSIFIED DNI Special Security Center SCI Overview Seminar SCI Today UNCLASSIFIED

2 - 2 - UNCLASSIFIED Welcome and Objectives Classification level Seminar room/SCIF –No cell phones or other personal electronic devices –Only authorized classified discussion area Seminar Objectives –Reinforce the fundamental security basic practices –Describe your responsibilities in security and in the protection SCI –Correlate our changing world to your responsibilities –Inform of changes in SCI and the security world

3 UNCLASSIFIED UNCLASSIFIED Your Seminar Host DNI Special Security Center Established “To strengthen security in the Intelligence Community and wherever SCI and intelligence information is processed or held.” Government and contractor personnel dedicated to: –Security policy creation and implementation –Security coordination and liaison –Security services

4 UNCLASSIFIED UNCLASSIFIED About You… Your Organization Your job responsibilities Greatest security challenge What do you hope to get from this session


6 - 6 - UNCLASSIFIED Personnel Security – You Must Report… Changes in personal status –Marriage, separation, divorce, cohabitation Personal problems –Drugs & alcohol –misuse, abuse –Finances Legal involvements –Litigation, arrest, court summons, etc. Improper solicitations for information Foreign-based outside employment Adverse information about others Contact with media Personnel Security

7 UNCLASSIFIED UNCLASSIFIED Report Foreign Travel Report foreign travel in advance –Day trips to Mexico or Canada can be reported upon return Pre-travel briefing may be required Report unusual trip incidents Personnel Security

8 UNCLASSIFIED UNCLASSIFIED Report Foreign Contacts Reportable –Close continuing relationship, business or personal, with a citizen, resident or representative of foreign country (this includes contact via internet; , chatrooms) Not reportable –Casual contacts at social gatherings unless Foreign contact displays strong interest in employment Is not satisfied with answers Follow up contact is sought Personnel Security

9 UNCLASSIFIED UNCLASSIFIED Report Security Incidents Violations –Involve loss, compromise, or suspected compromise of classified information and/or –Involve gross security carelessness Infractions –When the rules have not been followed Systemic weaknesses and anomalies Internal, Disgruntled Employees: external- Activist Groups Personnel Security

10 UNCLASSIFIED UNCLASSIFIED Pre-publication Review Any written material that contains or purports to contain SCI –Material may contain description of activities that produce or relate to SCI Anything entering public domain must be approved –Speeches, articles, white papers, advertisements –Web pages, web sites Internet is an unclassified communication system –Do not write “around” classified subjects Personnel Security

11 UNCLASSIFIED UNCLASSIFIED Unauthorized Disclosure DCID 6/8 –Currently being re-written to reflect the Office of the Director of National Intelligence –Will be titled Intelligence Community Directive (ICD) 708 and Purpose –Emphasizes the responsibilities of the IC to protect intelligence information –Defines a process and establishes roles and responsibilities to deter, investigate and promptly report unauthorized disclosures, security violations, compromises of intelligence information –Ensures appropriate protective and corrective actions are taken Personnel Security

12 UNCLASSIFIED UNCLASSIFIED Unauthorized Disclosure (cont) Policy –To guard against, investigate report and redress unauthorized disclosures and other security violations –Continuously emphasize security and counterintelligence awareness –Promptly notify ODNI of any security violation, unauthorized disclosure of other compromise –Notification requirement includes persons deliberately disclosing classified information to the media – “leaks” –Includes classified information accidentally or intentionally disclosed across computer systems – “spills” Personnel Security

13 UNCLASSIFIED UNCLASSIFIED What Should You Do? Gather your facts Report it immediately Notify your immediate supervisor Notify your security office Personnel Security

14 UNCLASSIFIED UNCLASSIFIED Physical Security Sensitive Compartmented Information Facility (SCIF) –Sole place for producing, processing, storing or discussing SCI Only SCI approved persons are unescorted Locked and alarmed when unattended Classified talk stops at SCIF door Physical Security

15 UNCLASSIFIED UNCLASSIFIED Information Systems Security Information systems security is a significant IC concern Information sharing is a significant government initiative Information Systems Security

16 UNCLASSIFIED UNCLASSIFIED Critical to ISS Configuration integrity critical for approved SCI systems Media: declared and approved –“Once in the SCIF, always in the SCIF” –Security review prior to removal of any media or printed output Information Systems Security

17 UNCLASSIFIED UNCLASSIFIED Password Protection Passwords build security integrity Protection Techniques –Memorize passwords –Do not share them –Use a smart password - see your ISSO Combination of a minimum of 8 numbers, letters, special characters and capitalization Change every six months C!mePasu2 Information Systems Security

