ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO 207-12) NOAA ADMINISTRATIVE ORDER 207-12 (NAO 207-12)

Slides:



Advertisements
Similar presentations
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Advertisements

Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
GUIDE TO GLACIER FOR FOREIGN INDIVIDUALS. Contents GLACIER features and benefits Who requires a GLACIER tax record? Payments that require a GLACIER tax.
GLACIER Guide for Campus Administrators. Agenda What is GLACIER?: GLACIER Benefits and Features Who Needs a GLACIER Record?: People and Payments that.
Financial Policies Training: Payments to Individuals for Services (2.3.1) Effective Date: January 1, 2009.
FIRST THINGS FIRST Check employee’s portion of the CA-1. Be sure the date in item 11 on the CA-1 is the date the employee actually hands you the CA-1.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Drug-Free Workplace Policy. The university supports and maintains a drug-free working and living environment to provide for the health and safety of students,
PCard Program Roles and Responsibilities Review Karen Brookbanks, C.P.M., CPPB.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Espionage Indicators Briefing 1 U.S. Department of Commerce
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Records Management at UW-Green Bay Or, I am out of space and just want to throw some things away!
0 Cash Management: Information Session. 1 Agenda Introduction 5 minutes Topic 1: Why is the University Implementing the Cash and Billing Policy? 5 minutes.
1 Cash Handling – It’s my job Whether you take in lots of money or … you collect “pennies”
Chapter 18 Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
NOAA Deemed Exports Compliance Program Ann Murphy/Michele Peruch Office of the Chief Administrative Officer Hugh Schratwieser General Counsel Washington,
Internal Control Concepts A Guide for Deans, Directors, and Department Chairs.
SUMMER WORK AND TRAVEL Program Orientation. Welcome Welcome to CENET: Cultural Exchange Network’s Summer Work and Travel Program. I would like to take.
Ann Murphy, Office of the Chief Administrative Officer NOAA Trusted Agent Training Silver Spring, MD October 2014 National Oceanic and Atmospheric Administration.
How to Host a J-1 Scholar Alicia Stignani, Director, Human Research Services Michele Miller, Exchange Specialist Kennesaw State University Division of.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
9/8/20151 Voice Mail Training for State Employees Presented by: Stacy Knickerbocker Telecommunications Specialist DOA/ITSD/NTSB
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
2015 ANNUAL TRAINING By: Denise Goff
Segregation of Duties– Sponsored Programs APM
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Disability Support Services New Faculty Orientation.
I-9, Immigration, E-Verify Compliance Matters. Immigration Compliance Policy  The purpose of this policy is to comply with the U.S. Immigration Law by.
Accommodation & Hospitality Services STAFF BRIEFING – No 8 Personal Safety.
Michelle Groy Johnson Quality Improvement Officer Research Integrity Office Tough Love: Understanding the Purpose and Processes of Quality Assurance.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Travel Update and Review Controller’s Office October 26, 2011.
Internal Controls and Fraud Convery Describe an Internal Controls System and its elements Identify specific Internal Control issues in a NPO Consider.
Lesson Goal After completing this lesson, the student shall be able to identify indicators of an incendiary fire and protect and preserve evidence after.
Privacy & Confidentiality
Category Advanced Notice Required Information Required (same for both categories) FN Visitor – Facility access 3 or fewer days or attending a conference.
Volunteers and the Law Example Training Slides Check out updated Home Office Guidance: Asylum Seekers Slide 13 Getting People Involved.
College Reviews An Overview Presented by Howard Lutwak, CIA Director of Internal Audit January 2004.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Collective Bargaining Process UW System Academic Staff.
OSHA – What to Expect When You’re Inspected (Following Federal Guidelines)
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
INTERNAL CONTROLS What are they? Why should I care?
The Criminal Trial. Before the Trial Rights, Obligations and Procedure Chapter 8.
Big Problems with an Expired Green Card U.S. Immigration Center.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
How to CORRECTLY Complete a TEASE Access Request Form.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
KUMC EXPORT CONTROLS The Challenge: Balancing National Security and Openness in Research, Education and Public Service.
Right to Work in the UK Make a note of this website:-
Insider Threat Awareness
I-9 Instructions and FAQs
Award Set-Up and Advances
Family Medical Leave Administration Services
Legal Implications.
Inviting J-1 Exchange Visitors
Red Flags Rule An Introduction County College of Morris
what your general counsel and human resources would like you to know
INTERNAL INVESTIGATIONS AND CITIZEN COMPLAINTS
F-1 Visa International Students
Volunteer Opportunities
Leave Administration Services
Objectives The Core Plan of the Suggestion System is intended to encourage teamwork, foster continuous quality improvement, and provide fair and equitable.
Presentation transcript:

ESPIONAGE INDICATORS

ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO ) Michael J. Shearin SECURITY SPECIALIST Western Region Security Office

WHO MUST HAVE BRIEFING? Any employee that may sponsor a Foreign National Visitor or Guest to the facility for any reason. All Department Sponsors that will act as sponsor to a Foreign National Visitor

What is a departmental sponsor? A departmental sponsor is a U. S. Citizen employee of the department responsible for the day to day activities associated with the successful accomplishment of a foreign visit and for taking all reasonable steps to protect classified, Sensitive But Unclassified (SBU), or otherwise controlled, proprietary, or not for public release data, information or technology from unauthorized physical, visual, and virtual access by a Foreign National Visitor of Guest.

