General Security. Question Answer Policy Resource

Size: px
Start display at page:

Download "General Security. Question Answer Policy Resource"

Transcription

1 General Security Briefly define a Special Access Program. A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. SAP Overview SA List three enhanced security requirements for protecting Special Access Program (SAP) Information. Within Personnel Security: Access Rosters; Billet Structures (if required); Indoctrination Agreement; Clearance based on an appropriate investigation completed within the last 5 years; Individual must materially contribute to the program in addition to having the need to know; All individuals with access to SAP are subject to a random counterintelligencescope polygraph examination; Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination; Tier review process; Personnel must have a Secret or Top Secret clearance; SF-86 must be current within one year; Limited Access; Waivers required for foreign cohabitants, spouses, and immediate family members. Within Industrial Security: The SecDef or DepSecDef can approve a carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities. Within Physical Security: Access Control; Maintain a SAP Facility; Access Roster; All SAPs must have an unclassified nickname/ Codeword (optional). Within Information Security: The use of HVSACO; Transmission requirements (order of precedence). DoDI , Management, Administration, and Oversight of DoD Special Access Programs Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004 DoDD , SAP Policy SAP Overview SA Security Shorts, SAP Types and Categories Introduction to Special Access Programs SA Page 1

2 General Security What are three principal incident/ events required to be reported to DoD counterintelligence (CI) organizations? Espionage Sabotage Terrorism Cyber DoD M, National Industrial Security Program Operating Manual (NISPOM) E.O DoDI , DoD Information Security Program and Protection of Sensitive Compartmented Information NISPOM 1-302b or DoDI , DoD Information Security Program and Protection of Sensitive Compartmented Information DoDD , CI Awareness and Reporting Counterintelligence Awareness and Reporting Course for DoD Employees CI Integrating CI and Threat Awareness into Your Security Program CI NISP Reporting Requirements IS List three indicators of insider threats. Failure to report overseas travel or contact with foreign nationals Seeking to gain higher clearance or expand access outside the job scope Engaging in classified conversations without a need to know Working hours inconsistent with job assignment or insistence on working in private Exploitable behavior traits Repeated security violations Attempting to enter areas not granted access to Unexplainable affluence/living above one s means Anomalies (adversary taking actions which indicate they are knowledgeable to information) Illegal downloads of information/files E.O DoDI , Countering Espionage, International Terrorism and the Counterintelligence (CI) Insider Threat DoDI , Counterintelligence (CI) Activities Supporting Research, Development, and Acquisition (RDA) DoDI , Counterintelligence (CI) Investigations DoDD Counterintelligence Awareness and Reporting Course for DoD Employees CI Thwarting the Enemy: Providing Counterintelligence & Threat Awareness to the Defense Industrial Base CI Integrating CI and Threat Awareness into Your Security Program CI List three elements that should be considered in identifying Critical Program Information. - Elements which if compromised could: (1) cause significant degradation in mission effectiveness, (2) shorten the expected combat-effective life of the system; (3) reduce technological advantage; (4) significantly alter program direction; or (5) enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability. DoDI , Critical Program Information (CPI) Protection Within the Department of Defense Defense Acquisition University (DAU) Page 2

3 General Security List three elements that a security professional should consider when assessing and managing risks to DoD assets. Asset Threat Vulnerability Risk Countermeasures Enclosure 3 of DoDM V3, Risk Assessment DoDM Risk Management for DoD Security Programs GS List three categories of Special Access Programs. Acquisition Intelligence Operations and Support DoDD , SAP Policy DoDI , Management, Administration, and Oversight of DoD Special Access Programs SAP Overview SA Security Short, SAP Types and Categories Page 3

4 General Security List five responsibilities of the Government SAP Security Officer/ Contractor Program Security Officer (GSSO/ CPSO). From Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004: Possess a personnel clearance and Program access at least equal to the highest level of Program classified information involved. Provide security administration and management for his/her organization. Ensure personnel processed for access to a SAP meet the prerequisite personnel clearance and/or investigative requirements specified. Ensure adequate secure storage and work spaces. Ensure strict adherence to the provisions of the NISPOM, its supplement, and the Overprint. When required, establish and oversee a classified material control program for each SAP. When required, conduct an annual inventory of accountable classified material. When required, establish a SAPF. Establish and oversee a visitor control program. Monitor reproduction and/or duplication and destruction capability of SAP information Ensure adherence to special communications capabilities within the SAPF. Provide for initial Program indoctrination of employees after their access is approved; rebrief and debrief personnel as required. Establish and oversee specialized procedures for the transmission of SAP material to and from Program elements. When required, ensure contractual specific security requirements such as TEMPEST Automated Information System (AIS), and Operations Security (OPSEC) are accomplished. Establish security training and briefings specifically tailored to the unique requirements of the SAP. Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004 SAP Overview SA Page 4