18 UNCLASSIFIED UNCLASSIFIED Viruses Information Systems Protection Techniques –Have ISSO scan incoming media –React to any virus suspicion Notify ISSO or system administrator immediately Information Systems Security

19 UNCLASSIFIED UNCLASSIFIED Telephone Communications Non-Secure (Open) Telephones –No talking around classified information –Ensure classified conversations cannot be picked up by open line Secure –Lots of colors – Red, Grey, Green –STUIII/STE Key to common level Telephone protocol - confirm to whom you are talking Information Systems Security

20 UNCLASSIFIED UNCLASSIFIED Personal Electronic Devices Electronic devices that can store, record and/or transmit digital text, digital image/video, or audio data. May interact electrically or optically with other information systems in an accredited SCIF Learn PED ground rules for the SCIFs you work in – See ISSO before introducing and PEDs into a SCIF Information Systems Security

21 UNCLASSIFIED UNCLASSIFIED Internet Discipline The Internet is an unclassified communication system –Do not “write around” classified subjects The U.S. Government has invested significantly in classified information systems for the purpose of performing classified work –Use them! Information Systems Security

22 UNCLASSIFIED UNCLASSIFIED Classification Management Process for determining nature of information and assigning proper classification, markings, dissemination and declassification instructions Required by EO 12958, as amended; Director of Central Intelligence Directives (DCIDs) –E.O establishes 3 levels of classification TOP SECRET: may cause exceptionally grave damage to national security SECRET: may cause serious damage CONFIDENTIAL: may cause damage Classification Management

23 UNCLASSIFIED UNCLASSIFIED National Security Information Military plans, weapons systems or operations Foreign government information Intelligence activities (including special activities), intelligence sources and methods or cryptology Foreign relations or diplomatic activities of the US, including confidential sources Scientific, technological or economic matters relating to national security, which includes defense against transnational terrorism Program for safeguarding nuclear materials or facilities Vulnerabilities or capabilities of systems, installations, infrastructures, projects/plans relating to national security Foreign Government Information and weapons of mass destruction Classification Management


25 UNCLASSIFIED Espionage Since World War II 151 persons convicted of espionage –140 male/11 female –100 government/51 non-government –Most held “Secret” clearances or above Six million non-spies held clearances during the period The latest case: Brian Regan

26 UNCLASSIFIED UNCLASSIFIED Brian Regan “If I commit esponage (sic) I will be putting my self and family at great risk. If I am caught I will be enprisioned (sic) for the rest of my life, if not executed for this deed.” In a letter to Saddam Hussein, Brian Regan demanded $13 million in exchange for providing data such as detailed information about US reconnaissance satellites

27 UNCLASSIFIED UNCLASSIFIED Brian Regan Facts USAF assignee to NRO (7/95 – 8/00) Considered espionage in late 1998 to solve financial problems ($100,000+) Began downloading from Intelink in 1999 Removed 15,000 pages, CD-Roms and video tapes from NRO Hired by TRW October 2000 Brought back to NRO but monitored –Surfs Libya, Iraq and China on Intelink Arrested/indicted/convicted (8/01 – 2/03) –(Attempted espionage and gathering national security information)

28 UNCLASSIFIED UNCLASSIFIED Brian Regan’s Behavior The Telltale Indicators –Deeply in debt –Worked odd hours –Foreign national spouse –Late nights in copy room –Non-reporter of foreign travel –“Top Fifty” user of Intelink

29 UNCLASSIFIED UNCLASSIFIED Myths About Spies Source: and Get rich Are insane Realize they are bad people Consumed by guilt Driven by excitement Plan their final escape Display deteriorating job performance Show outwardly suspicious behavior Caught by co-workers Control their own destiny

30 Sensitive Compartmented Information (SCI) A special category of national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems UNCLASSIFIED

31 UNCLASSIFIED National Security Information National Defense Information (military plans, weapons, OPS) Collateral (C/S/TS) SAPs Foreign Relations and Foreign Government InformationCollateral (C/S/TS) SAPs Homeland Security Information (Infrastructure, national resources, vulnerabilities and capabilities) Collateral (C/S/TS) SAPs Scientific/Technological/ Economic InformationCollateral (C/S/TS) SAPs Nuclear Information (program for protecting nuclear materials/ facilities) Collateral (Q/L) SAPs National Intelligence Information (terrorism, international threats, sources, methods) Collateral (C/S/TS) SAPs - SCI - Non-SCI Weapons of Mass Destruction (WMD) InformationCollateral (C/S/TS) SAPs

