Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core

Size: px
Start display at page:

Download "Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core"

Transcription

1 Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core Fleet Weather Center Norfolk 1

2 Objectives: Discuss the directives that govern personnel security Define and discuss the classification categories Explain need to know Identify the different types of security investigation Indentify SAER Define SSO and events that are reported to the SRO Define and discuss a SCIF Identify and discuss the various forms used in security procedures Discuss safe combinations Define the purpose of the DCS Explain the various procedures for the transportation of classified material Explain the TSCO Define and discuss THREATCON and Force Protection Explain RAM Define EAP Fleet Weather Center Norfolk 2

3 Objectives (cont): Explain EMD Define SCI Explain vault recertification and recurring inspections Discuss access lists, 2 person integrity and documentations logs Explain the DoD escort policy Define and discuss COMSEC, INFOSEC, COMPUSEC, PSP and ATFP Explain the purpose of the ICD system Identify and discuss the SSO Identify and discuss the CSM Define and discuss JPAS Define and discuss DONCAF Define and discuss INFOCON and its levels Discuss the procedures for magnetic and electronic media Fleet Weather Center Norfolk 3

4 References: SECNAVINST M Series DoD M-1 DoD Series SECNAVINST M Series OPNAVINST Series EKMS 1A ICPG ICPG ICD SD Joint DoDIIS/Cryptologic SCI Information Systems Security Standards DODI Series NAVY FOREIGN DISCLOSURE MANUAL SECNAVINST Series SECNAVINST series ACP-122E Fleet Weather Center Norfolk 4

5 Identify the directives that govern personnel security: 1. DoD M-1 2. SECNAV M DCID 6/4 and 6/9 4. JOINTDODISS Fleet Weather Center Norfolk 5

6 Define the following classification categories, how they differ, and the color codes used to idenify each one : a. TOP SECRET - Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Color Code is Orange. b. SECRET- Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security. Color Code is Red. c. CONFIDENTIAL Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security. Color Code is Blue. d. UNCLASSIFIED Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause little to no damage to the national security. Color Code is Green. Fleet Weather Center Norfolk 6

7 Explain what is meant by need to know : Access to classified information is not authorized by the favorable conclusion of a clearance eligibility determination. Access is only permitted to eligible individuals after determining that the individual has a need-to-know. a. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. b. Need-to-know is one of two information points that must be determined by every authorized holder of classified information prior to relinquishing that classified information to a prospective recipient. 1.) The authorized holder of classified information must determine that the intended recipient has security clearance eligibility established at (or above) the level of access required. 2.) The authorized holder must determine that the prospective recipient needs-to-know that information in order to perform lawful and authorized government functions. 3.) These determinations must be based on reliable information, obtained formally or informally, from chain of command supervisors, security managers, or other sources in a position to know the prospective recipients security clearance eligibility and/or duties and organizational functions in relation to the specified classified information intended for release. c. Need-to-know is a preventative measure to identify and deter unauthorized access. 1.) Knowledge, possession of, or access to classified information is not provided to any individual solely by virtue of the individual s office, rank, or position. 2.) Although access can only be authorized for individuals with established security clearance eligibility at or above the level of classified information required, having security clearance eligibility DOES NOT equate to need-to-know. d. Classified discussions are prohibited in public areas; hallways, cafeterias, elevators, rest rooms or smoking areas because the discussion may be overheard by persons who do not have a need-to-know. (Individuals are obliged to report violations of the need-to-know principle to their security manager.) e. Need-to-know requires a level of personal responsibility that is challenging, particularly since it conflicts with human nature and the desire to share information with co-workers and colleagues. It is therefore critical to frequently focus on need-to-know requirements during security education briefings and refresher training. Fleet Weather Center Norfolk 7

8 State the type of investigation and how often it is updated for access to the following classification levels: a. Top Secret - The investigative basis for Top Secret clearance eligibility is a favorably completed SSBI, SSBI-PR or PPR. For those who have continuous assignment or access to Top Secret, critical sensitive positions, SCI, Presidential Support Activities, COSMIC Top Secret, LAA, PRP, IT-1 duties or SIOP-ESI, the SSBI must be updated every five years by a PR. b. Secret/Confidential - The investigative basis for a Secret clearance eligibility is a favorably completed NACLC or ANACI. Clearance eligibility established based on ENTNAC's, NAC's or NACI's prior to NACLC or ANACI implementation remain valid. For a Secret Clearance, the investigation is updated every 10 and 15-years, respectively. c. Confidential - The investigative basis for a Confidential clearance eligibility is a favorably completed NACLC or ANACI. Clearance eligibility established based on ENTNAC's, NAC's or NACI's prior to NACLC or ANACI implementation remain valid. For a Confidential clearance, the investigation is updated every 10 and 15-years, respectively. d. SCI - The investigative requirement for access to SCI is a favorably adjudicated SSBI. A SSBI-PR is required to be submitted every five years. The requirements for SCI access are established under Director of National Intelligence (DNI) authority (reference (d) applies). When military personnel are ordered to billets requiring SCI access, the transfer orders will identify the requirement. The losing command's Security Manager/SSO must ensure the required investigative requests are submitted promptly prior to transfer. If an individual is indoctrinated for SCI access, the commanding officer may not administratively lower the individual's security clearance below the Top Secret level without approval of the DON CAF. Fleet Weather Center Norfolk 8

9 Idenitfy what a SAER is and its purpose: Security Access Eligibility Report - Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance. Fleet Weather Center Norfolk 9

10 Identify the events that should be reported to the SSO: The following events should be reported to the Special Security Officer (SSO): 1. Involvement in activities or sympathetic association with persons which/who unlawfully practice or advocate the overflow or alteration of the United States Government by unconstitutional means. 2. Foreign influence concerns/close personal association with foreign nationals, Foreign citizenships, or foreign monetary interests. 3. Sexual behavior that is criminal or reflects a lack of judgment or discretion 4. Unwillingness to comply with rules and regulations or to cooperate with security processing 5. Change of Marital Status or Marriage/Cohabitation with a foreign national. Fleet Weather Center Norfolk 10

