Presentation on theme: "Office of Security Security Education Refresher Briefing"— Presentation transcript:
1 Office of Security Security Education Refresher Briefing
2 Objectives Annual requirement Satisfactory knowledge of processing, handling and safeguarding of Classified National Security InformationAlso to prevent security violations as well.
3 AuthoritiesE.O , Classified National Security Information, as amended32 CFR Part 2001, Implementing DirectiveDOO 20-6, Director of Security; Security Manual, Section III
4 Classified National Security Information is Official information that relates to the national defense or foreign relations of the United States, which has been deemed to require protection from unauthorized disclosure
5 Levels of Classified Information Top Secret unauthorized disclosure is expected to cause exceptionally grave damage to the National SecuritySecret unauthorized disclosure is expected to cause serious damage to the National SecurityConfidential unauthorized disclosure is expected to cause recognizable damage to our National SecurityNote: lead in to the following slideThere are eights “classify reasons” under the “Classify Reason Category” in the executive orderExample Military Plans, weapons systemScientific, technological or economic matters relating to the national security
6 National Security Classify Reason Categories E.O. 12958 section 1.4 Classified information must fall under one of the following categories:1.4 (a) Military plans, weapons systems, or operations;1.4 (b) Foreign government information;1.4 (c) Intelligence activities, sources or methods or cryptology;1.4 (d) Foreign relations or foreign activities of the United States including confidential sources;
7 National Security Classify Reason Categories E. O. 12958 section 1 National Security Classify Reason Categories E.O section 1.4 cont’d1.4. (e) Scientific, technological or economic matters relating to the national security;1.4 (f) United States Government programs for safeguarding nuclear materials or facilities; or1.4 (g) Vulnerabilities or capabilities of systems, installations, projects or plan relating to the national security.1.4 (h) weapons of mass destruction
8 Reasons NOT to classify Information Information may not be classified to:Conceal violation of law, inefficiency, or administrative error.Prevent embarrassment to a person, organization, or agency.Restrain competition.Prevent or delay the release of information that does not require protection in the interests of national security.
9 Sensitive Information Information marked “Sensitive” “For Official Use Only,” “Sensitive But Unclassified,” “Company Proprietary,” etc., is not classifiedProtection from unauthorized disclosure is requiredIf information is not classified in the Department of Commerce, then it normally is “Sensitive” informationProtection of Trade Secrets (18 U.S.C. Chapter 90)The Export Administration Act of 1979 (50 U.S.C.Title 13 Census information (Fined up to $5000 or up to 5 years in prison or both)USTR/ISAC committee memberRemember sensitive information should not be marked with classified stamps
10 x x CONFIDENTIAL Memorandum For: For training purposes only Subject: Classified Stamps vs. Sensitive StampsClassified stamps should only be used on Classified National Security Information.Sensitive information should be marked with appropriate sensitive stamps. (SBU) (FOUO)This document does not contain any Classified National Security Informationxx
11 How is information classified? Original ClassificationDerivative Classification
12 Original Classification An initial determination that information needs protection in the interests of national securityMust have written authority to originally classify information
13 Original Classification Authority (OCA) Secretary of Commerce delegated authority from President, delegates within DOCSecret is highest level of OCA in DOC
14 Derivative Classification Incorporating, paraphrasing, restating, or generating in new form, information that is already classifiedWritten authority is not needed
15 Source document received Your DocumentSECRETMemo: Derivative Document/Training OnlyDerivatively Classifying From a Source Document(U) This paragraph is unclassified(S) This paragraph contains secret information paraphrased from the source document receivedSource document receivedSECRETMemo: Training Only1.(C)This paragraph is confidential2. (S)This paragraph is Secret
16 DeclassificationOnly an Original Classification Authority can authorize declassificationDocuments are generally marked for declassification within 10 years and can be up to 25 yearsE.O further amended E.ONo longer will you see the X marking on future classified documents.Classified documents must now contain a “date/year” for declassification.Sometimes and quite often documents/memo may not have a date.