Who is a Foreign National Visitor/Guest? Any person who is not a citizen or national of the United States. EXCEPTION: Those persons that are in possession of a valid Resident Alien Card (Green card) are not considered Foreign National Visitors/Guests.

WHAT ARE ESPIONAGE INDICATORS? Signs that an individual, either a DOC employee or a Foreign National Visitor/Guest may be involved in illegal collection of information on behalf of a foreign intelligence organization.

BENEFITS TO THE PROGRAM If your reporting helps stop a case of espionage, you may be eligible for a reward of up to…………. $500,000

POTENTIAL INDICATORS OF ESPIONAGE Disgruntlement with the U. S. Government strong enough to cause an individual to seek or wish for revenge. Any statement that suggests conflicting loyalties may affect the proper handling and protection of sensitive information. Active attempts to encourage others to violate laws or disobey security policies and procedures. Membership in, or attempt to conceal membership in, any group which: 1.Advocates the use of force or violence to cause political change within the U.S. 2.Has been identified as a front group for foreign interests 3.Advocates loyalties to a foreign interest

POTENTIAL INDICATORS OF INFORMATION COLLECTION Asking others to obtain or facilitate access to classified material or unclassified but sensitive information which one does not have authorized access. Obtaining or attempting to obtain a witness signature on a classified document destruction record when the witness did not observe the destruction. Offering money to a person with a sensitive job in what appears to be an attempt to entice that person into some unspecified illegal activity. Undue curiosity or requests for information about matters not within the scope of the individuals job or need to know. Unauthorized removal or attempts to remove unclassified, classified, export-controlled, proprietary, or other protected material from the work area

POTENTIAL INDICATORS OF INFORMATION COLLECTION Retention of classified, export-controlled, proprietary, or other sensitive information obtained through previous employment without the authorization or the knowledge of that employer. Extensive, unexplained use of copier, facsimile, or computer equipment to reproduce or transmit unclassified, sensitive, classified, proprietary, or export-controlled material. Taking classified or sensitive materials home purportedly for work reasons, without proper authorization. Working odd hours when others are not in the office or visiting other work areas after normal hours for no logical reason. Brining cameras or recording devices, without approval, into areas storing classified, sensitive, or export-controlled material.

POTENTIAL INDICATORS OF ILLEGAL INCOME Unexplained affluence, or life style inconsistent with known income. Notably, sudden purchase of high value items or unusually frequent personal travel, which appears to beyond known income. Sudden repayment of large debts or loans, indicating sudden reversal of financial difficulties. Joking or bragging about working for a foreign intelligence service, or having a mysterious source of income.

OTHER POTENTIAL INDICATORS OF CONCERN Behavior indicating concern that one is being investigated or watched, such as actions to detect physical surveillance, searching for listening devices or cameras, and leaving “traps” to detect search of the individuals work area or home. Any part-time employment or other outside activities that may create a conflict of interest with one’s obligation to protect classified or sensitive but unclassified information. NOTE: The existence of one or two of the aforementioned factors does not necessarily mean that a person is engaged in espionage activity. However, the risk that someone may be involved in espionage against the DOC increases when these elements are present.

WHEN IN DOUBT….REPORT IT!!! If you believe that someone may be contemplating espionage or other criminal activity, or has taken steps to initiate it, you are obligated to immediately report this information to the Office of Security Headquarters through your servicing security office.

FOREIGN NATIONAL VISITOR PROCEDURES Employees wishing to vouch a foreign national onto any DOC facility must complete the on line notification process. tmhttp:// tm This will allow you to input the visitor information. Once completed, click SEND, and a will be sent to those that need the information to input into our foreign national database.

FOREIGN NATIONAL VISITOR PROCEDURES Once the information has been received, you will receive an letting you know the visit has been approved.

FOREIGN NATIONAL GUEST PROCEDURES This starts the same way as a visitor After completing the on line portion, the sponsor must complete the Endorsement supplement and Appendix B to NAO/DAO

FOREIGN NATIONAL GUEST PROCEDURES Once you have completed the endorsement supplement and the Appendix B, this is then forwarded to your line office. Line office contacts may be found at

FOREIGN NATIONAL GUEST PROCEDURES Once the signed appendix B is received by the security office, you will receive an e- mail stating the visit is approved with caveats. What is required is when the guest arrives, they are required to sign the Appendix C to NAO/DAO within 3 days of their arrival.

FOREIGN NATIONAL GUEST PROCEDURES Once the Appendix C is signed, forward to the servicing security office. Once received, you will receive an stating that you have completed all requirements for the guest.

FOREIGN NATIONAL GUEST PROCEDURES If the guest is long term (over 1 year) you are required to complete the endorsement supplement, appendix B and C at the guests anniversary date. Do not wait until the last minute to get this paperwork in. If there is a delay, it is up to the Regional Security Officer if the guest may remain ion the facility or must leave until paperwork is completed.

????? QUESTIONS ?????