5 General Security What is the definition of Critical Program Information in DoD? U.S. capability elements that contribute to the warfighter s advantage throughout the life cycle, which if compromised or subject to unauthorized disclosure, decrease the advantage. Elements or components of a Research, Development, and Acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system; reduce technological advantage; significantly alter program direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information about applications, capabilities, processes and end-items. Includes elements or components critical to a military system or network mission effectiveness. Includes technology that would reduce the U.S. technological advantage if it came under foreign control. DoDI , Critical Program Information (CPI) Protection Within the Department of Defense DoD List three primary authorities governing foreign disclosure of classified military information. Arms Export Control Act National Security Decision Memorandum 119 National Disclosure Policy-1 International Traffic in Arms Regulation (ITAR) E.O.s 12829, Bilateral Security Agreements DoD M, NISPOM Arms Export Control Act National Security Decision Memorandum 119 National Disclosure Policy-1 International Traffic in Arms Regulation (ITAR) E.O.s 12829, Bilateral Security Agreements DoD M, NISPOM DISAM International Programs Security Requirements IPSR- OLL IN Briefly describe the purpose of the DD Form 254. Convey security requirements, classification guidance and provide handling procedures for classified material received and/or generated on a classified contract. Federal Acquisition Regulation (FAR) Subpart 4.4 DoD M, NISPOM, DoD R, Industrial Security Regulation C7 (entire) CDSE Job Aid, How to Complete DD 254 Performance Support Guide Page 5

6 General Security List three different types of threats to classified information. Insider Threat Foreign Intelligence Entities (FIE) Cybersecurity Threat DoDD , CI Awareness and Reporting DoDM , Vol 3 Introduction to Information Security IF Cybersecurity Awareness CI CDSE-hosted Course JC-CI Insider Threat Briefly describe the concept of insider threat. An employee who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems. E.O , National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs DoDI , Counterintelligence Espionage, International Terrorism, and the Counterintelligence (CI) Insider Threat JCITA Insider Threat Course Integrating CI and Threat Awareness Into Your Security Program C Cybersecurity Awareness CI CDSE-hosted e-learning Course Cyber Awareness Challenge Counterintelligence Awareness and Reporting Course for DoD Employees CI Describe the purpose of the Foreign Visitor Program. To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR. NISPOM DoDI , DoD Information Security Program and Protection of Sensitive Compartmented Information DoDD IS105.16, Visits and Meeting in the NISP Page 6

7 Industrial Security List three factors for determining whether U.S. companies are under Foreign Ownership, Control or Influence (FOCI). Record of economic and government espionage against the U.S. targets Record of enforcement/engagement in unauthorized technology transfer Type and sensitivity of the information that shall be accessed The source, nature and extent of FOCI Record of compliance with pertinent U.S. laws, regulations and contracts Nature of bilateral & multilateral security & information exchange agreements Ownership or control, in whole or part, by a foreign government DoD M, NISPOM, DoD R, Industrial Security Regulation C2.2.3 Understanding Foreign Ownership, Control, or Influence (FOCI) IS Define the purpose and the function of the Militarily Critical Technologies List (MCTL). Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). DoDI , The Militarily Critical Technologies List (MCTL) Export Administration Act of 1979 (extended by Executive Order) Militarily Critical Technologies List tech_security/mctp/ mctl.html Formulation of export control proposals and export license review Identify the four Cognizant Security Agencies (CSAs) and describe their role in the National Industrial Security Program (NISP). The four CSAs are the Department of Defense (DoD), the Director of National Intelligence (DNI), the Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC). Establish an industrial security program to safeguard classified information under its jurisdiction. DoD M, National Industrial Security Program Operating Manual (NISPOM) 1-101, EO 12829, National Industrial Security Program Introduction to Industrial Security IS Page 7

8 Information Security How does lack of attention to the concept of compilation introduce risks to DoD assets? Can cause: Unauthorized disclosure Misclassification Security violation Improper safeguarding Improper dissemination Improper handling Improper destruction DoD Manual , DoD Information Security Program, Volumes 1 & 3 Information Security Oversight Office (ISOO) 32 CFR Parts 2001 & 2003, Classified National Security DoD Manual , Volumes 1, 2 & 3 ISOO 32 CFR Parts 2001 & 2003, Classified National Security Security Classification Guidance, IF Derivative Classification IF Marking Classified Information IF Introduction to Information Security IF DoD Security Specialist GS Information Security Management IF020.CU List three transmission and transportation requirements that help manage risks to DoD assets. Safeguarding Briefings Documentation Personal control Utilizing proper methods of transmission/transportation based on classification level Intended recipient(s) have proper clearance/eligibility and need to know (or access) Capability to properly store classified information DoD Manual , Volume 3, Encl. 4 ISOO 32 CFR Parts 2001 & 2003, Classified National Security DoD Manual , Volumes 1, 2 & 3 ISOO 32 CFR Parts 2001 & 2003, Classified National Security Transmission and Transportation for DoD IF DoD Security Specialist GS Information Security Management IF020.CU Page 8

