Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.

Slides:



Advertisements
Similar presentations
Work-based learning Click on the speaker on each slide to learn more!
Advertisements

Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Drug-Free Workplace Policy. The university supports and maintains a drug-free working and living environment to provide for the health and safety of students,
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Espionage Indicators Briefing 1 U.S. Department of Commerce
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Anti-Money Laundering (AML)
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
FERPA The Family Educational Rights and Privacy Act.
UARC TRAINING 24 October 2007 Review of Internal Audit and Advisory Services California Conflict of Interest Laws and Regs Organizational Conflict of Interest.
Developing operational policies Click to add your name Pacific Sexual Diversity Network Leadership Development Suva, 23 – 25 February 2009.
Software Engineering Code Of Ethics And Professional Practice
Informed Consent and HIPAA Tim Noe Coordinating Center.
Section Three: Protection of Controlled Unclassified Information Note: All classified markings contained within this.
INTERNET and CODE OF CONDUCT
CHILDLINE (Trinidad and Tobago). Parallel Session 3 The role of child helplines as access point to child protection systems with a special focus on improving.
Anti-Money Laundering
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
UNCLASSIFIED SE 001 FOREIGN TRAVEL BRIEFING. UNCLASSIFIED FOREIGN RECRUITMENT As a (your company) employee, you have access to critical U.S. government.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Allows FBI to request (from FISA court judges) access to certain business records, including Common carriers (airlines, bus companies, and others in the.
The Ohio Ethics Law Carrie Williams. Purpose  Provide an overview of The Ohio Ethics Commission and The Ohio Ethics Law  Explain the components of The.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Ethics and professional Conducts for Civil engineers
HIPAA PRIVACY AND SECURITY AWARENESS.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
Sunshine Law, Public Records and Ethics. Discussion Topics Government in the Sunshine Public Records Code of Ethics The Bluewater Bay MSBU Board has a.
Theme: classification & distribution of government control of FEA.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
 What is conflict of interest and how can it be avoided  What factors should be considered when determining a “ fair wage “
2012 STAAR ALT General Security Training Presented by: Campus Test Coordinator.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 1 McGraw-Hill Chapter 2 The HIPAA Privacy Standards HIPAA for Allied Health Careers.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Accommodation & Hospitality Services STAFF BRIEFING – No 17 Handling Suspicious Packages.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Copyright© 2010 WeComply, Inc. All rights reserved. 11/12/2015 Conflicts of Interest.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Unit (7) Why businesses make decisions? The decision that they make might include. - what to produces, where to locate the premises, what method of production.
 GENERAL RULE “Employees shall protect and conserve Federal property and shall not use it for other than authorized purposes.” 5 CFR (b)(9)
Privacy Act United States Army (Managerial Training)
Responsibilities of Financial Institutions in the AML Architecture – AML Regulations in Afghanistan Mr. Jafar Sadat, Da Afghanistan Bank.
FY10 Annual Security Briefing Defensive Security for Foreign Travel Prior to Departure Remember, as a cleared person you should report any travel out of.
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
How to CORRECTLY Complete a TEASE Access Request Form.
1. On a blank sheet of paper… Write down one reason why you may be disciplined (written up) at work.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
HIPAA Training. What information is considered PHI (Protected Health Information)  Dates- Birthdays, Dates of Admission and Discharge, Date of Death.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
Technology Transfer and
Cleared Employee Security Training
INSIDER THREAT AWARENESS
Derivative Classification Overview
Initial Security Indoctrination
Reasonable suspicion Drug/alcohol testing
Red Flags Rule An Introduction County College of Morris
The Health Insurance Portability and Accountability Act
Presentation transcript:

Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES

Employee Reporting   Supervisors and coworkers are the first line of defense against espionage.   The government relies on you to protect national security by reporting any behavior that you observe that may be related to a potential compromise of classified information.   You are encouraged and sometimes obligated by Executive Orders, Presidential Decision Directives and U.S. Codes, as well as by DoD Directives, regulations, and instructions, to report such behaviors.   However, judgment calls are often required by the potential reporter, and this often leads to indecision or choosing not to report anything.   This briefing presents a focused list of serious counterintelligence- and security-related behaviors that, if observed or learned about, should be reported immediately to appropriate counterintelligence or security authorities.

Employee Reporting (Cont’d)   All these behaviors are serious and require little or no speculation.   Upon receiving your report, a security professional will follow up with appropriate verification.   If you are at all uncertain, it is better to report it than not.   The counterintelligence and security people will know how to handle your report.   The list of behaviors is not intended to be exhaustive. You should report any additional observed behaviors that may parallel or exceed the concerns listed in this briefing.   This briefing will help you develop a better understanding of exactly what to report and instill a greater commitment to reporting it.

