Espionage Indicators Briefing 1 U.S. Department of Commerce

Slides:



Advertisements
Similar presentations
Sexual Harassment 2012 Laws & Case History Laws & Case History Sexual Harassment is Sexual Harassment is Types of Harassment Types of Harassment Importance.
Advertisements

Conflict of Interest, Conflict of Commitment, and Outside Activities UTSA HOP 1.33 Non-covered UTSA staff 1.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Accident Incident Policy Changes to Policy September 2007.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
An introduction to Child Protection and Safeguarding
USC Health and Safety Training Workplace Violence.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
Successful Solutions Professional Development LLC A Basic Approach to Child Safety Chapter 4 Mandated Reporting Law.
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
iWATCH Army Training for Contractors “See Something -- Say Something”
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
1 Raymond Doray Conflicts between the new Canadian Money Laundering Act and the rules of professional conduct and ethics September 13, 2002.
Security Services Constitutional Issues in Private Security.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Ethics and professional Conducts for Civil engineers
USD Sexual Harassment You may not know what it is………. You may not know what it is………. But you know how it makes you feel!!! But you know how it makes you.
Western Union Confidential ©2009 Western Union Holdings, Inc. All Rights Reserved. FAC003 Suspicious Activity.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
Sexual Harassment for Managers. Definition: According to the EEOC, sexual harassment is defined as: Any unwelcome sexual advances, Requests for sexual.
AUDITS What you should know - a campus perspective. Franz Lozano Director/Budget Officer (former Internal Auditor) San Francisco State University Academic.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Accommodation & Hospitality Services STAFF BRIEFING – No 8 Personal Safety.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
CENTRA T ECHNOLOGY, I NC. 1 5 Steps To Protect Your Company Katherine D. Mills CENTRA Technology, Inc. Insider Threat:
Chapter 22: Organization and Coordination of Counterterrorism Investigations.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Peter Sakaris CISSP Booz Allen Hamilton, 1299 Farnam Street Suite 1230, Omaha, NE Office The Insider Threat.
Category Advanced Notice Required Information Required (same for both categories) FN Visitor – Facility access 3 or fewer days or attending a conference.
Volunteers and the Law Example Training Slides Check out updated Home Office Guidance: Asylum Seekers Slide 13 Getting People Involved.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Trainer: Introduces self.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Division of Risk Management State of Florida Loss Prevention Program.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
The Highest Quality for Every Meal Occasion Tackling Hidden Labour Exploitation.
INTERNAL CONTROLS What are they? Why should I care?
Occupational Health and Safety
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Final HIPAA Rule Special Training What you need to know to remain compliant with the new regulations.
1. On a blank sheet of paper… Write down one reason why you may be disciplined (written up) at work.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Insider Threat Awareness
Mandatory Child Abuse Reporting
South Texas College Fraud Awareness and Internal Controls
Workplace Health and Safety PART 3: Participation
Operations Security (OPSEC) For New Hires
INSIDER THREAT AWARENESS
An Introduction to Public Records Office of the General Counsel
Cybersecurity Awareness
Red Flags Rule An Introduction County College of Morris
Mandatory Child Abuse Reporting
Confidentiality of Information Acknowledgment and Agreement 2018
PROTEÇÃO DAS MÃOS: LIÇÕES PARA TODA A VIDA
Read slide.
Mandatory Child Abuse Reporting
Clemson University Red Flags Rule Training
UC Riverside Chairs 201 Workshop
VOLUNTEER TRAINING AVERY ELEMENTARY SCHOOL
Presentation transcript:

Espionage Indicators Briefing 1 U.S. Department of Commerce Office Of Security (OSY) 1 Security is Everyone's Responsibility Updated 11/25/14

Security is Everyone's Responsibility Who Must Have Briefing Any employee that may sponsor a Foreign National Visitor or Guest to a DOC Facility/Activity for any reason. All Department Sponsors who will act as a sponsor to a Foreign National Visitor. A departmental sponsor is a US Citizen employee of the department responsible for the day to day activities associated with the successful accomplishment of a foreign visit and for taking all reasonable steps to protect classified, Sensitive But Unclassified (SBU), or otherwise controlled, proprietary, or not for public release data, information or technology from unauthorized physical, visual, and virtual access by a Foreign National Visitor of Guest. 2 Security is Everyone's Responsibility

Security is Everyone's Responsibility Espionage Indicators Are signs that an individual, either a DOC employee or a Foreign National Visitor/Guest may be involved in illegal collection of information on behalf of a foreign intelligence organization. 3 Security is Everyone's Responsibility

Potential Indicators of Espionage Disgruntlement with the U. S. Government strong enough to cause an individual to seek or wish for revenge. Any statement that suggests conflicting loyalties may affect the proper handling and protection of sensitive information. Active attempts to encourage others to violate laws or disobey security policies and procedures. Membership in, or attempt to conceal membership in, any group which: Advocates the use of force or violence to cause political change within the U.S. Has been identified as a front group for foreign interests Advocates loyalties to a foreign interest 4 Security is Everyone's Responsibility