11 Identify who has overall authority of, and controls access to, a SCIF: The Special Security Officer (SSO) will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO. Fleet Weather Center Norfolk 11

12 Identify the use of the following forms: a. SF 700 Security Container Information; this form contains vital information about the security container in which it is located. This information includes location, container number, lock serial number, and contact information if the container is found open and unattended. b. SF 701 Activity Security Checklist; this form is a checklist that is filled out at the end of each day to insure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered. c. SF 702 Security Container Check Sheet; this form provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information. d. SF 703 Top Secret Cover Sheet (Orange); this form is used as a cover sheet for Top Secret documents. e. SF 153 COMSEC Material Report; this form is not listed in the reference provided, however it can be found in the GSA Forms library: according to GSA, it is no longer in available for order through their archives; last revision was Sept 1988 f. SF 312 Classified Information Nondisclosure Agreement; this form provides is a contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information. By signing the SF-312, the cleared employee agrees never to disclose classified information to an unauthorized person. Fleet Weather Center Norfolk 12

13 State when safe combinations should be changed: Combinations will be changed when one of the following occurs: a. When first placed in use b. When an individual knowing the combination no longer requires access unless other sufficient controls (e.g., security in-depth) exist to prevent access to the lock; c. When subjected to compromise d. When taken out of service. Built-in combination locks will then be reset to the standard combination ; combination padlocks will be reset to the standard combination Fleet Weather Center Norfolk 13

14 What is a FDO and state their responsibilites: Foreign Disclosure Officer. This individual will process all foreign visit requests to the command. The FDO is also responsible for any foreign disclosure of information to foreign nationals. Fleet Weather Center Norfolk 14

15 State the purpose of the DCS: The Defense Courier Service (DCS) is a Joint Command and direct reporting unit (DRU) under the Commander in Chief United States Transportation Command (CINCTRANS). The DCS establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material. The Defense Courier Service (DCS) is established under the United States Transportation Command (USTRANSCOM), and is a global courier network for the expeditious, cost-effective, and secure distribution of highly classified and sensitive material. Operational control of global courier activities is exercised through USTRANSCOM's Defense Courier Division (TCJ3-C). The division oversees and synchronizes activity of 18 courier stations worldwide to service over six thousand accounts. Major accounts include the White House, the Department of Defense, the State Department, other federal agencies, authorized government contractors, and allied nations. The DCS directly supports the President, Unified and Specified COCOMs, joint military operations, the Joint Chiefs of Staff, National Security Agency, Central Intelligence Agency, U.S. allies, State Department, and other federal agencies. -The DCS was formerly the Armed Forces Courier Service (ARFCOS) but was reorganized and renamed in 1985 after the Walker spy case. Fleet Weather Center Norfolk 15

16 Describe the procedures for preparing hard copy classified material for transportation via: a. DCS - the following procedures must be followed: 1. No item entering the DCS shall weigh over 300 pounds, or exceed dimensions 45 1/2" X 26" X 22", except those items for which the physical structure prohibits breakdown into smaller units. The minimum size of a "flat" (envelope) entered into the DCS shall meet the standard 8 1/2" X 11" in size; small boxes and/or packages shall have a minimum total dimension of 26"; e.g., girth (twice its width plus twice the height) added to the length. Requests for exception to weight or size restrictions shall be submitted to the servicing DCS station, in advance. 2. Items shall be addressed with the standardized DCS two-line address; the Army/AirPost Office, the Fleet Post Office, and the street addresses shall not be used. 3. Envelopes, labels, or tags with visible "postage and fees paid" indicia shall not be used. 4. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. 5. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper. 6. Detailed information on wrappings, marking, and preparing material for movement is available from the servicing DCS station. 7. Packaging Material Generally, all packaging materials are permissible if they afford contents with concealment and protection, preclude physical and/or visual access, are sturdy, and pose no hazard to handlers. Use of metal strapping is specifically prohibited. For assistance and clarification, customers should contact their servicing DCS station. U.S. Postal Service bags, pouches, or sacks shall not be used for DCS material. DoS bags, pouches, or sacks shall not be used for non-dos material, except in specific, previously coordinated situations. Fleet Weather Center Norfolk 16

17 Describe the procedures for preparing hard copy classified material for transportation via: b. Handcarry - the following procedures must be followed: 1. Prepare classified information for shipment by packaging and sealing it with tape which will retain the impression of any postal stamp, in ways that minimize risk of accidental exposure or undetected deliberate compromise. Classified information shall be packaged so that classified text is not in direct contact with the inner envelope or \container. 2. Enclose classified information transported outside the command in two opaque, sealed covers (e.g., envelopes, wrappings, or containers) durable enough to conceal and protect it from inadvertent exposure or tampering. The following exceptions apply: If the classified information is an internal component of a packageable item of equipment, the outside shell or body may be considered as the inner cover provided it does not reveal any classified information. If the classified information is an inaccessible internal component of a bulky item of equipment, the outside or body of the item may be considered a sufficient cover provided observation does not reveal classified information. If the classified information is an item of equipment that is not reasonably packageable and the shell or body is classified, it shall be concealed with an opaque covering that conceals all classified features. Specialized shipping containers, including closed cargo transporters, may be considered the outer wrapping or cover when used. Refer to the appropriate reference in paragraph 9-5 of SECNAV M preparation of special types of classified and controlled unclassified information for transmission or transportation. Fleet Weather Center Norfolk 17

18 State the responisbilites of the TSCO: The commanding officer shall designate, in writing, a command TOP SECRET CONTROL OFFICER (TSCO) for commands handling Top Secret information. Top Secret Control Assistants (TSCA) may be assigned as needed (see paragraph of SECNAV M ). The TSCO reports directly to the security manager or the security manager may serve concurrently as the TSCO. The TSCO shall: a. Maintain a system of accountability (e.g., registry) to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information, less SCI and other special types of classified information. b. Ensure that inventories of Top Secret information are conducted at least once annually, or more frequently when circumstances warrant (see chapter 7, paragraph 7-3 of SECNAV M ). As an exception, repositories, libraries, or activities that store large volumes of classified documents may limit their annual inventory to that which access has been given in the past 12 months, and 10 percent of the remaining inventory. Fleet Weather Center Norfolk 18