9 Information Security List three types of security briefings that help manage risks to DoD assets. Initial Orientation Annual Refresher Threat Awareness Foreign Travel Special Training Requirements Derivative Classification Original Classification Authority (OCA) Declassification Authority Debriefings Termination briefing DoD Manual , Volume 3, Encl. 5 ISOO 32 CFR Parts 2001 & 2003, Classified National Security DoD R, Personnel Security Program DoD Manual , Volumes 1 & 3 SOO 32 CFR Parts 2001 & 2003, Classified National Security Developing a Security Education and Training Program GS Introduction to Personnel Security PS Security Awareness for Educators GS DoD Security Specialist GS Information Security Management IF020.CU DoD R List three disposal and destruction methods used to effectively manage risks to DoD classified information. Cross-cut shredding Burning/ Incinerating Pulverizing Disintegrating Mutilating Degaussing Chemical decomposition Special burn Wet pulping Overwriting Sanding Physical destruction DoD Manual , Volumes 1 & 3 (Enclosures 3 & 7) ISOO 32 CFR Parts 2001 & 2003, Classified National Security NSA/CSS Storage Device Declassification Manual ( government/mdg/nsa_css_storage_ Device_Declassification_Manual.pdf) DoD Manual , Volumes 1 & 3 (Enclosures 3 & 7) ISOO 32 CFR Parts 2001 & 2003, Classified National Security Information Security Emergency Planning IF CDSE Security Shorts, Disposal and Destruction NSA/CSS ( destruction_guidance/index.shtml) Page 9

10 Information Security List three types of safeguarding procedures for classified information. Proper storage Proper handling Approved disposition Proper transmission/transportation methods Receipt use, when required Forced entry protection Dissemination Physical security measures Technical, administrative, and personnel control measures (deleted access control as these measures constitute access control) Develop emergency plan DoD Manual , Volumes 1, 2, & 3 ISOO 32 CFR Parts 2001 & 2003, Classified National Security DoD R DoD R, Physical Security Program DoD Manual , Volumes 1, 2, & 3 ISOO 32 CFR Parts 2001 & 2003, Classified National Security CDSE Webinars CDSE Jobaids CDSE e-learning Courses CDSE Security Short Classified Storage Requirements Introduction to Physical Security Course, PY DoD Security Specialist GS Information Security Management IF020.CU - Information Security Emergency Planning IS Describe the security professional s role in handling a security incident. Secure Safeguard Report Inquire (under unusual circumstances) Investigate (under unusual circumstances) Recommend DoD Manual , Volumes 3, Encl. 6 ISOO 32 CFR Parts 2001 & 2003, Classified National Security DoD Manual , Volumes 1, 2 & 3 ISOO 32 CFR Parts 2001 & 2003, Classified National Security NCIX Unauthorized Disclosures DoD Security Specialist GS Information Security Management IF020.CU CDSE Webinar CDSE Job aids wbt.php (Web-based training for unauthorized disclosures) Page 10

11 Information Security Describe how the roles of the security professional and the information assurance (IA) professional differ in regard to protecting DoD classified information on information technology (IT) systems. The IA professional must ensure that all DoD information systems maintain appropriate levels of availability, integrity, authentication, confidentiality, and non-repudiation in order to protect and defend DoD information and networks. They must also ensure the systems are certified and accredited. The security professional coordinates with the IA professional during the C&A process. The security professional must be aware of the nature, scope, and schedule of ongoing C&A activities within a given organization, in order to provide timely and relevant classification management direction and to ensure the physical environment is properly secured and accredited for the operations planned and that users are properly cleared and have all requisite access in time to support the mission. DoD Manual , Volume 3, Encl.7 ISOO 32 CFR Parts 2001 & 2003, Classified National Security DoDI , DoD Information Assurance Certification and Accreditation Process (DIACAP) DoDD E, Information Assurance (IA) DoD Manual , Volumes 1, 2, & 3 ISOO 32 CFR Parts 2001 & 2003, Classified National Security Information Security Management IF020.CU Cybersecurity Awareness CI Information Assurance Awareness for the Intelligence Community DS-IC Page 11

