UNCLASSIFIED SE 001 FOREIGN TRAVEL BRIEFING. UNCLASSIFIED FOREIGN RECRUITMENT As a (your company) employee, you have access to critical U.S. government.

Slides:



Advertisements
Similar presentations
Student Off-Campus Activities Health and Safety The objective is to enable students to undertake off campus activities safely. 02/06/20141.
Advertisements

Presented by the San Diego Industrial CI Awareness Working Group, an Affiliate of the Industrial Security Awareness Council.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Introduction to Operations Security (OPSEC) Updated 09/28/11 1 Security is Everyone's Responsibility – See Something, Say Something!
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Time to Wave the White Flag – Compliance with the FTC’s Identity Theft Red Flags Rule William P. Dillon, Esq. Messer, Caparello & Self, P.A Centennial.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Complying with Privacy to Enable Innovation & Research
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Espionage Indicators Briefing 1 U.S. Department of Commerce
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
11 Karen Atkins 12 September 2013 The Importance of New Hire Orientation - FISWG.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
COUNTERINTELLIGENCE TRENDS
Scams Stevie's Scam School videos
One Team, One Fight One Mission Presented by the Ordnance Center & Schools Security Office.
Introduction to Network Defense
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
VIRTUAL BUSINESS RETAILING
Military families and Operational Security. Family members are vital to the success of our military. You may not know it, but you play a crucial role.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Chapter Learning Objectives
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Presented by the 1st Information Operations Command.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Counterintelligence Briefings for Foreign Travelers September 26, 2012
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
THIS BRIEFING IS UNCLASSIFIED
INITIAL OSHA & DOT TRAINING MODULE 10 Security. INITIAL OSHA & DOT TRAINING Module 10 – Security Introduction The Transportation Security Administration.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
Operational Security PCC. VII-F.1.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Section Eleven: Threat Awareness and Defensive Measures Note: All classified markings contained within this presentation are for training purposes only.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Explain why the global market is important.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Social Engineering Euphemism for cons –Confidence schemes - note the word confidence Why technologically based security protection that ignores the human.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
How Secure are YOU? Information System Audit and Control Association May 2008 Meeting Presented by Brian Findley Counterintelligence Cyber TE Honeywell.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Security Management Providing a Secure Environment.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Topic 5: Basic Security.
The Office Procedures and Technology
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
ANONYMISATION Research Data Management. c Research Data Management Sensitive Data Sensitive Data is information covering: The racial or ethnic origin.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Consumer Motivation.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
FY10 Annual Security Briefing Defensive Security for Foreign Travel Prior to Departure Remember, as a cleared person you should report any travel out of.
Protecting Your Assets By Preventing Identity Theft 1.
Provided by OSPA ( Operations Security (OPSEC)
UNCLASSIFIED // FOR OFFICIAL USE ONLY CMD LOGO Operations Security (OPSEC) CMD LOGO Assessment in-brief DD MMM YYYY Presenter Contact information.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Insider Threat Awareness
INTEGRITY PPROGRAMME Education Module.
Cybersecurity Awareness
Cover Slide – have this up on the screen before presentation begins
Presentation transcript:

UNCLASSIFIED SE 001 FOREIGN TRAVEL BRIEFING

UNCLASSIFIED FOREIGN RECRUITMENT As a (your company) employee, you have access to critical U.S. government information. The purpose of this briefing is to ensure that you understand your responsibilities to protect the information, and to make you aware of security vulnerabilities associated with foreign travel. When you contact Security about your pending foreign travel, also include information such as ‘stopovers’ and any other destinations or side trips that may not be formally listed in your itinerary. This will allow Security to provide you with any special warnings or visitor precautions for those locations.

UNCLASSIFIED FOREIGN RECRUITMENT WHAT IS RECRUITMENT? An intelligence definition of recruitment is the attainment of someone’s cooperation to provide sensitive or classified information, usually after careful assessment and patient cultivation of the target by an intelligence service. By the time the “pitch” (the offer to work for the foreign government) is made, the intelligence officer (the “recruiter”) is relatively confident of the target’s willingness to cooperate. If a failed recruitment attempt is reported, serious consequences may result for the involved Intelligence Officer (IO). If the target agrees to the recruitment, that person becomes an “asset” or “agent”, i.e. he has become a spy. The IO also called a “case officer,” handles the asset by clandestinely receiving the information, paying his agent, and guiding the asset in his illicit activities. Why a person betrays his country is a complex issue, but money is almost always involved. Pursuit of financial gain often represents some other personal or psychological need such as ego enhancement, revenge, etc.