19 State the THREATCON recognition and Force Protection levels and discuss what each represents: a. FPCON NORMAL describes a situation or no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, most likely civilian police forces. b. FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted. c. FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public. d. FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. e. FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked. Fleet Weather Center Norfolk 19

20 Explain what a RAM is: Random Antiterrorism Measures. To maximize the effectiveness and deterrence value, RAM should be implemented without a set pattern, either in terms of the measure selected, time, place, or other variables. RAM, at a minimum, shall consist of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Random use of other physical security measures should be used to supplement FPCON measures. Fleet Weather Center Norfolk 20

21 Explain and state the purpose of an EAP: An Emergency Action Plan (EAP) is utilized when anticipating natural disasters. All activities located within the U.S and its territories that hold classified COMSEC or CCI material will maintain an up-to-date, written Emergency Action Plan for the protection of COMSEC material appropriate for natural disasters likely to occur in their region of the country (e.g., hurricanes in the South, tornados and floods in the mid-west, wild fires in the West, etc.). In addition, all activities located within the U.S and its territories will have conducted an initial written risk assessment and must maintain an up-to-date copy of the risk determination document that assesses the potential for hostile actions against their facilities (such as terrorist attack, rioting, or civil uprising). Based on the sensitivity of the operations, or the facility, the cognizant security official will either certify that the review has determined no need for the Emergency Plan to consider hostile actions, or, if it is determined that a potential risk exists, develop EDPs for inclusion in their Emergency Plan. Fleet Weather Center Norfolk 21

22 Explain and state the purpose of Emergency Destruction Procedures: An Emergency Destruction Procedures (EDP) is utilized when anticipating a hostile action. Planning for hostile actions must concentrate on procedures to safely evacuate or securely destroy the COMSEC material, to include providing for the proper type and a sufficient number of destruction devices to carry out emergency destruction. Planning for hostile action shall also include the necessary training for all individuals who might perform emergency destruction. By contrast, planning for natural disasters should be directed toward maintaining security control over the material until the situation stabilizes, taking into account the possible loss of normal physical security protection that might occur during and after a natural disaster. The operating routines for COMSEC facilities should be structured so as to minimize the number and complexity of actions that must be taken during emergencies to protect COMSEC material. 1. Only the minimum amount of COMSEC material should be held at any one time; i.e., routine destruction should be conducted frequently and excess COMSEC material disposed of in accordance with department or agency directives. COMSEC requirements should be reviewed at least annually to validate need for material on hand. 2. COMSEC material should be stored and inventoried in ways that will facilitate emergency evacuation or destruction. Fleet Weather Center Norfolk 22

23 State who can give the order to initiate Emergency Destruction: The Commanding Officer/OIC or official responsible for safeguarding COMSEC material. Fleet Weather Center Norfolk 23

24 Explain how, and in what order, material is destroyed during Emergency Destruction: Material will be identified for emergency destruction/removal following the general guidelines listed below: 1. Priority One: All cryptographic equipment and documents 2. Priority Two: All operational SCI codeword material which might divulge targets and successes, documents dealing with U.S. SCI activities and documents concerning compartmented projects and other sensitive intelligence materials and TOP SECRET collateral. 3. Priority Three: Less sensitive administrative SCI material and collateral classified material not included above. Fleet Weather Center Norfolk 24

25 Define SCI: Sensitive Compartmented Information - Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. Fleet Weather Center Norfolk 25

26 List the items prohibited in a SCIF and the security risks associated with them: No devices that transmits, receives, records or stores data is authorized into a SCIF without prior approval (i.e CO or SSO or ISSM). Also, no photography in or around a SCIF without CO approval. The ISSM must approve ALL IT software prior to its use in a SCIF. Fleet Weather Center Norfolk 26

27 Define the difference between a security violation and a practice dangerous to security: Fleet Weather Center Norfolk 27

28 Explain the secuirty requirements for the following: Fleet Weather Center Norfolk 28

29 Explain vault recertification and recurring inspections: The container or vault door must be inspected and recertified by a person specifically trained and authorized by the GSA before it can be used to protect classified material. Upon completion of the inspection, a GSA Approved Recertified Security Container label will be applied and the container/vault door is then considered authorized for storage/protection of classified material. If the container fails inspection, it must be repaired in accordance with Federal Standard 809, Federal Standard Neutralization and Repair of GSA-Approved Security containers, before the recertification label can be applied. Fleet Weather Center Norfolk 29

30 Discuss the need for access lists, required documenation logs, and two-person integrity: Access Lists are lists that specify who or what is allowed to access the object or place of interest. This applies to personnel who do not have to sign in when they enter a space. Per NCTAMSLANTINST C, Access Lists must always be kept up to date and posted in the applicable space. Visitors who are not part of the command are required to sign the visitor s log in the specific space that they are visiting. Fleet Weather Center Norfolk 30

31 Explain the DoD escort policy: If an escort is required for the visitor, a military, civilian or a cleared contractor assigned to the command being visited may be assigned escort duties. As a matter of convenience and courtesy, flag officers, general officers and their civilian equivalents are not required to sign visitor records or display identification badges when being escorted as visitors. Identification of these senior visitors by escorts will normally be sufficient. The escort should be present at all times to avoid challenge and embarrassment and to ensure that necessary security controls are met. If the visitor is not being escorted, all normal security procedures will apply. Fleet Weather Center Norfolk 31

32 Discuss the procedures for sanitizing an area: The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. Properly sanitized media may be subsequently declassified upon observing the organization s respective verification and review procedures Fleet Weather Center Norfolk 32