12 Personnel Security Explain how the adjudication process contributes to effective risk management of DoD assets. Ensures that, based upon all available information, an individual s loyalty, reliability, and trustworthiness are such that entrusting assigned persons with eligibility to classified information or sensitive duties is in the best interest of national security. DoD R, Personnel Security Program White House Memorandum, Revised Adjudicative Guidelines EO EO 13467, Amendment to EO Introduction to DoD Personnel Security Adjudications PS DoD Personnel Security Adjudication PS Personnel Security Management for Security Professionals PS PERSEREC Adjudicative Desk Reference Introduction to National Security Adjudications PS Explain how effective implementation of the continuous evaluation process contributes to management of risks to DoD assets. Ensures that individuals with national security eligibility and access are continuously assessed through utilization of accessible databases and other lawfully available information; continue to meet adjudicative standards; and that any issues that may arise are promptly reported. DoD R E.O EO 13467, Amendment to EO E.O Introduction to Personnel Security PS DoD Personnel Security Management for Security Professionals PS CDSE Job Aids, How to Receive and Maintain Your Security Clearance Describe how authorization of Limited Access Authority impacts risk to DoD assets. Increases risk by allowing a foreign national access to classified information. Reduces risk by ensuring Foreign Nationals with a unique or unusual skill set have been properly investigated and adjudicated before being granted access to classified information. DoD R E.O Personnel Security Management for Security Professionals PS Page 12

13 Personnel Security List three factors that should be considered when determining position sensitivity. Level of Access to Classified Information IT level needed Duties associated with position DoD R EO CFR Designation of public trust positions and investigative requirements 5 CFR Sensitivity level designation and investigative requirements Introduction to Personnel Security PS Personnel Security Management for Security Professionals PS List three individuals in the personnel security investigation (PSI) process and describe their roles. FSO/Security Manager/Human Resource Officer: Initiates, Reviews, Forwards investigation to investigation service provider (ISP) Subject: Completes forms and provides additional information if required Investigator: Conducts PSI Adjudicator: Determines eligibility for National Security access DoD R E.O Introduction to DoD Personnel Security Adjudications PS Personnel Security Management for Security Professionals PS Introduction to Personnel Security PS Introduction to National Security Adjudications PS Describe the function of e-qip in the personnel security program (PSP). Initiate investigations Complete forms Forward forms to ISP USD CNI Implementation Memo 6 July 2006 Personnel Security Management for Security Professionals PS OPM-e-QIP Web-based Training (suite of courses) List three factors that a security professional should consider before requesting a Limited Access Authority (LAA). Can a U.S. citizen perform the duties Is classified access limited to Secret or Confidential Does the person possess a rare or unusual skill or expertise DoD R E.O Personnel Security Management for Security Professionals PS Introduction to Personnel Security PS113.1 Page 13

14 Physical Security List the five steps in the DoD risk management model. Assess Assets Assess Threats Assess Vulnerabilities Assess Risks Determine Countermeasures DoDI , DoD Antiterrorism (AT) Program DoDD , DoD Policy and Responsibilities for Critical Infrastructure DoDI , Defense Critical Infrastructure Program (DCIP) Management Introduction to Risk Management GS Risk Management for DoD Programs GS Identify the three core components of the risk assessment process. Asset Criticality Threat Assessment Vulnerability Assessment DoDI DoDD DoDI Introduction to Risk Management GS Risk Management for DoD Programs GS What is the difference between physical security surveys and physical security inspections? A physical security survey is a formal, recorded assessment of an Installation s overall security program; whereas a physical security inspection is a formal, recorded compliance of physical procedures and measures implemented by a unit or activity to protect its assets. DoDI , Safeguarding Conventional Arms, Ammunition, and Explosives Introduction to Physical Security PY Physical Security Planning and Implementation PY Who makes the determination of when physical security surveys and inspections are required? DoD Component Commanders. DoD R, Physical Security Program Introduction to Physical Security PY Physical Security Planning and Implementation PY Explain why access control measures are contingent on threat levels. Based on threat levels, commanders or directors are responsible for enhancing access control measures to their installations and facilities. DoDI DoDI , DoD Antiterrorism (AT) Standards Antiterrorism Officer (ATO) Level 2 Curriculum Physical Security Planning and Implementation CDSE Security Short, AT Force Protection Page 14

15 Physical Security Explain how visitor identification control methods are used to effectively control access to facilities. Ensure only authorized personnel and materials enter and exit from an installation or facility by identifying, verifying, and authenticating. DoD R, Physical Security Program Introduction to DoD HSPD-12 CAC Credentialing PS Challenges in Analyzing and Managing Risk ED *All courses are CDSE unless otherwise indicated. Page 15

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT) SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.39 September 10, 1997 SUBJECT: Security, Intelligence, and Counterintelligence Support to Acquisition Program Protection ASD(C3I) References: (a) DoD Directive

More information

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview

FSO Role in the NISP. Student Guide. Lesson 1: Course Introduction. Course Information. Course Overview FSO Role in the NISP Lesson 1: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Provide an overview of the Facility Security Officer s (FSO) primary roles in

More information

Introduction to Industrial Security, v3

Introduction to Industrial Security, v3 Introduction to Industrial Security, v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Introduction Introduction Subcontractor CEO: I m really excited -- my

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 Incorporating Change 2, July 28, 2017 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE.

