10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.

Slides:



Advertisements
Similar presentations
Personnel Background Investigations. Introduction The interests of the national security require that all persons privileged to be employed in the departments.
Advertisements

Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
How to Obtain and Keep a Security Clearance?. What Is A Security Clearance? A determination made by the government that you are stable and trustworthy,
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Section Six: Foreign Ownership, Control, or Influence (FOCI)
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
Department of the Navy Information Security Program
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Espionage Indicators Briefing 1 U.S. Department of Commerce
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Initial Security Briefing
Information Systems Security Officer
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Session 3 – Information Security Policies
Chapter 2 Modern Private Security
Introduction to Security Ms. Tommie Abrams Security Branch PERS-534C Wood Hall, Bldg 769, Room 184.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
General Awareness Training
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
HIPAA PRIVACY AND SECURITY AWARENESS.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Theme: classification & distribution of government control of FEA.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
DEFENSE SECURITY SERVICE DSS Role in International Security.
1 SECURITY BRIEFING FOR ACCESSING CLASSIFIED INFORMATION.
UC DAVIS OFFICE OF RESEARCH Overview of Good Clinical Practices (GCP) Investigator and Study Team Responsibilities Miles McFann IRB Administration Training.
1. Module Rev.F1 2  The Integrated Safety Management System (ISMS) is a systematic, common sense approach to working safely. The objective of.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
ISO/IEC 27001:2013 Annex A.8 Asset management
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Privacy Act United States Army (Managerial Training)
Managing a “Data Spill”
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
DOD - Accessing Classified Information Brought to you by your company Security Officer.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Insider Threat Awareness
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Chapter 2 Modern Private Security
TWIC Training & Maritime Security Awareness
Initial Security Indoctrination
Red Flags Rule An Introduction County College of Morris
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
ACCESSING CLASSIFIED INFORMATION
Annual Security Briefing
Overall Classification of this Briefing is UNCLASSIFIED
CNATRA CYBERSECURITY.
Presentation transcript:

10/27/20111 Initial Security Indoctrination DoD

10/27/20112 The protection of Government assets, people and property, both classified and controlled unclassified, is the responsibility of each and every member of the Department of Defense, regardless of how it was obtained or what form it takes. Our vigilance is imperative in the protection of this information. Anyone with access to these resources has an obligation to protect it. The very nature of our jobs dictates we lead the way in sound security practices. Anything less is simply not acceptable. This Initial Security Indoctrination provides a good foundation. Your Agency/Department will supplement this indoctrination with local security policies, procedures, and responsibilities. Security Message

10/27/20113 Contents Physical Security Personnel Security Information Security Antiterrorism/Force Protection Information Assurance Public Release of Information Operations Security Reporting Requirements Regulations Closing

4 Objective This briefing will: Identify your personal security responsibilities Provide a basic understanding of DoD security policies Explain the importance of protecting government assets

10/27/20115 DoD Security Regulations, Directives, and Programs are established to counter threats Threats to classified and unclassified government assets can include: Insider (government employees, contractor employees, and authorized visitors) Criminal and Terrorist Activities Foreign Intelligence Services Foreign Governments Why Security?

10/27/20116 Know your local security official: Debra Murphy, FSO, Location / contact information They will provide you with guidance on security matters within your organization Local Security Office

7 Physical security offers security-in-depth, and includes, but is not limited to: Perimeter fences Employee and visitor access controls Badges/Common Access Cards (CAC) Intrusion Detection Systems Random guard patrols Prohibited item controls Entry/exit inspections Escorting Closed circuit video monitoring Additional information is available from your local Security Official Physical Security

10/27/20118 You are responsible for: Becoming familiar with local security regulations pertaining to your assigned duties Notifying your Security Official of changes in your status which could affect your security clearance, defined later in this indoctrination Individual Responsibility

10/27/20119 Your position sensitivity and/or duties will determine your level of clearance or access There are three levels of security clearance: Top Secret Secret Confidential Your local Security Official will provide additional guidance if you require a security clearance Your Security Clearance

10/27/ Refer to DoD R, DoD Personnel Security Program, Chapter 9 for full details Your Investigation and Clearance All DoD government and contractor personnel are subject to a background investigation Investigations are conducted to determine suitability for a position of trust and/or granting of a security clearance Your suitability is continually assessed

11 CLEARANCE Administrative action, usually involving a form of background investigation and adjudication determination NEED TO KNOW Determination made by an authorized holder of classified information that a prospective recipient requires access to perform a lawful and authorized government function. + ACCESS The ability and opportunity to obtain knowledge of classified information. This can involve seeing, hearing, or touching classified information, material, or equipment. = + SF 312 Classified Information Nondisclosure Agreement: All persons authorized access to classified information are required to sign a SF 312, a legal contractual agreement between you and the U.S. Government.