33 Discuss each of the following, giving their definition and the purpose of each: a. COMSEC - Communications Security (COMSEC) material is that material used to protect U.S. Government transmissions, communications, and the processing of classified or sensitive unclassified information related to national security from unauthorized persons and that material used to ensure the authenticity of such communications. The protection of vital and sensitive information moving over government communications systems is crucial to the effective conduct of the government and specifically to the planning and execution of military operations. To this end, a system has been established to distribute, control, and safeguard COMSEC material. This system, which consists of production facilities, COMSEC Central Offices of Records (CORs), distribution facilities (i.e., depots), and EKMS accounts, is known collectively as the CMCS. The CMCS, as currently established, will continue to function until such time as the Electronic Key Management System (EKMS) is fully implemented. COMSEC material is managed in EKMS/COMSEC accounts throughout the federal government to include departments and civil agencies as well as the civilian sector supporting the federal government. b. INFOSEC (covered later in this training) c. COMPUSEC - Computer Security (COMPUSEC) is the protection of computing systems against threats to confidentiality, integrity, availability, and accountability. It must address the threats to electronic transactions and files. The context of computer security is always changing, due to rapidly changing technology, decentralization, networking, privacy issues, and the potential for fraud and abuse. d. PSP - The objective of the Personnel Security Program (PSP) is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements. e. ATFP - Fleet Weather Center Norfolk 33

34 State the purpose of the ICD systems: Intelligence Community Directive. The Director of National Intelligence (DNI) established Intelligence Community Directives (ICDs) as the principal means by which the DNI provides guidance, policy, and direction to the Intelligence Community. Fleet Weather Center Norfolk 34

35 Idenitfy SSO Navy: The Director, Security and Corporate Services (ONI-05) as Special Security Officer for the DON (SSO Navy) has been designated as the Cognizant Security Authority (CSA). As CSA, SSO Navy is responsible for implementing SCI security policy and procedures and performs management and oversight of the Department s SCI security program. Fleet Weather Center Norfolk 35

36 List the duties and responsibilites of the SSO: Commands in the DON accredited for and authorized to receive, process and store SCI will designate a Special Security Officer (SSO). The SSO is the principal advisor on the SCI security program in the command and is responsible to the commanding officer for the management and administration of the program. SCI security program responsibilities are detailed in reference (d). The SSO will be afforded direct access to the commanding officer to ensure effective management of the command's SCI security program. The SSO will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO. a. The SSO and a subordinate SSO will be appointed, in writing, and each will be a U.S. citizen and either a commissioned officer or a civilian employee GS-9 or above, and must meet Director, Central Intelligence Directive (DCID) 6/4, "Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI)" (NOTAL)standards. The same grade limitations apply to assistant SSOs. The security manager cannot function as the SSO unless authorized by the Director, ONI or Commander, NETWARCOM (IOD). b. Although the SSO administers the SCI program independent of the security manager, the security manager must account for all clearance and access determinations made on members of the command. There is great need for cooperation and coordination between the SSO and security manager, especially for personnel security matters. For individuals who are SCI eligible, the security manager and the SSO must keep one another advised of any changes in status regarding clearance and access and of information developed that may affect eligibility. The security manager and SSO must also advise each other of changes in SCI and command security program policies and procedures as they may impact on the overall command security posture. Fleet Weather Center Norfolk 36

37 Idenitfy who can be a CSM: The command security manager may be assigned full-time, part-time or as a collateral duty and must be an officer or a civilian employee, GS-11 or above, with sufficient authority and staff to manage the program for the command. The security manager must be a U.S. citizen and have been the subject of a favorably adjudicated Single Scope Background Investigation (SSBI) completed within five years prior to assignment. The security manager shall be identified by name on command organizational charts, telephone listings, rosters, or other media. Reference (c) recommends that the security manager report to the commanding officer on functional security matters and to the executive officer for administration of the ISP Fleet Weather Center Norfolk 37

38 State the duties and responsibilites of a CSM: The security manager is responsible for implementing the ISP and shall have direct access to the commanding officer. Some tasks may be assigned to a number of command personnel and may even be assigned to persons senior to the security manager. Nevertheless, the security manager shall remain cognizant of all command information, personnel, and industrial security functions and ensure that the security program is coordinated and inclusive of all requirements in this policy manual. The security manager shall: a. Serve as the principal advisor and representative to the commanding officer in matters pertaining to the classification, safeguarding, transmission, and destruction of classified information. b. Develop a written command security instruction (see exhibit 2A in SECNAV M ), to include provisions for safeguarding classified information during military operations or emergency situations. c. Ensure that personnel in the command who perform security duties are kept abreast of changes in policies and procedures, and provide assistance in problem solving. d. Formulate, coordinate, and conduct the command security education program. e. Ensure that threats to security and other security violations are reported, recorded, and when necessary investigated. Ensure that incidents described in chapter 12 of SECNAV M are immediately referred to the nearest NCIS office. f. Ensure that all security violations or incidents involving the possible compromise of classified information, to include those involving information technology (IT) systems, are investigated and reported in accordance with chapter 12 of SECNAV M Coordinate after-incident responses involving classified information processed on IT systems with the command Information Assurance Manager (IAM). Fleet Weather Center Norfolk 38

39 State the duties and responsibilites of a CSM (cont): g. Coordinate the preparation and maintenance of security classification guides under the command's cognizance. h. Maintain liaison with the command Public Affairs Officer (PAO) to ensure that proposed press releases and information intended for public release are subjected to a security review (see chapter 8 of SECNAV M ). i. Coordinate with other command officials regarding security measures for the classification, safeguarding, transmission and destruction of classified information. j. Develop security measures and procedures regarding visitors who require access to classified information. k. Ensure that classified information is secured and controlled areas are sanitized when a visitor is not authorized access. l. Implement and interpret, as needed, regulations governing the disclosure of classified information to foreign governments. m. Ensure compliance with the requirements of SECNAV M when access to classified information is provided at the command to cleared contractors in connection with a classified contract. n. Ensure that access to classified information is limited to appropriately cleared personnel with a need-to-know per reference (b) of SECNAV M Fleet Weather Center Norfolk 39