17 Summary Please do not perform OCA unless you have written authority Remember you do not need written authority to perform derivative classificationPlease do not use classified stamps on sensitive information
18 Questions?Making Original and Derivative Classification decisions can be complicated. For additional training and/or questions, please contact the Office of Security’s Information Security Team at
19 Protecting Classified Information "We have an obligation to protect military, operational security, intelligence sources, and methods, and sensitive law enforcement investigations."President George W. Bush, Memo to AG, FBI, CIA, State, Treasury, and Defense, October 5, 2001The CNN and Washington Post reported President Bush’s outraged that sensitive intelligence information that was shared with Congress was being reported to the news media.In an October 5, 2001 memo to the AG, FBI, CIA, State, Treasury and Department of Defense President Bush now restricts classified briefings to the four major leaders in congress and the chairman and ranking members of the House and Senate intelligence committee members.
20 Proper Security Practices AccountabilityProtecting Classified at workTransmissionDestructionReporting Requirements
21 Accountability of Classified Information Required for all Classified National Security InformationClassified Document Control Record, form CD-481, for Top Secret and SecretRecord Top Secret and Secret documents in manual or electronic record system with classified control point or classified control officer
23 Classified Information Properly Marked Paragraphs markedDocument marked at highest level containedCover, front and back, top and bottomClassified by lineDeclassification instructions
24 (U)This memo is for training purposes only SECRET(U)This memo is for training purposes only(U) This paragraph contains unclassified information(S) This paragraph contains secret economic information relating to U.S. National Security(U) This paragraph contains unclassified informationClassified By: T. Hauser,Deputy Under Secretary for International TradeReason: 1.4 (e)Declassify: December 2003
25 Marking Classified Information Computer Media Affix labels with highest classification contained withinInclude as much other information as possible, i.e. authority and declassification instructionsSECRETClassified by:DAS for Security
26 Protecting Classified at Work Classified information must be stored in a GSA-approved security container (safe) when not in useDO NOT STORE CLASSIFIED IN THE FOLLOWING:Filing CabinetsOver head CabinetsWindow Sills
27 Safe CombinationsSecurity container combinations are classified at the level of information in the safeMemorize combinations; never write them downDon’t share with anyone who does not need to knowChange combinations when:Security container is found open or unattendedSomeone who has the the combination leavesCombination has been compromisedWhen the security container is taken out of service
28 Safe Combinations cont’d Change combinations when:Security container is found openSomeone who has the combination leavesCombination has been compromisedWhen the security container is taken out of service
29 Protecting Classified Information You must limit access to authorized persons by verifying:IdentificationNeed to knowClearanceAbility to protect
30 Protecting Classified NO unauthorized use of computers!Systems must be certified and accredited PRIOR to classified useSee your Information Technology Security Officer
31 Transmitting Classified Always use a STU-III* or STE** telephone for classified callsUse compatible facsimile machines cleared for classified use for quick and secure document transmission*Secure Telephone Unit, Third Generation**Secure Telephone Equipment
32 Transmission: Double Wrapping Inner wrappinginformationincludes full addressreturn addressclassification markings top/bottom and front and backreturn receiptMust be done to prepare for hand carry, or US PostalAffords 2 layers of protectionProtects against damageUse opaque envelopesDon’t forget a receipt
34 Transmitting Classified Secret and Confidential onlyHand-carryApproved courierUS Postal ServiceTo transmit Top Secret in any manner, call your security officer
35 Reproduction of Classified Paper (photocopier)ElectronicallyUse approved equipment only!Remember accountability, account for your copies!
