Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.

Slides:



Advertisements
Similar presentations
Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
MYTHS, WIVES’ TALES & URBAN LEGENDS DEBUNKING ER MISCONCEPTIONS JUNE 2014.
Analysis to support CALEA Standards Prepared by: Christie Goddard.
FIRST THINGS FIRST Check employee’s portion of the CA-1. Be sure the date in item 11 on the CA-1 is the date the employee actually hands you the CA-1.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Drug-Free Workplace Policy. The university supports and maintains a drug-free working and living environment to provide for the health and safety of students,
INTRODUCTION TO PUBLIC DISCLOSURE RESPONSE Paula Adams, King County Public Disclosure Officer.
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
Approvals 1. 2 Chg #DateChangeSlide #Completed ByReason 18/9/2013From G Washington to B Arnold12Chris OWrong threat profile.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Espionage Indicators Briefing 1 U.S. Department of Commerce
Things To Remember About Completing I-9 Forms
Anti-Money Laundering (AML)
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
0 Cash Management: Information Session. 1 Agenda Introduction 5 minutes Topic 1: Why is the University Implementing the Cash and Billing Policy? 5 minutes.
Export Controls CBP is Turning up the Heat and the “ICE” is Not Melting April 2008 NCURA Western Regional Conference Adilia F. Koch.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
iWATCH Army Training for Contractors “See Something -- Say Something”
iWATCH Army Training for Contractors “See Something -- Say Something”
Ann Murphy, Office of the Chief Administrative Officer NOAA Trusted Agent Training Silver Spring, MD October 2014 National Oceanic and Atmospheric Administration.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Security Services Constitutional Issues in Private Security.
Foundation Financial Services Post Award Nancy Gomez Post Award Analyst.
Welcome to Jaz Hotels and Resorts Family.  By the end of this session you will be.  Aware of all the expectations regarding behavior, standards and.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Ethics and professional Conducts for Civil engineers
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
Disability Support Services New Faculty Orientation.
I-9, Immigration, E-Verify Compliance Matters. Immigration Compliance Policy  The purpose of this policy is to comply with the U.S. Immigration Law by.
Accommodation & Hospitality Services STAFF BRIEFING – No 8 Personal Safety.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Student Accounting Department Card Training Revised February 2012.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Category Advanced Notice Required Information Required (same for both categories) FN Visitor – Facility access 3 or fewer days or attending a conference.
Volunteers and the Law Example Training Slides Check out updated Home Office Guidance: Asylum Seekers Slide 13 Getting People Involved.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Trainer: Introduces self.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
INTERNAL CONTROLS What are they? Why should I care?
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Annual Refresher.  Potential Abuse/Neglect (reference Human Rights training)  Apparent Conflicts of Interest  Something that inhibits a Productive.
KUMC EXPORT CONTROLS The Challenge: Balancing National Security and Openness in Research, Education and Public Service.
The Criminal Background Check Process HR Policy Section III.B Criminal history background checks must be performed on all Hourly Student Employees.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
Labor Mobility Labor Mobility
Investigative Applications 29.6
INSIDER THREAT AWARENESS
Initial Security Indoctrination
IWATCH Army Training for Contractors “See Something -- Say Something” 1 Unclassified Always Ready. Always Alert. Because someone is depending on you. Unclassified.
Red Flags Rule An Introduction County College of Morris
Critical Incidents Identification and Reporting
Confidentiality of Information Acknowledgment and Agreement 2018
INTRODUCTION TO PUBLIC DISCLOSURE RESPONSE
UC Riverside Chairs 201 Workshop
Volunteer Opportunities
Fig Meeting January 24, 2019.
Presentation transcript:

Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing

Who Must Have Briefing 2 Any employee that may sponsor a Foreign National Visitor or Guest to a DOC Facility/Activity for any reason. All Department Sponsors who will act as a sponsor to a Foreign National Visitor. A departmental sponsor is a US Citizen employee of the department responsible for the day to day activities associated with the successful accomplishment of a foreign visit and for taking all reasonable steps to protect classified, Sensitive But Unclassified (SBU), or otherwise controlled, proprietary, or not for public release data, information or technology from unauthorized physical, visual, and virtual access by a Foreign National Visitor of Guest. Security is Everyone's Responsibility