40 Explain and state the purpose of JPAS: The Joint Personnel Adjudication System (JPAS) is a DoD system that uses NIPRNET to connect all DoD security personnel around the world with their Central Adjudication Facility (CAF). The JPAS web site runs on a secured port with secured socket layer (SSL) 128-bit encryption. JPAS is the Department of Defense (DoD) personnel security clearance and access database. It facilitates personnel security program management for the Department of Defense Central Adjudication Facilities, for DoD security managers, and Sensitive Compartment Information (SCI) program managers. JPAS interfaces with the Defense Security Service (DSS) and the Office of Personnel Management (OPM) to populate personnel security investigation data and the personnel systems, Defense Enrollment Eligibility Reporting System (DEERS) and Defense Civilian Personnel Data System (DCPDS), to populate identifying data. JPAS is the system of record for personnel security adjudication, clearance and verification and history. Fleet Weather Center Norfolk 40

41 Explain and state the purpose of JPAS (cont): JPAS has two applications. The Joint Adjudication Management System (JAMS) and the Joint Clearance and Access Verification System (JCAVS). 1. JAMS is the application which supports central adjudication facilities personnel and provides capabilities and data such as case management/ distribution, adjudication history, due process history, revocations and denial action information, and will have the ability to electronically access personnel security investigative reports from either the DSS or the OPM. JCAVS is the application which supports command security personnel and provides capabilities and data such as local access record capabilities, debriefings, incident file reports and eligibility data, SAP access information and security management reports. 2. Department of the Navy (DON) commands are required to use JCAVS exclusively to record all access determinations which includes temporary access, upgrades, downgrades, and suspensions. Commands must document interim security clearance determinations, execution of Nondisclosure Agreements (SF-189, SF-189A or SF-312), and personal attestations and use JCAVS to submit continuous evaluation reports, pass visit requests, determine security clearance and Sensitive Compartmented Information (SCI) access eligibility, determine status of requested personnel security investigation (PSI), record PSI submission dates and request DON CAF determinations, record all access determinations, JCAVS users will be responsible for changes to an individual s access within the JCAVS. The minimum investigative standards required for access to JCAVS can be found in chapter 3-1. The minimum security clearance eligibility for access to JCAVS can be found in chapter 3-1. Data will be permanently retained within JPAS but it will not always be displayed. Data pertaining to individuals that retire or separate from the DON will be visibly retained for 24 months. However, if no action occurs on the individual record for twenty-four months, the record will be purged from display and archived. General Officer and Senior Executive Service employee data will be visibly retained indefinitely. Fleet Weather Center Norfolk 41

42 Explain and state the responsibilites of DONCAF: The Department of the Navy Central Adjudication Facility (DONCAF), is a Naval Criminal Investigative Service (NCIS) organization, and is responsible for determining who within the Department of the Navy is eligible to hold a security clearance, to have access to Sensitive Compartmented Information (SCI), or to be assigned to sensitive duties. The aggregate body of DON personnel consists of Active Duty and Reserve components of the United States Navy and Marine Corps, as well as civilians and contractors. In addition, DONCAF makes SCI eligibility determinations for select contractor personnel. Collateral clearance determinations for contractor personnel are established by DISCO (Defense Industrial Service Clearance Office). DONCAF also maintains an extensive database of its security decisions and provides overall operational support to the Navy s personnel security program. Adjudication is the review and consideration of all available information to ensure an individual s loyalty, reliability, and trustworthiness are such that entrusting an individual with national security information or assigning an individual to sensitive duties is clearly in the best interest of national security. Our mission is to provide excellent customer service, accurate and timely adjudication, and implement innovative strategies for the DON Personnel Security Program. Fleet Weather Center Norfolk 42

43 Discuss how long a CO can administratively suspend access before DONCAF revokes a clearance: SCI access suspension is a temporary measure designed to safeguard sensitive classified information or facilities. Suspension of SCI access will not exceed 90 days without the express consent of the SOIC or designee. Forward follow-up and final reports of investigation to the cognizant SOIC(Senior Official of the Intelligence Community) CAF (Central Adjudication Facility). Fleet Weather Center Norfolk 43

44 State the levels of INFOCON and what each signifies: The Information Operations Condition (INFOCON) system provides a framework within which the Commander USSTRATCOM (CDRUSSTRATCOM), regional commanders, service chiefs, base/post/camp/station/vessel commanders, or agency directors can increase the measurable readiness of their networks to match operational priorities. The INFOCONs mirror Defense Conditions (DEFCON) defined in CJCSM B, (S) Alert System of the Chairman of the Joint Chiefs of Staff (U), and are a uniform system of five progressive readiness conditions - INFOCON 5, INFOCON 4, INFOCON 3, INFOCON 2, and INFOCON 1. (There is no direct correlation between INFOCON and DEFCON levels, though commanders should consider changes in INFOCON when DEFCON changes.) INFOCON 5 is normal readiness and INFOCON 1 is maximum readiness. Each level represents an increasing level of network readiness based on tradeoffs in resource balancing (e.g., downtime versus level of assured confidence regarding malicious activity) that every commander must make. The INFOCONs are supplemented by Tailored Readiness Options (TRO), which are applied in order to respond to specific intrusion characteristics or activities, directed by CDRUSSTRATCOM or commanders. INFOCON procedures focus on proactively establishing and re-establishing a secure baseline based on a periodic, operational rhythm. This cycle varies, based on perceived operational needs, from bringing systems back to a secure baseline every 180 days at INFOCON 5, to restoring that secure baseline every 15 days at INFOCON 1. The definitions of each INFOCON are as follows: INFOCON 5 - Normal Readiness Procedures INFOCON 4 - Increased Military Vigilance Procedures INFOCON 3 - Enhanced Readiness Procedures INFOCON 2 - Greater Readiness Procedures INFOCON 1 - Maximum Readiness Procedures Fleet Weather Center Norfolk 44