More information

August Initial Security Briefing Job Aid

August Initial Security Briefing Job Aid August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 Incorporating Change 1, November 17, 2017 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: Defense Security Service (DSS) References: See Enclosure 1 NUMBER 5105.42 August 3, 2010 Incorporating Change 1, March 31, 2011 DA&M 1. PURPOSE. Pursuant to the

More information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information Department of Defense INSTRUCTION NUMBER 5200.01 October 9, 2008 SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information References: See Enclosure 1 USD(I) 1. PURPOSE.

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.16 August 27, 2012 USD(I) SUBJECT: Counterintelligence Functional Services (CIFS) References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information Protection of Classified National Intelligence, Including Sensitive Compartmented Information 703 A. AUTHORITY 1. The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended;

More information

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Lesson 1: Course Introduction Contents Introduction... 2 Opening... 2 Objectives... 2 September 2015 Center for Development

More information

Personnel Clearances in the NISP

Personnel Clearances in the NISP Personnel Clearances in the NISP Student Guide August 2016 Center for Development of Security Excellence Lesson 1: Course Introduction Course Introduction Course Information Welcome to the Personnel Clearances

More information

February 11, 2015 Incorporating Change 4, August 23, 2018

February 11, 2015 Incorporating Change 4, August 23, 2018 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE February 11, 2015 Incorporating Change 4, August 23, 2018 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 Incorporating Change 2, August 28, 2017 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance

More information

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities SECNAV INSTRUCTION 5500.36 From: Secretary of the Navy D E PA R T M E N T O F THE N AV Y OF FICE OF THE SECRETARY 1000 N AVY PENTAGON WASHING TON DC 20350-1000 SECNAVINST 5500.36 DUSN (P) Subj: DEPARTMENT

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.07, Volume 1 June 18, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: DoD Special Access Program (SAP) Security Manual: General Procedures

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER O-5205.13 April 26, 2012 DoD CIO SUBJECT: Defense Industrial Base (DIB) Cyber Security and Information Assurance (CS/IA) Program Security Classification Manual (SCM)

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security

More information

Industrial Security Program

Industrial Security Program Army Regulation 380 49 Security Industrial Security Program Headquarters Department of the Army Washington, DC 20 March 2013 UNCLASSIFIED SUMMARY of CHANGE AR 380 49 Industrial Security Program This major

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency SFPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. Which of the following is a true statement regarding the special handling requirements

More information

The DD254 & You (SBIR)

The DD254 & You (SBIR) The DD254 & You Small Business Innovative Research (SBIR) Joyce K. Foca P-8A MMA Security Manager (301) 757-2961 joyce.foca@navy.mil Remember To do great important tasks, Three things are necessary.. 1.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.02E June 20, 2012 Incorporating Change 1, Effective May 11, 2018 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program References: See Enclosure 1 1. PURPOSE.

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

Department of Defense

Department of Defense Department of Defense DIRECTIVE SUBJECT: Under Secretary of Defense for Intelligence (USD(I)) NUMBER 5143.01 November 23, 2005 References: (a) Title 10, United States Code (b) Title 50, United States Code

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY THE ORDER OF THE COMMANDER NORTH AMERICAN AEROSPACE DEFENSE COMMAND (NORAD) AND UNITED STATES NORTHERN COMMAND (USNORTHCOM) NORAD AND USNORTHCOM HEADQUARTERS OPERATING INSTRUCTION 31-184 9 MARCH 2012

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5220.22 March 18, 2011 USD(I) SUBJECT: National Industrial Security Program (NISP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1 000 SECNAVINST 5510.37 DUSN PPOI AUG - 8 2013 SECNAV INSTRUCTION 5510.37 From: Subj: Ref: Encl: Secretary of the

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency SAPPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. The ability for your Information Technology (IT) personnel to rapidly broadcast any

More information

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation Incidents Involving Special Circumstances Information Webinar Danny Jennings Physical & General Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military,

More information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See

More information

DoD Update Insider Threat and the NISP

DoD Update Insider Threat and the NISP UNCLASSIFIED OFFICE OF THE UNDER SECRETARY OF DEFENSE DoD Update Insider Threat and the NISP Steve Lewis Valerie Heil May 19, 2015 UNCLASSIFIED Continuous Evaluation IMESA Insider Threat NISPOM Change