3 Espionage Indicators Are signs that an individual, either a DOC employee or a Foreign National Visitor/Guest may be involved in illegal collection of information on behalf of a foreign intelligence organization. Security is Everyone's Responsibility

4 Potential Indicators of Espionage Disgruntlement with the U. S. Government strong enough to cause an individual to seek or wish for revenge. Any statement that suggests conflicting loyalties may affect the proper handling and protection of sensitive information. Active attempts to encourage others to violate laws or disobey security policies and procedures. Membership in, or attempt to conceal membership in, any group which: Advocates the use of force or violence to cause political change within the U.S. Has been identified as a front group for foreign interests Advocates loyalties to a foreign interest Security is Everyone's Responsibility

5 Potential Indicators of Information Collection Asking others to obtain or facilitate access to classified material or unclassified but sensitive information which one does not have authorized access. Obtaining or attempting to obtain a witness signature on a classified document destruction record when the witness did not observe the destruction. Offering money to a person with a sensitive job in what appears to be an attempt to entice that person into some unspecified illegal activity. Undue curiosity or requests for information about matters not within the scope of the individuals job or need to know. Unauthorized removal or attempts to remove unclassified, classified, export-controlled, proprietary, or other protected material from the work area Security is Everyone's Responsibility

6 Potential Indicators of Information Collection Retention of classified, export-controlled, proprietary, or other sensitive information obtained through previous employment without the authorization or the knowledge of that employer. Extensive, unexplained use of copier, facsimile, or computer equipment to reproduce or transmit unclassified, sensitive, classified, proprietary, or export-controlled material. Taking classified or sensitive materials home purportedly for work reasons, without proper authorization. Working odd hours when others are not in the office or visiting other work areas after normal hours for no logical reason. Bringing cameras or recording devices, without approval, into areas storing classified, sensitive, or export-controlled material. Security is Everyone's Responsibility

7 Potential Indicators of Illegal Income Unexplained affluence, or life style inconsistent with known income. Notably, sudden purchase of high value items or unusually frequent personal travel, which appears to beyond known income. Sudden repayment of large debts or loans, indicating sudden reversal of financial difficulties. Joking or bragging about working for a foreign intelligence service, or having a mysterious source of income. Security is Everyone's Responsibility

8 Other Potential Indicators of Concerns Behavior indicating concern that one is being investigated or watched, such as actions to detect physical surveillance, searching for listening devices or cameras, and leaving “traps” to detect search of the individuals work area or home. Any part-time employment or other outside activities that may create a conflict of interest with one’s obligation to protect classified or sensitive but unclassified information. NOTE: The existence of one or two of the aforementioned factors does not necessarily mean that a person is engaged in espionage activity. However, the risk that someone may be involved in espionage against the DOC increases when these elements are present. Security is Everyone's Responsibility

9 WHEN IN DOUBT….REPORT IT!!! If you believe that someone may be contemplating espionage or other criminal activity, or has taken steps to initiate it, you are obligated to immediately report this information to the Office of Security Headquarters through your servicing security office. Security is Everyone's Responsibility

10 If your reporting helps stop a case of espionage you may be eligible for a reward of up to…$500,000 Security is Everyone's Responsibility

11 Espionage Indicators Briefing The following slide has the Espionage Indicators Briefing Acknowledgement Statement Please print the Acknowledgement Statement and fax to our office. U.S. DOC Western Region Security Office Fax: (206) Security is Everyone's Responsibility

12 Simply double click the picture to access the form Security is Everyone's Responsibility

13 Questions? Security is Everyone's Responsibility

14 CONTACT INFORMATION Michael Shearin Western Region Security Office Phone: (206) Fax: (206) Security is Everyone's Responsibility