45 Discuss the secuirty rules and procedures for magnetic and electronic media: a. Magnetic Media - For clarification, Magnetic storage media is considered to be any component of a system which, by design, is capable of retaining information without power. The procedures contained below meet the minimum security requirements for the clearing, sanitizing, releasing, and disposal of magnetic media as well as guidance for other types of information storage media. These procedures will be followed when it becomes necessary to release magnetic media, regardless of classification, from Sensitive Compartmented Information (SCI) channels. Media that has ever contained SCI, other intelligence information, or Restricted Data cannot be sanitized by overwriting; such media must be degaussed before release. Review of Terms. To better understand the procedures contained herein, it should be understood that overwriting, clearing, purging, degaussing, and sanitizing are not synonymous with declassification. The following are definitions: 1. Clearing. Clearing is the process of removing information from a system or the media to facilitate continued use and to preclude the AIS system from recovering previously stored data. In general, laboratory techniques allow the retrieval of information that has been cleared, but normal operations do not allow such retrieval. Clearing can be accomplished by overwriting or degaussing. 2. Sanitizing (Also Purging). Sanitizing is the process of removing information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. In general, laboratory techniques cannot retrieve data that has been sanitized/purged. Sanitizing may be accomplished by degaussing. 3. Destruction. Destruction is the process of physically damaging media so that it is not usable and there is no known method of retrieving the data. 4. Declassification. Declassification is an administrative process used to determine whether media no longer requires protection as classified information. The procedures for declassifying media require Designated Approving Authority (DAA) Representative (Rep) or Service Certifying Organization (SCO) approval. Fleet Weather Center Norfolk 45

46 Discuss the secuirty rules and procedures for magnetic and electronic media (cont): b. Electronic Media - A portable electronic device is a generic term used to describe the myriad of small electronic items that are widely available. The rapid growth in technological capabilities of portable electronic devices/portable computing devices (PEDs/PCDs) has led to concerns about their portability into and out of Sensitive Compartmented Information Facilities (SCIFs). PEDs include cellular telephones, two way pagers, palm sized computing devices, two-way radios, audio/video/data recording, playback features, personal digital assistants, palm tops, laptops, notebooks, data diaries, and watches with communications software and synchronization hardware, that may be used to telecommunicate. These devices must be closely monitored to ensure effective control and protection of all information on our IS. The use of PEDs in a SCI environment presents a high degree of risk for the compromise of classified or sensitive information. PEDs will only be used to fulfill mission requirements. Additionally, very specific handling procedures must be developed and made available to the user of the PED. The Agency in charge of any given SCIF is the authority for the procedures to move PEDs in or out of their facilities. Specific requirements/procedures are: All of the following requirements must be satisfied prior to approving the use of portable electronic devices: 1. Personal PEDs Personal PEDs, hardware/software associated with them, and media are prohibited from entering/exiting a SCIF unless authorized by the Agency granting SCIF accreditation. Personal PEDs are prohibited from operating within a SCIF unless authorized by the agency granting SCIF accreditation. If approved, the owner of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. Connection of a Personal PED to any IS within a SCIF is prohibited. PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. Fleet Weather Center Norfolk 46

47 Discuss the secuirty rules and procedures for magnetic and electronic media (cont): 2. Government Owned PEDs Government PEDs, hardware/software associated with them, and media must be controlled when entering/exiting a SCIF. Government PEDs are prohibited from operating within a SCIF unless authorized and accredited by the agency granting the SCIF accreditation. As part of the accreditation requirements, the user of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. Connection of a Government PED to any IS within a SCIF must be approved by the ISSM in writing. PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. Specified PEDs (i.e. Laptop Computers) may be used to process classified information. In addition, these PEDs may be granted approval to connect to ISs on a case-by-case basis in writing by the ISSM. Specified PEDs approved to process classified information must meet minimum technical security requirements. If approved, the PED and associated media must be transported and stored in a manner that affords security sufficient to preclude compromise of information, sabotage, theft, or tampering. Procedures for handling the PED in a SCIF must be available and provided to the user. Fleet Weather Center Norfolk 47

48 Explain why the U.S. Navy only uses.mil addresses on government systems: In the Domain Name System (DNS) naming of computers, there is a hierarchy of names. There is a set of top-level domain names (TLDs). These are the generic TLDs and the two letter country codes from International Organization for Standardization (ISO) Standard Number 3166 (Reference (e) of DoD Instruction ). The Internet Assigned Numbers Authority (IANA) provides a list of the generic TLDs that presently includes twenty domains and descriptions. A hierarchy of names usually exists under each TLD. For example,.mil is a TLD,.OSD.MIL is a Second Level Domain (SLD) and TRICARE.OSD.MIL is a Third Level Domain (not usually referred to with an acronym). Each of the generic TLDs was created for a general category of organizations. The country code domains (e.g., FR, NL, KR, US) are each organized by an administrator for that country. All generic TLDs are international in nature, with the exception of two (.MIL and.gov) that are restricted to use by entities in the United States. Descriptions for each follow: a.).gov Agencies of the U.S. Federal government have exclusive use of this domain. State and local agencies use the.us country domain. (See paragraph 4.h. of DoD Instruction ) DoD Components do not generally qualify for use of this domain. b.).mil The U.S. Department of Defense has exclusive use of this domain. Fleet Weather Center Norfolk 48

49 QUESTIONS? Fleet Weather Center Norfolk 49

August Initial Security Briefing Job Aid

August Initial Security Briefing Job Aid August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing

More information

Course No. S-3C-0001 Student Guide Lesson Topic 7.2 LESSON TOPIC 7.2. Personnel Security Investigations

Course No. S-3C-0001 Student Guide Lesson Topic 7.2 LESSON TOPIC 7.2. Personnel Security Investigations REFERENCE SECNAV M-5510.30, Chapter 6 LESSON LESSON TOPIC 7.2 Personnel Security Investigations A. Basic Policy (PSP 6-1, 6-2) 1. A Personnel Security Investigation (PSI) is an inquiry by an investigative