More information

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE SECNAV INSTRUCTION 3850.2E DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1 000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 3850.2E DUSN (P) January 3, 2017 From: Subj: Secretary of the Navy DEPARTMENT

More information

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3305.12 October 14, 2016 Incorporating Change 1, Effective February 26, 2018 USD (I) SUBJECT: Intelligence and Counterintelligence (I&CI) Training of Non-U.S. Persons

More information

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security TABLE OF CONTENTS Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5205.08 November 8, 2007 USD(I) SUBJECT: Access to Classified Cryptographic Information References: (a) DoD Directive 5205.8, subject as above, February 20, 1991

More information

Security Classification Guidance v3

Security Classification Guidance v3 Security Classification Guidance v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Course Overview Welcome to the Security Classification Guidance Course. The

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 2030.08 February 19, 2015 Incorporating Change 1, May 24, 2017 USD(P) SUBJECT: Implementation of Trade Security Controls (TSCs) for Transfers of DoD Personal Property

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 3200.14, Volume 2 January 5, 2015 Incorporating Change 1, November 21, 2017 USD(AT&L) SUBJECT: Principles and Operational Parameters of the DoD Scientific and Technical

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.02 March 21, 2014 USD(I) SUBJECT: DoD Personnel Security Program (PSP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure

More information

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI) Department of Defense INSTRUCTION NUMBER 5210.83 July 12, 2012 Incorporating Change 1, Effective February 22, 2018 USD(I) SUBJECT: DoD Unclassified Controlled Nuclear Information (UCNI) References: See

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5100.76 February 28, 2014 USD(I) SUBJECT: Safeguarding Sensitive Conventional Arms, Ammunition, and Explosives (AA&E) References: See Enclosure 1 1. PURPOSE. This

More information

Student Guide: Controlled Unclassified Information

Student Guide: Controlled Unclassified Information Length Two (2) hours Description This course covers the Department of Defense policies on the disclosure of official information. In addition, the nine exemption categories of the Freedom of Information

More information

Defense Security Service Academy OCA Desk Reference Guide

Defense Security Service Academy OCA Desk Reference Guide Defense Security Service Academy OCA Desk Reference Guide May 007 Final Page OCA Decision Aid The safety and security of the United States depend upon the protection of sensitive information. Classification

More information

B. ACCESS, STORAGE, CUSTODY, CONTROL AND TRANSMISSION OF CLASSIFIED INFORMATION

B. ACCESS, STORAGE, CUSTODY, CONTROL AND TRANSMISSION OF CLASSIFIED INFORMATION International Programs Security Handbook 11-1 CHAPTER 11 CONTRACTOR OPERATIONS ABROAD A. INTRODUCTION This Chapter sets forth requirements governing contractor operations abroad, including security clearances

More information

Department of Defense INSTRUCTION. International Transfers of Technology, Articles, and Services

Department of Defense INSTRUCTION. International Transfers of Technology, Articles, and Services Department of Defense INSTRUCTION NUMBER 2040.02 July 10, 2008 USD(P) SUBJECT: International Transfers of Technology, Articles, and Services References: See Enclosure 1 1. PURPOSE. This Instruction: a.

More information

January 3, 2011 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

January 3, 2011 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR January 3, 2011 M-11-08 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: SUBJECT:

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.72 April 26, 2016 DCMO SUBJECT: Defense Technology Security Administration (DTSA) References: See Enclosure 1 1. PURPOSE. This directive reissues DoD Directive

More information

NATO SECURITY INDOCTRINATION

NATO SECURITY INDOCTRINATION NATO SECURITY INDOCTRINATION This security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified information.

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5105.21, Volume 1 October 19, 2012 Incorporating Change 1, Effective May 16, 2018 USD(I) SUBJECT: Sensitive Compartmented Information (SCI) Administrative Security Manual:

More information

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM DODEA ADMINISTRATIVE INSTRUCTION 5210.03, VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM Originating Component: Security Management Division Effective: March 23, 2018 Releasability: Cleared

More information

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 BACKGROUND AND METHODOLOGY As part of its responsibilities to oversee agency actions to ensure compliance with Executive Order 12958,

More information

September 02, 2009 Incorporating Change 3, December 1, 2011

September 02, 2009 Incorporating Change 3, December 1, 2011 UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE September 02, 2009 Incorporating Change 3, December 1, 2011 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS

More information

2011 Annual Refresher Briefing

2011 Annual Refresher Briefing 2011 Annual Refresher Briefing Protecting Our America~Your National Laboratories University of California, Office of the President 1111 Franklin Street Oakland, CA 94607 CONTENTS Introduction... 1 Objective...1

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.19 January 31, 2014 Incorporating Change 1, August 17, 2017 USD(I) SUBJECT: Counterintelligence Support to the Defense Critical Infrastructure Program (DCIP)

More information

Supply Chain Risk Management

Supply Chain Risk Management Supply Chain Risk Management 731 07 December 2013 A. AUTHORITY: The National Security Act of 1947, as amended; 50 USC 3329, note (formerly 50 USC 403-2, note); the Counterintelligence Enhancement Act of

More information

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.47E September 4, 2015 Incorporating Change 1, August 28, 2017 USD(AT&L) SUBJECT: Anti-Tamper (AT) References: See Enclosure 1 1. PURPOSE. This directive: a.

