How To Conduct An Administrative Inquiry (AI) Due To A Security Violation www.dss.mil.

Slides:



Advertisements
Similar presentations
Data Security Breach Code of Practice. Data Security Concerns Exponential growth in personal data holdings Increased outsourcing 3 rd countries cloud.
Advertisements

Corrective Actions.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Privacy and Information Security Training ( ) VUMC Privacy Website
How to Manage a Contamination Incident Defense Security Service Carolyn Shugart Information Technology Specialist Standards & Quality Branch.
Managing a “Data Spill” Corrie Velez Technical Security Orlando, Florida March 14, 2012.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Defense Security Service Facility Clearance Branch (FCB)
The Department of Defense Intelligence Oversight Program
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Accident Investigation
What Should You Do If OSHA Knocks Mark McDaniel, INSafe Consultant.
Information Systems Security Officer
1 Change Management FOR University Medical Group Saint Louis University Click this icon for Audio.
Florida Industrial Security Workgroup Self-Inspections What are Self-Inspections Why should Self-Inspections be conducted When should Self-Inspections.
Wisconsin Knowledge & Concepts Examination (WKCE) Test Security Wisconsin Department of Public Instruction Office of Educational Accountability 06/26/2013.
Session 3 – Information Security Policies
Department of Human Resources. Progressive Process A progressive discipline system gives employees ample warning of misconduct or work-related problems;
Network security policy: best practices
1 Creating a Joint Personnel Adjudication System (JPAS) Analysis Report Michael S. Campbell Industrial Security Specialist Defense Security Service San.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
OH&S Management System
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Incident Reporting Procedure
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Security Policies Jim Stracka The Problem Today.
FHSAA Eligibility and Compliance Allegations And Investigations Florida High School Athletic Association.
Basics of OHSAS Occupational Health & Safety Management System
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
1 Records Inventory & Data Classification Workshop Data Classification Project Note: This is an example of one agency’s approach to meeting the state records.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Defense Security Service New Rating Process Current as of 10/19/2011.
Guidance Notes on the Investigation of Marine Incidents
Section 54’s 54.Inspector’s power to deal with dangerous conditions – (1) if an inspector has reason to believe that any occurrence, practice or condition.
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
1. Objectives  Describe the responsibilities and procedures for reporting and investigating ◦ incidents / near-miss incidents ◦ spills, releases, ◦ injuries,
Introduction to Security
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Audit Planning Process
Accountability Presented by Mollie Schaffer August 13 th, 2014.
1 Standard Test Administration Testing Ethics Training PowerPoint Spring 2011 Utah State Office of Education.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
“Safety & Hope” Monitoring Success in the Texas Juvenile Justice System.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Administrative Inquiries
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Privacy Act United States Army (Managerial Training)
Managing a “Data Spill”
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
Testing Liaison Basic Training. Who can be a Testing Liaison? ONE RULE: INSTRUCTORS AND INSTRUCTIONAL AIDES CANNOT BE TESTING LIAISONS OR PROCTORS Typically,
Accident Investigation. What is an Accident? n An unintended happening, mishap. n Most often an accident is any unplanned event that results in personal.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Information Management and the Departing Employee.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Incident Reporting And Investigation Program
Derivative Classification Overview
Introduction In the first lesson we demonstrated the following:-
Incident Reporting And Investigation Program
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
HQ Expectations of DOE Site IRBs
Presentation transcript:

How To Conduct An Administrative Inquiry (AI) Due To A Security Violation

Security Violations Can this happen in your facility? Has this happened in your facility? When will this happen in your facility? “It is a requirement of the NISPOM and your duty as FSO to report Security Violations.” NISPOM paragraph 1-303

Introduction and Objectives -Why Me ? Gary S. Layne, Sr. Industrial Security Representative -Target Objective: Providing Facility Security Officers the key steps in conducting an Administrative Inquiry caused by a Security Violation to ensure that risks to classified information are mitigated.

Security Violation Definition: – A failure to comply with the policy and procedures established by the NISPOM that reasonably could result in the loss or compromise of classified information. DoD M (NISPOM) Purpose of the Administrative Inquiry (AI): – To determine if classified information was at risk of compromise – To determine the individual(s) that are responsible for the violation. – To determine if appropriate corrective actions have been taken to preclude a reoccurrence.

Mitigate The Risk What is the extent of the violation? Did the FSO take the proper corrective actions? Who was responsible for the violation? What are the threats? What vulnerabilities caused the violation? Was classified information subject to loss or compromise? Has the FSO taken action to protect the classified material?