32 UNCLASSIFIED UNCLASSIFIED National Security and SCI Protection Policies National security policies –Come from National Security Council –In the name of President –As Executive Orders, Presidential or National Security Decision Directive SCI protection policies –In name of DNI –as IC Directives (ICDs) formerly DCIDs –DNI SSC Facilitated and coordinated rewrite of security series of ICDs EO EO EO Executive Orders; Presidential Decision Directives DCID 6/3 DCID 6/4 DCID 6/9 President George W. Bush DNI J. M. McConnell

33 UNCLASSIFIED UNCLASSIFIED How We Collect Intelligence Open Source Intelligence (OSINT) Geospatial Intelligence (GEOINT) Human Intelligence (HUMINT) Signals Intelligence (SIGINT)

34 UNCLASSIFIED UNCLASSIFIED Signals Intelligence (SIGINT) Collecting verbal and nonverbal signals from land, sea and satellite Protected within COMINT Control System managed by D/NSA Categories: –Communications Intelligence (COMINT) –Electronic Intelligence (ELINT) –Foreign Instrumentation Signals Intelligence (FISINT)

35 UNCLASSIFIED UNCLASSIFIED COMINT (SI) Control System Special access program designed to protect signals intelligence Named for first product it afforded protection: –COMINT (Communications intelligence) Also called –Special Intelligence Control System –SI Control System Its information is only available to holders of SI access approval Managed by D/NSA

36 UNCLASSIFIED UNCLASSIFIED COMINT (SI) Control System The original SIGINT Intercepted communications: –Telephone, , fax, etc. Still referred to as Special Intelligence or SI Must protect –What was collected –How collection was accomplished – tactics, equipment –Intelligence implications –Degree of success –Plans and targets Sharing with foreign partners

37 UNCLASSIFIED UNCLASSIFIED TALENT-KEYHOLE (TK) Control System SAP established by DCI for products from satellite reconnaissance (1960) To protect most sensitive details of satellite collection capabilities and derived information Consistent with EO and EO directing DCI to develop programs to protect intelligence sources and methods and analytical procedures

38 UNCLASSIFIED UNCLASSIFIED TALENT-KEYHOLE (TK) Control System Must protect –What’s being collected –Collection techniques –Intelligence implications –System effectiveness –Plans and targets –Operational information formerly known as “B” material –Operational, engineering and technical information

39 UNCLASSIFIED UNCLASSIFIED IC Program Managers Director, CIA National Clandestine Service HUMINT Control System Manual Open Source Intelligence (OSINT) Center Director, DIA GDIP MASINT Program MASINT Policy Series Executive Assistant Director, National Security Branch Counterterrorism Counterintelligence Director, NSA/CSS SIGINT Program Signals Intelligence Security Regulations Director, NRO National Reconnaissance Program RESERVE Control System Manual Director, NGA Geo-spatial Intelligence (GEOINT) Imagery Policy Series


41 UNCLASSIFIED UNCLASSIFIED The Day That Changed The World… World Trade Center The Pentagon Shanksville, PA September 11, 2001

42 UNCLASSIFIED UNCLASSIFIED The Post 9/11 World “We will never be the same” New threat matrix –Terrorism in forefront –Espionage still here New Security perspectives –From nation states to threatening groups –Global view with moving targets –Focus on foreign involvements and influences –Hardening of facilities Greater emphasis on information sharing –Analysis and risk management


44 UNCLASSIFIED UNCLASSIFIED Global Warfare Current state of affairs –The world's major intelligence agencies employ the latest technologies available in collection, communication and analysis of information from abroad –Counterintelligence agencies employ other technologies in efforts to identify and eliminate foreign spies at home Extracted from Spies in the Digital Age, H. Keith Melton

45 UNCLASSIFIED UNCLASSIFIED Global Warfare Some important changes to come –The primary targets of spies for all intelligence services have shifted –The traditional roles of "friends and foes" continue to blur –New technologies are changing the traditional methods and techniques (called "tradecraft") by which spies operate –Traditional tradecraft of spies are applied in new ways Extracted from Spies in the Digital Age, H. Keith Melton

46 UNCLASSIFIED UNCLASSIFIED National Threats The single greatest threat to world peace in the early part of this century will be the utilization of weapons of mass destruction―nuclear, chemical, biological and digital―by fundamentalist terrorist organizations Extracted from Spies in the Digital Age, H. Keith Melton