UNCLASSIFIED FOREIGN RECRUITMENT Recruitment is usually a subtle and carefully orchestrated process to determine a person’s receptiveness to working for a foreign government. If success is perceived to be possible, the pitch will eventually be made. Initially, an IO's interest in you may be imperceptible, but may become more obvious as the relationship develops. Reporting questionable relationships, whether involving yourself, a co- worker, supervisor, neighbor, family member, or friend, is crucial to effective intervention. Espionage is never a “victimless crime.” It damages lives and threatens the security of this nation. Notify Security should you have any indication that the company or any of your co-workers may be the target of an attempted exploitation by a representative of another country. BOTTOM LINE: BE ALERT… BE AWARE… REPORT SUSPICIOUS OCCURRENCES!

UNCLASSIFIED FOREIGN TRAVEL OVERSEAS TRAVEL Overseas travel increases the risk of being targeted by foreign intelligence activities. You can be the target of a foreign intelligence or security service at any time and any place; however, the possibility of becoming the target of foreign intelligence activities is greater when you travel overseas. The foreign intelligence services have better access to you and their actions are not restricted when they are operating within their own countries. Information Age spying includes: wired hotel rooms intercepts of fax and transmissions recording of telephone calls/conversations unauthorized access and downloading, theft of hardware and software break-ins and/or searches of hotel rooms, briefcases, luggage, etc. bugged airline cabins substitution of flight attendants by spies/information collectors.

UNCLASSIFIED FOREIGN TRAVEL FAVORITE TACTICS The overseas traveler and the information in their possession are most vulnerable when on the move. Many hotel rooms overseas are under surveillance. In countries with very active intelligence/security services, everything foreign travelers do (including inside the hotel room) may be recorded. These recorded observations can then be analyzed for personal vulnerabilities (useful for targeting and possible recruitment approaches) and/or useful information (collections).

UNCLASSIFIED FOREIGN TRAVEL FAVORITE TACTICS A favored tactic for industrial spies is to attend trade show/conference type events. This environment allows them to ask a lot of questions, including questions that might seem more suspect in a different type environment. One estimate reflected that one in fifty people attending such events were there specifically to gather intelligence.

UNCLASSIFIED FOREIGN TRAVEL COMPUTER SECURITY Another area of concern while traveling is computer security. Foreign Intelligence Services are not usually fortunate enough to have information simply dropped into their hands. They rely on tactics such as stealing laptops. These portable systems may contain access capabilities that serve as doorways to additional information and systems. In addition to theft, travelers have reported unauthorized access, attempted access, damage and evidence of surreptitious entry of their portable electronic devices.

UNCLASSIFIED FOREIGN TRAVEL COMPUTER SECURITY Effective countermeasures to the aforementioned vulnerabilities include but are not limited to the following: –Refrain from bringing portable electronic devices unless it is mission critical –Use of removable hard drives –Maintain personal cognizance of portable electronic devices –Data on portable electronic devices should contain only what is needed for the purpose of your travel

UNCLASSIFIED FOREIGN VISITS International visits are a common part of everyday business in today’s international market/economy and are a welcome opportunity to boost any business. The cleared Department of Defense (DoD) Contractor is no exception to this growth in the International Market. Visits to DoD Cleared Contractors by foreign delegations and individuals have been noted as one of the most frequently utilized modus operandi for targeting US Defense Industry for the past five years in the Defense Security Service publication, Technology Collection Trends in the US Defense Industry.

UNCLASSIFIED FOREIGN VISITS TECHNIQUES Remember, it is always cheaper for any country to elicit, improperly obtain or buy a new technology or the means of producing a new technology than it is for them to pay for the research and development (R&D) themselves. There are more funds expended on R &D by the US Government and Industry than any other country in the world, making US Contractors a prime target for collection of both classified and commercial/proprietary technology by foreign countries. There are several techniques and indicators to be aware of when a foreign visit is to take place at your facility. While hosting the visit, watch for any of the following techniques to help you decide if there is the potential for you to be targeted by the foreign visitor.

UNCLASSIFIED Upon return of your trip abroad, please see your security representative for a debriefing.

UNCLASSIFIED Questions? Questions regarding the information contained or referenced in this briefing should be directed to: (FSO NAME) FACILITY SECURITY OFFICER (OFFICE) (MOBILE)