36 Reproduction of Classified Approved photocopiers:Are in controlled environmentsAre sanitized after classified copyingServiced by cleared personnel or monitored service personnelContact your security officer if your copier jams while working with classified
37 Destruction at HCHB Shredding (approved cross-cut shredder) Classified waste “burn bags”Must be protected until turned-in!Turn-in: Tuesdays & Thursdays, Room B-509, 1-3 p.m.Don’t forget to record destruction!For additional “burn bag” information contact the Security Service Center at
38 Most leaks result from: NegligenceCarelessnessCasual ConversationsOpen Sources
39 Reporting Requirements All cleared employees must report contact with a foreign national who:Requests classified informationWants more information than they need to knowActs suspiciouslyReport incidents to your security officer immediately1993 Steven J. Lalas, a former State Department communications officer stationed with the embassy in Athens. He was arrested in Northern VA on May 3, The charge was passing sensitive military information to Greek officials.He claimed that he had been recruited by the Greek Military official in 1991, he feared for his families life if he did not cooperate.In short Mr. Lalas pleaded guilty to one count of conspiracy to commit espionage was sentenced to 14 years in prison without the possibility of parole.His reported profit $20,000 from
40 Reporting Requirements All employees with Sensitive Compartmented Access must:Report Planned TravelObtain travel briefingAfter-travel reportThe Office of Security’s Personnel Security Team at
41 End of Day Security Checks Check all areas to include safes, windows, desktops for classifiedComplete the SF 701, Activity Security ChecklistComplete SF 702, Security Container ChecklistTurn on alarm if appropriate
42 Unauthorized Disclosure of Security Information SF 312 Non-Disclosure AgreementSecurity Infractions/ViolationsPenalties for Compromise
43 SF 312 Non-Disclosure Agreement Binding contractLifetime obligationYou get accessGovernment gets your word to protect classified
44 Unauthorized Disclosure of Security Information Security Infraction: occurs when classified information is not safeguarded but does not result in a compromise of materialSecurity Violation: occurs when classified information is not safeguarded and could result in a probable compromise of materialCompromise: An actual compromise of classified information, whether intentional or unintentionalSecurity Infraction: 1st Offense Oral admonishment/Refresher briefing2nd Offense Written notice, copy to immediate supervisor and Agency head/refresher briefing3rd Treated as a security violation. Assessment conducted by security to determine if individual is a potential security riskSecurity Violation: 1st Offense Ranges from written notice (copy to supervisor/termination of security clearance2nd Offense Ranges from 5 days suspension without pay to removal of employment3rd Offense Rages from 30 day suspension without pay to removal of employment
45 Penalties for Compromising Classified Information (E.O. 12958) ReprimandSuspension without payDenial of accessRemovalOthers in accordance with applicable laws and regulations
46 Title 50, USC, Sec. 783 War & National Defense Unauthorized Disclosure of Classified Information. It is unlawful to give classified information to an agent or representative of any foreign government that would result in harm to the National Security.
47 Title 18, USC, Sec. 794 Crimes & Criminal Procedures Sec Gathering or delivering defense information to aid of foreign governmentDelivery of defense information with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation, shall be punished by death or by imprisonment for any term of years or for life...,Brain P. Regaan former Air Force intelligence analyst. Working at the NRO(National Reconnaissance Office) as a contractor for TRW was arrested in August Charged with spying.He was trying to sell classified documents to Libya, Iraq and China and was caught.A “Notice of Intent to Seek a Sentence of Death” was filed in April 2002 against Brian Regan.A death sentence was being considered for Robert P. Hanssen, however he received life imprisonment.Brian P. Regan plead he will receive life imprisonment.NO PAROLE!!
48 Title 18, USC, Sec. 798(1) Any person convicted of a violation of this section shall forfeit to the United States irrespective of any provision of State law -(A) any property constituting, or derived from, any proceeds the person obtained, directly or indirectly, as the result of such violation; and (B) any of the person's property used, or intended to be used, in any manner or part, to commit, or to facilitate the commission of, such violation.Robert P. Hanssen has not profited from the film and book projects that have been done on him.However his wife is receiving his pension of $39,000 a year.
49 When You Depart Commerce You must:Turn all classified material over to your classified control pointContact your Security Officer for a debriefingTurn in your ID, keys, and access cards
50 Your Security Officer Be PROACTIVE Request help Report Security violationsSuspected loss or compromiseIncidents or problems