More information

Subj: DEPARTMENT OF THE NAVY (DON) PERSONNEL SECURITY PROGRAM (PSP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) PERSONNEL SECURITY PROGRAM (PSP) INSTRUCTION SECNAV INSTRUCTION 5510.30B DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.30B N09N2 From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I Q-53 Security Training: Transmitting and Transporting Classified Information, Part I Agenda Classified Information Dissemination Outside of DoD Disclosure Handling Transmission and Transportation Requirements

More information

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES Department of Homeland Security Management Directives System MD Number: 11021 Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES I. Purpose This Directive establishes policy and procedures

More information

Introduction to the Department of the Navy Information and Personnel Security Program

Introduction to the Department of the Navy Information and Personnel Security Program NONRESIDENT TRAINING COURSE Introduction to the Department of the Navy Information and Personnel Security Program NAVEDTRA 14210 Notice: NETPDTC is no longer responsible for the content accuracy of the

More information

Department of the Navy. Information Security Program

Department of the Navy. Information Security Program THE SECRETARY OF THE NAVY SECNAV M-5510.36 Department of the Navy Information Security Program Published By Chief of Naval Operations (N09N) Special Assistant for Naval Investigative Matters and Security

More information

Personnel Clearances in the NISP

Personnel Clearances in the NISP Personnel Clearances in the NISP Student Guide August 2016 Center for Development of Security Excellence Lesson 1: Course Introduction Course Introduction Course Information Welcome to the Personnel Clearances

More information

Student Guide: North Atlantic Treaty Organization

Student Guide: North Atlantic Treaty Organization Length Two (2) Hours Description This course provides the student with a basic understanding of NATO information security procedures, access requirements, personnel and facility security requirements,

More information

From: Commanding Officer/Leader, United States Navy Band

From: Commanding Officer/Leader, United States Navy Band DEPARTMENT OF THE NAVY UNITED STATES NAVY BAND 617 WARRINGTON AVE., SE WASHINGTON NAVY YARD, DC 20374-5054 NAVBANDINST 5510 NB.SM NAVY BAND INSTRUCTION 5510 From: Commanding Officer/Leader, United States

More information

Balancing Requirements

Balancing Requirements REFERENCES LESSON TOPIC 5.5 Safeguarding SECNAV M-5510.36, Chapters 7 and 10 OPNAVINST 5530.14E, Physical Security and Loss Prevention SECNAVINST 5430.107, Mission and Functions of the Naval Criminal Investigative

More information

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350-1000 SECNAVINST 5510.36A N09N2 SECNAV INSTRUCTION 5510.36A From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

Protection of Classified National Intelligence, Including Sensitive Compartmented Information Protection of Classified National Intelligence, Including Sensitive Compartmented Information 703 A. AUTHORITY 1. The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended;

More information

HQMC IPSP SOP Table of Contents. Systems Support...Encl (1) Responsibilities...Encl (2) Program Management...Encl (3) Personnel Security...

HQMC IPSP SOP Table of Contents. Systems Support...Encl (1) Responsibilities...Encl (2) Program Management...Encl (3) Personnel Security... Table of Contents Systems Support...Encl (1) Responsibilities...Encl (2) Program Management...Encl (3) Personnel Security...Encl (4) Information Security...Encl (5) Industrial Security...Encl (6) Systems

More information

UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)

UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP) Headquarters, U.S. Marine Corps MCO P5510.18A PCN 10208490600 UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP) DISTRIBUTION STATEMENT A: Approved

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency SFPC Example Questions Please note: Cyber items are indicated with a ** at the end of the practice test questions. 1. Which of the following is a true statement regarding the special handling requirements

More information

NATO SECURITY INDOCTRINATION

NATO SECURITY INDOCTRINATION NATO SECURITY INDOCTRINATION This security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified information.

More information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information Department of Defense INSTRUCTION NUMBER 5200.01 October 9, 2008 SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information References: See Enclosure 1 USD(I) 1. PURPOSE.

More information

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT Warrant Officer Basic Course Introduction

More information

Defense Security Service DELIVER! A Pamphlet On. How to Transmit and Transport Your Classified Materials. Prepared by

Defense Security Service DELIVER! A Pamphlet On. How to Transmit and Transport Your Classified Materials. Prepared by Defense Security Service DELIVER! A Pamphlet On How to Transmit and Transport Your Classified Materials Prepared by Information Security Team Department of Defense Security Institute Richmond, Virginia

More information

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 BACKGROUND AND METHODOLOGY As part of its responsibilities to oversee agency actions to ensure compliance with Executive Order 12958,

More information

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS B141176 STUDENT HANDOUT Basic Officer Course Introduction Importance

More information

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 Description of document: Requested date: Released date: Posted date: Source of document: Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005 07-June-2011

More information

Self-Inspection Handbook for NISP Contractors

Self-Inspection Handbook for NISP Contractors Self-Inspection Handbook for NISP Contractors TABLE OF CONTENTS The Contractor Security Review Requirement...1 The Contractor Self-Inspection Handbook...1 The Elements of Inspection...1 Inspection Techniques...2

More information

Course No. S-3C-0001 Student Guide Lesson Topic 7.0 LESSON TOPIC 7.0. Joint Personnel Adjudication System (JPAS) Overview

Course No. S-3C-0001 Student Guide Lesson Topic 7.0 LESSON TOPIC 7.0. Joint Personnel Adjudication System (JPAS) Overview REFERENCE LESSON TOPIC 7.0 Joint Personnel Adjudication System (JPAS) Overview SECNAV M-5510.30, Appendix E LESSON A. Joint Personnel Adjudication System (JPAS)(PSP, Appendix E) 1. Mandated personnel security

More information

1. Functions of the Air Force SCI Security Program and the Special Security Officer (SSO) System.

1. Functions of the Air Force SCI Security Program and the Special Security Officer (SSO) System. Template modified: 27 May 1997 14:30 BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 14-302 18 JANUARY 1994 Intelligence CONTROL, PROTECTION, AND DISSEMINATION OF SENSITIVE COMPARTMENTED