Types of Security Violations

Tools needed to complete the Administrative Inquiry (AI) Obtain the tools to conduct the AI. – FSO Toolkit: Administrative Inquiry (AI) Job Aid For Industry – Information Systems ODAA Process Manual – Section 4.5.1

The Security Violation Process Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure Conduct inquiry and develop reports Review reports and provide support Goal to process: 30 days ISR FSO FSO: 1 – 2 days ISR: 3 days FSO: 15 days ISR: 5 days FOC: 5 days

Conducting a Preliminary Inquiry Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure ISR has 3 days to process Secure classified information Gather facts Determine if loss, compromise or suspected compromise Identify vulnerabilities or continuing risk Identify those involved No Compromise Compromise Finalize and retain report Submit culpability report FSO FSO: 1 – 2 days Continue the process

Sample of No Compromise Sample of no compromise final report maintained in the facility and kept for review by the DSS Rep during the next assessment.

Submitting an Initial Report Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure ISR has 3 days to process FSO ISR Initial Report Description of Violation Counterintelligence Concerns Classification Continuing risks or vulnerabilities Other facilities GCA POC Confirmation that classified material is protected Special category, if applicable FSO: 1 – 2 days

Initial Report If it involves, Secret and Confidential: – report to DSS within 72 hours (3 days) If it involves, Top Secret: – Within 24 hours (1 day) Sample of an initial report (send to IS Rep, FOC, CISA & ISSP if applicable)

Conducting the Inquiry Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure FSO Facts Possible causes Persons responsible Corrective actions Unauthorized access to the classified information FSO: 15 days

Final Report Conducting AI for Final Report – Inform senior management of the active administrative inquiry. – Interview all personnel/witnesses involved in the violation: Employees Vendors Sub-contractors Visitors Consultants – When appropriate, search workspaces, computer systems, s, cell communications, etc…. – Gather and analyze all facts – Prepare final report for DSS

Baseline Questions Baseline Questions for the Inquiry (Remember to use the AI Job Aid for Industry) Who discovered and reported the incident? What corrective actions were taken? What specific classified information and/or material was involved and what is the classification level of the information? Was the information properly classified? What steps were taken to locate the material if classified information is alleged to have been lost? What specific NISPOM references were violated? What persons, situations, or conditions caused or contributed to the incident? When did the incident occur and when was the classified information secured? Where did the violation originate and was the classified information further disseminated or circulated (i.e. data spill)? Why did the incident occur? Is there a weakness or vulnerability in established security practices and procedures that contributed to the incident or violation? Was there a specific failure to comply with established security practices and procedures that could lead to compromise if left uncorrected? Did a lack of understanding of the SCG or applicable security guide contribute to the violation?

Making a Determination Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure FSO Loss Compromise Suspected Compromise No Compromise FSO: 15 days “Compromise Cannot Be Ruled Out”

Filing a Culpability Report Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure Final Report Summary of Inquiry Rationale for determination Complete description of all circumstances leading to the violation Culpability Report Factual details Risk of culpable person’s continued access to classified information FSO: 15 days

Reviewing the Final Report Security Violation Preliminary Inquiry Initial Report Inquiry and Determination Final Report Field Office Chief Approval Violation Closure ISR Final Report Essential Facts Summary of Inquiry Rationale for determination Complete description of all circumstances leading to the violation Corrective actions Resolution Culpability ISR: 5 days FSO

Sample of Final Report Sample of Final Report & IS Checklist (if spillage). (Send to IS Rep, ISSP, FOC & CISA)

Sample of Culpability Report File Report Incident in JPAS Sample of culpability report – Faxed to PSMO-I (571) NISPOM Paragraph (1-304)

Challenges & Reminders Interviewing managers, peers, co-workers, etc…is very intimidating. Just remember, as the FSO…you are simply doing your job! Build rapport with the workforce and these security violations will be easier to handle! Getting management support is crucial…so always communicate and educate Sr. Management on the reporting requirements of the NISPOM! You are the Facility Security Officer (FSO) of this cleared facility, and have total control, management, and input of the administrative inquiry being sent to DSS caused by a security violation. When in doubt or have concerns, communicate with your DSS Representative! Spillages are considered a “Loss”. Cleared facilities shall establish and apply a graduated scale of disciplinary actions on culpable employee(s). Insider Threat Program Requirements (soon to come) Facility's security staff, FSO or the facility Key Management Personnel (KMP) are involved in the violation, the DSS REP will conduct the administrative inquiry (AI).

Consequences of Security Violations Compromise Strategic Plans Compromise Technological Knowledge Harm Diplomatic Efforts Endanger the war fighter Cause death Damage to national security Loss of technological advantage

23 Questions? (757) INDUSTRY