More information

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 Description of document: Requested date: Released date: Posted date: Source of document: Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 07-June-2011

More information

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING Cal Stewart ISP WHAT IS THE DD FORM 254? Contract document that provides classification guidance to Contractors who perform on U.S. Government classified

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.8 February 20, 1991 Certified Current as of February 20, 2004 SUBJECT: Access to Classified Cryptographic Information ASD(C3I) References: (a) National Telecommunications

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: Under Secretary of Defense for Intelligence (USD(I)) References: See Enclosure NUMBER 5143.01 October 24, 2014 Change 1 Effective April 22, 2015 DCMO 1. PURPOSE.

More information

Agency Mission Assurance

Agency Mission Assurance DCMA Instruction 3301 Agency Mission Assurance Office of Primary Responsibility Integrating Capability - Agency Mission Assurance Effective: May 14, 2018 Releasability: Cleared for public release New Issuance

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.50 October 27, 2014 Incorporating Change 1, Effective February 16, 2018 USD(I) SUBJECT: Management of Serious Security Incidents Involving Classified Information

More information

DoD M, March 1994

DoD M, March 1994 1 2 FOREWORD TABLE OF CONTENTS Page FOREWORD 2 TABLE OF CONTENTS 3 REFERENCES 5 DEFINITIONS 7 ABBREVIATIONS AND/OR ACRONYMS 13 CHAPTER 1. - GENERAL INFORMATION 15 C1.1. Purpose 15 C1.2. Scope 15 C1.3.

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency ISOC Example Questions 1. Which statement regarding a corporation s common business structure and Facility Security Clearances (FCLs) is TRUE? Select all that apply. a. If a director does not require access

More information

Greg Pannoni April 2016

Greg Pannoni April 2016 Greg Pannoni April 2016 National Industrial Security Program (NISP) single, integrated, cohesive industrial security program Goal: eliminate redundant, overlapping, or unnecessary requirements that impeded

More information

DoD M OPERATING MANUAL. February

DoD M OPERATING MANUAL. February DoD 5220.22-M OPERATING MANUAL February 2006 http://www.ncms-isp.org/nispom_200602_with_isls.pdf NISPOM Hyper-Link and Color-Code Guide All hyper-links that take you to a specific reference have a corresponding

More information

Declassification Options and Requirements

Declassification Options and Requirements Options and Requirements Information Security Webinar Marc Brandsness Security Asset Protection Professional Certification (SAPPC) Retired US Air Force-Security Forces with over 25 years of Law Enforcement

More information

Title:F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan

Title:F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan DATA ITEM DESCRIPTION Title:F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan Number: Approval Date: 20100716 AMSC Number: N9153 Limitation: N/A DTIC Applicable: N/A GIDEP Applicable:

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5240.6 July 16, 1996 SUBJECT: Counterintelligence (CI) Awareness and Briefing Program ASD(C3I) References: (a) DoD Directive 5240.6, subject as above, February

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5240.06 May 17, 2011 Incorporating Change 2, July 21, 2017 USD(I) SUBJECT: Counterintelligence Awareness and Reporting (CIAR) References: See Enclosure 1 1. PURPOSE.

More information

Department of Defense DIRECTIVE. SUBJECT: Information Assurance Training, Certification, and Workforce Management

Department of Defense DIRECTIVE. SUBJECT: Information Assurance Training, Certification, and Workforce Management Department of Defense DIRECTIVE NUMBER 8570.1 August 15, 2004 ASD(NII)/DoD CIO SUBJECT: Information Assurance Training, Certification, and Workforce Management References: (a) DoD Directive 8500.1, "Information

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency APC Example Questions 1. True or False? DoD personnel should immediately report any clandestine relationship that exists or has existed with a foreign entity to their counterintelligence element, supporting

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5230.27 November 18, 2016 Incorporating Change 1, September 15, 2017 USD(AT&L) SUBJECT: Presentation of DoD-Related Scientific and Technical Papers at Meetings

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERAS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 5500.66 5500.66 From: Chief of Naval Operations Subj: SECURITY COORDINA BOARD Ref: (a) SECNAVINST

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY (AFMC)

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY (AFMC) BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 16-1404 29 MAY 2015 AIR FORCE MATERIEL COMMAND Supplement 17 FEBRUARY 2016 Operations Support AIR FORCE INFORMATION SECURITY PROGRAM COMPLIANCE

More information

Introduction to Personnel Security

Introduction to Personnel Security Introduction to Personnel Security August 2017 Center for Development of Security Excellence Lesson 1: Personnel Security Policy Lesson Introduction Overview Welcome to the Personnel Security Policy lesson.