47 UNCLASSIFIED UNCLASSIFIED National Threats Terrorist organizations are already using Internet to: –Recruit and communicate members with similar fundamentalist beliefs –Coordinate terrorist activities with other aligned groups that share interests in a common outcome –Raise money through computer based cyber-crime –Attack national information infrastructures of hostile countries from thousands of miles away Extracted from Spies in the Digital Age, H. Keith Melton

48 UNCLASSIFIED UNCLASSIFIED DONE The 911 Commission (2004) Concluded we should: –Attack terrorist organizations –Curb growth of radical Islam –Prepare for and protect against terrorist attacks Recommendations –Create a National Counterterrorism Center (NCTC) –Unify IC under a DNI –Strengthen FBI and homeland defenders –Unify and strengthen Congressional oversight

49 UNCLASSIFIED UNCLASSIFIED DONE Intelligence Reform Act of 2004 Establishes a Senate-confirmed Director of National Intelligence (DNI) Re-designates the National Foreign Intelligence Program (NFIP) as the National Intelligence Program (NIP)

50 UNCLASSIFIED UNCLASSIFIED Director of National Intelligence (DNI) Intelligence Reform and Terrorism Prevention Act of 2004 –Title 1, Reform of the Intelligence Community –Section 1001, Subtitle A, Establishment of the Director of National Intelligence

51 UNCLASSIFIED UNCLASSIFIED DNI Roles in Security Promote intelligence information sharing Protect intelligence sources and methods Promote uniform procedures for SCI Join government-wide security clearance reform –Reciprocity of security clearances –Process for investigation and adjudication to be performed quickly

52 UNCLASSIFIED UNCLASSIFIED New Intelligence Community Independent Agency DoD Intelligence Elements Departmental Intelligence Elements

53 UNCLASSIFIED UNCLASSIFIED National Intelligence Strategy Protection of National Intelligence Objective 7 “Create clear, uniform security practices and rules that allow us to work together, protect our nation’s secrets, and enable aggressive counterintelligence activities.” “Dramatically change the basis of IC security and counterintelligence policies in order to remain effective.” Rigorously assess threat, vulnerability and protection requirements Establish uniform and reciprocal guidance

54 UNCLASSIFIED UNCLASSIFIED Parting Words Presidential direction: “...take the strongest possible precautions against terrorism by bringing together the best information and intelligence. In the war on terror, knowledge is power.” Your part: you have an individual responsibility and role in protection of SCI assets

55 UNCLASSIFIED UNCLASSIFIED Director of National Intelligence Organization Charts UNCLASSIFIED

56 UNCLASSIFIED ODNI Director of National Intelligence Mr. J. M. McConnell Principal Deputy Director of National Intelligence LTG Ronald Burgess, Acting ADNI & Acting Director of Intelligence Staff Mr. David R. Shedd ADNI & Chief Information Officer Maj. Gen. Dale W. Meyerrose, Ret. ADNI for Science & Technology Dr. Eric C. Haseltine NCIX Mr. Joel Brenner DDNI for Customer Outcomes “Want It” LTG Ronald Burgess, USA DDNI for Analysis “Know It” Dr. Thomas Fingar DDNI for Collection “Get It” Mrs. Mary Margaret Graham DDNI for Acquisitions “Build It” Ambassador Patrick F. Kennedy Civil Liberties Protection Officer Mr. Alexander W. Joel Inspector General Mr. Edward Maguire General Counsel Mr. Benjamin A. Powell Equal Employment Officer Mr. John M. Robinson NCPC Ambassador Kenneth C. Brill NCTC VADM J. Scott Redd, Ret. Iran Mission Manager Ms. S. Leslie Ireland North Korea Mission Manager Ambassador Joseph DeTrani Cuba-Venezuela Mission Manager J. Patrick Maher, Acting

57 UNCLASSIFIED UNCLASSIFIED DNI Special Security Center (SSC) DDNI for Acquisitions Ambassador Patrick F. Kennedy ADDNI for Security Ambassador Eric J. Boswell Director, Special Security Center Mr. John P. Fitzpatrick Administrative Assistant Ms. Kathleen Guisti Legal Counsel Mr. Sandy Sagalkin Executive Officer TBD Deputy Director, Policy and Planning Mr. Rick Hohman Deputy Director, Community Services Mr. William F. O’Neill Deputy Director, Oversight and Liaison Mr. Glenn Stampler Deputy Director, CAPCO Mr. Wayne Belk Deputy Director, Special Security Center Ms. Gina Otto

Download ppt "V. July 2007 UNCLASSIFIED DNI Special Security Center SCI Overview Seminar SCI Today UNCLASSIFIED."

Similar presentations

Ads by Google