10/27/ You Must… Coordinate with your local security official regarding debriefings and/or out-processing requirements

13 Pertains to the protection of classified and sensitive information, to include but not limited to: Marking Handling Transmission Storage Destruction Information Security

14 There are THREE levels of Classification TOP SECRET Exceptionally Grave Damage to the National Security SECRET Serious Damage to the National Security CONFIDENTIAL Damage to the National Security Classification Levels

15 Classified Material can include ANY of these and must be properly marked: Machinery, Documents Machinery, Documents s, Models, Faxes Photographs, Reproductions Storage Media, Thumb Drives Working Papers, Meeting Notes Sketches, Maps, Products, Substances, or Materials

16 All classified information must be appropriately marked to alert potential recipients to the information’s classification. CONFIDENTIAL (C) SECRET (S) TOP SECRET (TS) ? How Do I Identify Classified Documents?

17 Classified Information: Must be under the control or guarded by an authorized person or stored in a locked security container, vault, secure room, or secure area Must be discussed on secure telephones or sent via secure communications Must be processed on approved equipment Must be destroyed by approved methods Must be discussed in an area authorized for classified discussion.

18 Antiterrorism/Force Protection Defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, including limited response and containment by local military and civilian forces Actions taken to prevent or mitigate hostile actions against DoD personnel (including family members), resources, facilities, and critical information Additional information is available from your local Security Official

19 Information Assurance (IA) In the performance of your duties you may be required to have access to government computer systems Information assurance protects and defends information and information systems by ensuring their availability, integrity, authenticity, confidentiality

20 DoD IA Responsibilities Participate in annual IA training inclusive of threat identification, physical security, acceptable use policies, malicious content and logic, and non-standard threats such as social engineering Comply with password or pass-phrase policy directives and protect passwords from disclosure You will receive additional computer security training

21 Public Release of Information Public release of government information is forbidden by CIS Security Officers, Escorts and personnel that do not have a “need to know”. Release will only be authorized by President, VP or local FSO.

22 Operations Security “OPSEC” Operations Security (OPSEC) is a systematic process used to mitigate vulnerabilities and protect sensitive, critical, or classified information Additional information is available from your local Security Official

23 Name Marital Status Citizenship Reporting Requirements… You Must Report Change of:

24 You Must Report… Adverse information concerning yourself or a co-worker Adverse information includes, but is not limited to recent arrests, alcohol or drug related problems, and/or financial difficulties, etc

25 You Must Report… Loss, compromise, (or suspected loss or compromise) of classified information, including evidence of tampering with a security container used for storage of classified information

26 You Must Report… All continuing contacts with foreign nationals, to include shared living quarters and marriage Suspicious contacts with/by foreign nationals

27 You Must Report… If a member of your immediate family (or your spouse’s immediate family) is a citizen or resident of a foreign country

28 You Must Report... Foreign travel in accordance with your agency’s policies and procedures

5/16/ You Must Report… Any potential employment or service, whether compensated or volunteer, with a foreign government, foreign national, foreign organization, or other entity, or a representative of any foreign interest

5/16/ You Must Report… A lost or stolen badge or Common Access Card (CAC) immediately to your local Security Official

5/16/ You Must Report … All holders of a security clearance must report information to their security office that might have a bearing on their continued eligibility for access to classified information

5/16/ You Must Report … Potential Espionage Indicators Exhibited by Others Unexplained affluence Keeping unusual work hours Divided loyalty or allegiance to the U.S. Disregarding security procedures Unreported foreign contact and travel Pattern of lying Attempts to enlist others in illegal or questionable activity Verbal or physical threats Inquiry about operations/projects where no legitimate need to know exists Unauthorized removal of classified information Fraud/Waste/Abuse of government credit cards and/or travel or training advances

33 YOU CAN MAKE A DIFFERENCE! Security is a team effort... Your diligence in promptly reporting concerns and adhering to your agency’s security policies and procedures will ensure the integrity of national security. As a team, we can protect our warfighters, colleagues, and families from potential harm.

34 Security Regulations Reference Security Regulations, not all inclusive: Executive Order 12958, as amended - Classified National Security Information Executive Order – Access to Classified Information Director of Central Intelligence Directive No 6/4 DoD R, DoD Information Security Program DoD R, DoD Personnel Security Program DoDD , DoD Operations Security (OPSEC) Program DoD R, DoD Physical Security Program DoDD , Information Assurance DODI , Information Assurance Implementation DoDD , DoD Antiterrorism (AT) Program Homeland Security Presidential Directive (HSPD)-12

35 Your Local Security Official Security OfficialWith Any Questions Debra Murphy – FSO Contact…