More information

This publication is available digitally on the AFDPO WWW site at:

This publication is available digitally on the AFDPO WWW site at: BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 31-601 22 NOVEMBER 2000 COMPLIANCE WITH THIS PUBLICATION IS MANDATORY AIR NATIONAL GUARD Supplement 1 15 APRIL 2004 Security INDUSTRIAL

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 3200.12 August 22, 2013 Incorporating Change 1, October 10, 2017 USD(AT&L) SUBJECT: DoD Scientific and Technical Information Program (STIP) References: See Enclosure

More information

Student Guide Course: Original Classification

Student Guide Course: Original Classification Course: Original Classification Lesson: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Define original classification and identify the process for determining

More information

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data

Department of Defense INSTRUCTION. Access to and Dissemination of Restricted Data and Formerly Restricted Data Department of Defense INSTRUCTION NUMBER 5210.02 June 3, 2011 Incorporating Change 1, October 25, 2017 USD(I) SUBJECT: Access to and Dissemination of Restricted Data and Formerly Restricted Data References:

More information

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED Army Regulation 380 5 Security Department of the Army Information Security Program Headquarters Department of the Army Washington, DC 29 September 2000 UNCLASSIFIED SUMMARY of CHANGE AR 380 5 Department

More information

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public

Department of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public Department of Defense DIRECTIVE NUMBER 5210.50 July 22, 2005 USD(I) SUBJECT: Unauthorized Disclosure of Classified Information to the Public References: (a) DoD Directive 5210.50, subject as above, February

More information

Department of Defense DIRECTIVE. SUBJECT: Security Requirements for Automated Information Systems (AISs)

Department of Defense DIRECTIVE. SUBJECT: Security Requirements for Automated Information Systems (AISs) Department of Defense DIRECTIVE NUMBER 5200.28 March 21, 1988 SUBJECT: Security Requirements for Automated Information Systems (AISs) USD(A) References: (a) DoD Directive 5200.28, "Security Requirements

More information

A Guide. Preparation. DD Form 254. for the. of a. National Classification Management Society. Defense Security Service

A Guide. Preparation. DD Form 254. for the. of a. National Classification Management Society. Defense Security Service A Guide for the Preparation of a DD Form 254 National Classification Management Society Defense Security Service Special thanks to Paul McCray and Ray Yamaoka, security trainers with Ken Sudol & Associates

More information

DATA ITEM DESCRIPTION

DATA ITEM DESCRIPTION DATA ITEM DESCRIPTION Title: F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan Number: DI-MGMT-81826B Approval Date: 20140423 AMSC Number: N9463 Limitation: N/A DTIC Applicable: N/A

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION SUBJECT: Law Enforcement Defense Data Exchange (LE D-DEx) References: See Enclosure 1 NUMBER 5525.16 August 29, 2013 Incorporating Change 1, Effective June 29, 2018 USD(P&R)USD(I)

More information

Department of the Navy. Information Security Program

Department of the Navy. Information Security Program THE SECRETARY OF THE NAVY SECNAV M-5510.36 Department of the Navy Information Security Program Published By Chief of Naval Operations (N09N) Special Assistant for Naval Investigative Matters and Security

More information

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION DOM/SJS CJCSI 5714.01D DISTRIBUTION: A, B, C, S POLICY FOR THE RELEASE OF JOINT INFORMATION References: See Enclosure C 1. Purpose. In accordance with

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select

More information

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES

EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,

More information

Special Access Programs (SAPs) and Sensitive Activities

Special Access Programs (SAPs) and Sensitive Activities Army Regulation 380 381 Security Special Access Programs (SAPs) and Sensitive Activities Headquarters Department of the Army Washington, DC 21 April 2004 UNCLASSIFIED SUMMARY of CHANGE AR 380 381 Special

More information

Suggested Contractor File Folder Headings

Suggested Contractor File Folder Headings Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.

More information

Preserving Investigative and Operational Viability in Insider Threat

Preserving Investigative and Operational Viability in Insider Threat Preserving Investigative and Operational Viability in Insider Threat September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Overview Welcome Your Insider Threat Program

More information