Potential Indicators of Information Collection Asking others to obtain or facilitate access to classified material or unclassified but sensitive information which one does not have authorized access. Obtaining or attempting to obtain a witness signature on a classified document destruction record when the witness did not observe the destruction. Offering money to a person with a sensitive job in what appears to be an attempt to entice that person into some unspecified illegal activity. Undue curiosity or requests for information about matters not within the scope of the individuals job or need to know. Unauthorized removal or attempts to remove unclassified, classified, export-controlled, proprietary, or other protected material from the work area 5 Security is Everyone's Responsibility

Potential Indicators of Information Collection Retention of classified, export-controlled, proprietary, or other sensitive information obtained through previous employment without the authorization or the knowledge of that employer. Extensive, unexplained use of copier, facsimile, or computer equipment to reproduce or transmit unclassified, sensitive, classified, proprietary, or export-controlled material. Taking classified or sensitive materials home purportedly for work reasons, without proper authorization. Working odd hours when others are not in the office or visiting other work areas after normal hours for no logical reason. Bringing cameras or recording devices, without approval, into areas storing classified, sensitive, or export-controlled material. 6 Security is Everyone's Responsibility

Potential Indicators of Illegal Income Unexplained affluence, or life style inconsistent with known income. Notably, sudden purchase of high value items or unusually frequent personal travel, which appears to beyond known income. Sudden repayment of large debts or loans, indicating sudden reversal of financial difficulties. Joking or bragging about working for a foreign intelligence service, or having a mysterious source of income. 7 Security is Everyone's Responsibility

Other Potential Indicators of Concerns Behavior indicating concern that one is being investigated or watched, such as actions to detect physical surveillance, searching for listening devices or cameras, and leaving “traps” to detect search of the individuals work area or home. Any part-time employment or other outside activities that may create a conflict of interest with one’s obligation to protect classified or sensitive but unclassified information. NOTE: The existence of one or two of the aforementioned factors does not necessarily mean that a person is engaged in espionage activity. However, the risk that someone may be involved in espionage against the DOC increases when these elements are present. 8 Security is Everyone's Responsibility

Security is Everyone's Responsibility Classified Information and Insider Threat: What Is It And Why It Matters Insider Threat is an abuse of authorized access to any U.S. Government resource (primarily classified information or systems) by an individual which harms the security of the United States. What Can Happen: Disgruntled employees can compromise our information or systems Foreign intelligence services and non-governmental entities can target, recruit, or exploit insiders What’s At Stake: •The Department’s mission •Classified and sensitive information •Our networks (classified and unclassified) •Economic advancement 9 Security is Everyone's Responsibility

Classified Information and Insider Threat: Signs & Indicators Insider Threat Indicators: Certain conduct by a co-worker which could merit additional scrutiny and reporting. • Seeking access to classified information beyond their need-to-know • Mishandling or unexplained storage of classified or sensitive material • Unauthorized downloading or removing classified information from the workplace • Mounting debt or unexplained affluence, unreasonable job dissatisfaction, unusual sense of victimization, significant interpersonal conflicts, or expressions of divided loyalties between the U.S. and another country Elicitation: A trained adversary can redirect a conversation to sensitive topics without using questions, and often without the target being aware of what’s really happening. Recruitment: People abuse access for personal reasons and adversaries look to leverage them. Basic signs of recruitment may include: • Person(s) who appear to be collecting information about you beyond the situation or setting • Asking you to do something unrelated to your job duties • Asking you to do something that is not allow by Departmental rules or U.S. Law These methods and indicators can occur online as well as in person 10 Security is Everyone's Responsibility

Classified Information and Insider Threat: You Can Make The Difference Awareness: Regardless of whether or not you access classified or sensitive information, your awareness about possible insider threats may prevent enormous damage Recruitment: • Don’t assume a concern is unimportant – immediate reporting can be the key to early detection • All employees are required to promptly and directly report to their supervisor and OSY an suspected activities or conduct that could represent a potential insider threat • Reported information will be safeguarded in accordance with all applicable laws, whistleblower protections, and civil liberty/privacy policies Other Obligations: Remember your additional reporting obligations involving: foreign travel, foreign contacts, and foreign national visitors When In Doubt, Report It! 11 Security is Everyone's Responsibility

WHEN IN DOUBT….REPORT IT!!! Security is Everyone's Responsibility If you believe that someone may be contemplating espionage or other criminal activity, or has taken steps to initiate it, you are obligated to immediately report this information to the Office of Security Headquarters through your servicing security office. 12 Security is Everyone's Responsibility

Security is Everyone's Responsibility If your reporting helps stop a case of espionage you may be eligible for a reward of up to… $500,000 13 Security is Everyone's Responsibility

Espionage Indicators Briefing The following slide has the Espionage Indicators Briefing Acknowledgement Statement Please print the Acknowledgement Statement and fax to our office. U.S. DOC Western Region Security Office Fax: (206) 526-4543 14 Security is Everyone's Responsibility

Security is Everyone's Responsibility Simply double click the picture to access the form 15 Security is Everyone's Responsibility

Security is Everyone's Responsibility Questions? 16 Security is Everyone's Responsibility

Security is Everyone's Responsibility WRSO CONTACT INFORMATION Michael Shearin Western Region Security Office Phone: (206)526-6674 Fax: (206)526-4543 Cell: (206) 396-2346 mshearin@doc.gov Micahael.Shearin@noaa.gov 17 Security is Everyone's Responsibility