Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

FOIA Exemption 1 & E.O Classified National Security Information
Merlin RAMCo Inc Initial Security Education.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Annual Security Refresher Briefing. General Information Edmonds Enterprises Services (EES) and Logistics Applications Inc. (LAI) as Defense Contractors.
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
Office of Security Security Education Refresher Briefing
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
The Department of Defense Intelligence Oversight Program
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
1 Disclaimer The following information was presented by Andrew Levy of the Office of General Counsel of DHS on June 12, 2007 at the 2007 Chemical Sector.
Topic 6 Security Enabling Objectives 6.1 DISCUSS the origin of Communication Security and Operational Security. 6.2 DEFINE COMSEC, DoD COMSEC Policy, and.
Initial Security Briefing
Classified Data Handling By Francesco Scarimbolo.
Information Systems Security Officer
Virginia Army National Guard Personnel Security
Security Education Briefing
Vital records mean essential agency records that are needed to meet operational responsibilities under national security emergencies or other emergency.
1 Creating a Joint Personnel Adjudication System (JPAS) Analysis Report Michael S. Campbell Industrial Security Specialist Defense Security Service San.
CONTRACTOR MANPOWER REPORTING
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Security Policies University of Sunderland CSEM02 Harry R. Erwin, PhD.
UNCLASSIFIED//FOUO UNCLASSIFIED//FOUO SECURITY AND THE LAW ACofS, SECURITY HQ, USAINSCOM FORT BELVOIR, VA THIS BRIEFING HAS BEEN COORDINATED.
Aerospace Industries Association Intellectual Property Committee Fall 2009 meeting SMC Enabling Clause Holly Emrick Svetz (703)
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Security and Privacy Strategic Global Partners, LLC.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Theme: classification & distribution of government control of FEA.
MARKING CLASSIFIED MATERIAL
TSP 301-D , Phase II, OCS TSP 301-D , Phase II, OCS Protect Classified Information.
Information Security 2010 Worldwide Security Conference.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Family Educational Rights and Privacy Act. From the moment a child enters the school system, sensitive information is collected about the child (and even.
DEFENSE SECURITY SERVICE DSS Role in International Security.
1 SECURITY BRIEFING FOR ACCESSING CLASSIFIED INFORMATION.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
What is Mandatory Declassification Review (MDR)? MDR is a means by which any individual, to include members of the public, can request any agency to review.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Mandatory Declassification Review and the Interagency Security Classification Appeals Panel Society of American Archivists, Austin, Texas Session 603:
The Department of Defense Intelligence Oversight Program
National INFOSEC Organisations and INFOSEC Management in Hungary.
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
Indiana’s Public Access Laws Heather Willis Neal Indiana Public Access Counselor Indiana Association of Cities and Towns Red Flag and Sunshine Workshop.
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Information Security. Your responsibilities as a Government of Canada employee.
DOD - Accessing Classified Information Brought to you by your company Security Officer.
Foreign affairs: National Security While at first glance, it may be easy to assume that America’s national security is a domestic affair, and it certainly.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Declassifying the Foreign Relations Series Bringing the Official Record to light.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Security Education Refresher Briefing. Objectives Annual requirement Satisfactory knowledge of processing, handling and safeguarding of Classified National.
Domain 2 – Asset Security
Office of the President of the Philippines Memorandum Circular No. 78
Derivative Classification Overview
Initial Security Indoctrination
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
ACCESSING CLASSIFIED INFORMATION
Annual Security Briefing
Personnel Clearance Debriefing
The Executive Branch.
Electronic Surveillance, Post 9/11
Export Controls – Export Provisions in Research Agreements
Presentation transcript:

Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD

Purpose n Background SF312 n Nondisclosure Agreement n Nature of Classified Information n Classification of Information n Derivative Classification n Marking of Classified Information n Protection of Classified Information

Unauthorized disclosures of classified information threaten the security of our citizens. Background

FBI Agent Robert P. Hanssen Most Damaging Spy Since Ames Aka “B” aka “Ramon Garcia” aka “Jim Baker” aka “G. Robertson” aka “Alleged Traitor”

Hansen - Dead drop points in and around Washington D.C.

President directed all persons authorized access: 1. Required to sign a nondisclosure agreement NdA 2. Anyone who decline to sign an NdA shall be denied access Background

Nondisclosure Agreements. The SF 312 is to be executed by all cleared Department of Defense (DoD) military and civilian personnel and contractor employees as a condition of access to classified information.

Nature of Classified Information. Classified national security information (or classified information) is: "information that has been determined pursuant to Executive Order (E.O.) 12958, "Classified National Security Information," April 17, 1995 or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form."

Nature of Classified Information Information is classified under one of three designations 1. "Top Secret" 2. "Secret" 3. "Confidential" Depending on the level of sensitivity

Note: Security Classification can not be used to: “conceal violations of law, inefficiency, or administrative error….” ie. Prevent embarrassment to a person, organization or agency.

The Classification of Information Information may be classified in one to two ways: 1.originally 2.derivatively

Original classification To be an Originator of classification you must: be the originator of the document, information,etc. have classification authority in writing information must require protection against unauthorized disclosure information must be directly related to national security interests

Derivative Classification. Derivative classification is just as its name implies--classification derived from another source.

Marking of Classified Information. At a minimum, classified documents must indicate (1) the highest level of classification (2) the Agency or office of origin (3) the identity of the Original Classification Authority or source document, as appropriate (4) a date or event for declassification

Protection of Classified Information As a custodian of classified information you have a personal moral legal responsibility WHEN TO PROTECT? at all times protect classified information

Protection of Classified Information classified material must not be discussed on the telephone, read, or discussed in public places. EXAMPLE On the Phone At Home At Church In Public Places

Protection of Classified Information Don't be fooled by telephone callers who drop names or otherwise try to impress you with "urgent needs."

Care During Working Hours. Classified information may be processed by automated information systems, but only by those systems that have been approved for such use. SECRET

Incident Triangle Remove one element to eliminate the threat TARGET OPPORTUNITY ATTACKER

Be Careful Out There Questions?