Recruitment   Foreign intelligence entities are on the lookout for people who can be solicited to commit espionage against the U.S.   Willing and would-be spies often approach foreign intelligence operatives on their own initiative and volunteer for recruitment.   It is a major task of counterintelligence to intercept these relationships.   First, the recruitment cycle requires that contact be established between the foreign intelligence agency and the potential spy, whether by direct recruitment or by volunteering.   While the recruitment relationship almost always involves contacts with foreigners, an already committed U.S. spy may approach you or a colleague at your workplace for recruitment into espionage.

Reportable Behaviors: Recruitment   You become aware of a colleague having contact with an individual who is known to be, or is suspected of being, associated with a foreign intelligence, security, or terrorist organization.   You discover that a colleague has not reported an offer of financial assistance by a foreign national other than close family.   You find out that a colleague has failed to report a request for classified or unclassified information outside official channels to a foreign national or anyone without authorization or need to know.   You become aware of a colleague engaging in illegal activity or if a colleague asks you to engage in any illegal activity.

Information Collection   Before classified or other kinds of sensitive materials can be passed to a foreign intelligence agency, they must be collected.   They can be stolen (e.g., paper placed in a briefcase and taken out of the office), photographed, collected via computers, or obtained through eavesdropping or other surveillance devices.   With its and database capabilities, the computer age has offered new opportunities to potential spies for collecting data.   While technical countermeasures can control some situations, it is up to coworkers to watch for and, if possible, identify breaches in the system that allow classified and sensitive information to be collected for espionage purposes.

Reportable Behaviors: Information Collection  .. a colleague asks you to obtain classified or other protected information in any format to which the person does not have authorized access;  .. a colleague asks you to witness signatures for destruction of classified information when you did not observe the destruction;  .. you observe a colleague operating unauthorized cameras, recording devices, computers, or modems in areas where classified data are stored, discussed, or processed;  .. you become aware of the existence of any listening or surveillance devices in sensitive or secure areas;  .. you find out that a colleagues has been keeping classified material at home or any other unauthorized place;  .. you discover a colleague acquiring access to classified or   unclassified automated information systems without authorization;  .. you observe a colleague seeking to obtain access to sensitive   information inconsistent with present duty requirements.

Information Transmittal   Coworkers must be aware of this problem and, if an illicit transmission is detected, report it directly and immediately to the designated cognizant counterintelligence or security authorities.   Once a relationship with a foreign intelligence agent is established and information begins to flow, illicit trips abroad by the recruited spy usually follow (meetings are easier to arrange abroad than in the U.S.).   These journeys are often concealed by the person and the foreign contact is not reported. If you learn of such journeys or contacts, you should report.   In former days, the transmittal of classified or sensitive information took the form of stealing documents and physically handing them to the foreign intelligence agent.   Spies could photocopy paper materials, smuggle materials out in briefcases, even illicitly take photographs in the workplace.   Nowadays, there are many more opportunities to transmit information. With the advent of , faxes, thumb drives and other technological capabilities, it is possible to transmit large quantities of information without being immediately caught.

Information Transmittal: Reportable Behaviors   You see someone removing classified material from the work area without appropriate authorization, either by physically taking it home or on travel, or by ing or faxing it out of the office.   The same rule applies for other protected materials, such as export-controlled or proprietary items.   You observe a colleague using unclassified FAX or computer to transmit classified material.   You observe a person improperly removing the classification markings from documents.   You hear a colleague discussing classified information on a non-secure telephone.   You become aware that people with TS/SCI or contractors with a reporting requirement have attempted to conceal any work-related foreign travel and any personal foreign travel.

Suspicious Behaviors   The new DoD Instruction , Counterintelligence (CI) Awareness, Briefing, and Reporting Programs (August 7, 2004) lists an additional series of eight items that, while not exactly clear-cut violations, have been traditionally considered behaviors that may well be connected to counterintelligence and security problems.   These behaviors do require some degree of judgment before reporting.   Often you might not know about them directly but only by hearsay.   Often they may easily carry plausible alternative explanations. They are included here with the caveat that they do require a judgment call before reporting. If you are at all uncertain, it is better to report the behavior than to make no report at all.

Examples of Suspicious Behaviors   Repeated or un-required work outside of normal duty hours, especially unaccompanied.   Unexplained or undue affluence, including sudden purchases of high-value items (e.g., real estate, stocks, vehicles, or vacations) where no logical income source exists.   Attempt to explain wealth by reference to inheritance, luck in gambling, or some successful business venture.   Sudden reversal of financial situation or sudden repayment of large debts or loans.   Attempts to entice DoD personnel into situations that could place them in a compromising position.   Attempts to place DoD personnel under obligation through special treatment, favors, gifts, money, or other means.   Short trips to foreign countries or travel within the United States to cities with foreign diplomatic activities for reasons that appear unusual or inconsistent with a person’s interests or financial means.

Counterintelligence Reporting Essentials (CORE)  O  If you become aware of any of the previous behaviors or activities*, report them to the Facility Security Officer or supervisor. *These behaviors are derived from the DoD Instruction , Counterintelligence Awareness, Briefing, and Reporting Programs

Thank You Thank you for taking the LAI Online Training Click below to submit and record this session in the database