More information

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security TABLE OF CONTENTS Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction

More information

DoD M OPERATING MANUAL. February

DoD M OPERATING MANUAL. February DoD 5220.22-M OPERATING MANUAL February 2006 http://www.ncms-isp.org/nispom_200602_with_isls.pdf NISPOM Hyper-Link and Color-Code Guide All hyper-links that take you to a specific reference have a corresponding

More information

Revised Mar Standard Practice Procedures For Security Services. George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030

Revised Mar Standard Practice Procedures For Security Services. George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030 Standard Practice Procedures For Security Services George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030 1 Letter of Promulgation George Mason University (Mason) has entered into

More information

NATO UNCLASSIFIED. 5 December 2006 DOCUMENT C-M(2002)49-COR3 SECURITY WITHIN THE NORTH ATLANTIC TREATY ORGANISATION

NATO UNCLASSIFIED. 5 December 2006 DOCUMENT C-M(2002)49-COR3 SECURITY WITHIN THE NORTH ATLANTIC TREATY ORGANISATION 5 DOCUMENT -COR3 SECURITY WITHIN THE NORTH ATLANTIC TREATY ORGANISATION Corrigendum to dated 17 June 2002 Amendment 3 1. Council has approved text 1 with respect to the following : (d) the updated responsibilities

More information

General Security. Question Answer Policy Resource

General Security. Question Answer Policy Resource General Security Briefly define a Special Access Program. A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally

More information

Industrial Security Program

Industrial Security Program Army Regulation 380 49 Security Industrial Security Program Headquarters Department of the Army Washington, DC 20 March 2013 UNCLASSIFIED SUMMARY of CHANGE AR 380 49 Industrial Security Program This major

More information

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM DODEA ADMINISTRATIVE INSTRUCTION 5210.03, VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM Originating Component: Security Management Division Effective: March 23, 2018 Releasability: Cleared

More information

FOR OFFICIAL USE ONLY. Naval Audit Service. Audit Report

FOR OFFICIAL USE ONLY. Naval Audit Service. Audit Report FOR OFFICIAL USE ONLY Naval Audit Service Audit Report Effectiveness of the Department of the Navy s Denial Process for Interim Security Clearances at Selected Activities This report contains information

More information

ISL 02L-1 April 22, Industrial Requests Affected by Operation Enduring Freedom

ISL 02L-1 April 22, Industrial Requests Affected by Operation Enduring Freedom DEPARTMENT OF DEFENSE DEFENSE SECURITY SERVICE, INDUSTRIAL SECURITY PROGRAM OFFICE INDUSTRIAL SECURITY LETTER Industrial Security letters will be issued periodically to inform Industry, User Agencies and

More information

Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY

Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 2221.5D N2N6 OPNAV INSTRUCTION 2221.5D From: Chief of Naval Operations Subj: RELEASE

More information

RECORDS MANAGEMENT TRAINING

RECORDS MANAGEMENT TRAINING RECORDS MANAGEMENT TRAINING EVERYONES RESPONSIBILITY Marine Corps Community Services MCAS, Cherry Point, North Carolina COURSE INFORMATION Course Information Goal The goal of this training is to provide

More information

1. Purpose. To implement the guidance set forth in references (a) through (e) by:

1. Purpose. To implement the guidance set forth in references (a) through (e) by: DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON, D.C. 20350-1000 SECNAVINST 3300.2C DUSN SECNAV INSTRUCTION 3300.2C From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER OFFUTT AIR FORCE BASE AIR FORCE INSTRUCTION 31-401 OFFUTT AIR FORCE BASE Supplement 28 JANUARY 2015 Security INFORMATION SECURITY COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

More information

Chapter 9 Legal Aspects of Health Information Management

Chapter 9 Legal Aspects of Health Information Management Chapter 9 Legal Aspects of Health Information Management EXERCISE 9-1 Legal and Regulatory Terms 1. T 2. F 3. F 4. F 5. F EXERCISE 9-2 Maintaining the Patient Record in the Normal Course of Business 1.

More information

Commanding General, 2d Marine Aircraft Wing Distribution List

Commanding General, 2d Marine Aircraft Wing Distribution List UNITED STATES MARINE CORPS 2D MARINE AIRCRAFT WING II MARINE EXPEDITIONARY FORCE POSTAL SERVICE CENTER BOX 8050 CHERRY POINT, NC 28533-0050 WgO 5510.1T SEC MGR JUt. 1 8 2011 WING ORDER 5510.1T From: To:

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency APC Example Questions 1. True or False? DoD personnel should immediately report any clandestine relationship that exists or has existed with a foreign entity to their counterintelligence element, supporting

More information

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350 2000 OPNAVINST 2201.3B N6 OPNAV INSTRUCTION 2201.3B From: Subj: Ref: Encl: Chief of Naval Operations

More information

DoD R, August 1998

DoD R, August 1998 1 2 FOREWORD 3 FOREWORD TABLE OF CONTENTS Page Foreword 2 Table of Contents 4 References 6 Definitions 7 CHAPTER 1 - GENERAL PROVISIONS C1.1. Purpose C1.1.1. Purpose 10 C1.1.2. Definitions 10 C1.1.3. Concept

More information

Student Guide - DSS Annual Security Awareness Training

Student Guide - DSS Annual Security Awareness Training Introduction - DSS Annual Security Awareness Training Hello, I m Tim Harrison, Chief of Security for the Defense Security Service (or DSS). Welcome to the DSS Annual Security Awareness Training. Here at

More information

OPNAVINST B N6 9 November 1999 OPNAV INSTRUCTION B

OPNAVINST B N6 9 November 1999 OPNAV INSTRUCTION B DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 IN REPLY REFER TO OPNAVINST 5239.1B N6 9 November 1999 OPNAV INSTRUCTION 5239.1B From: To: Subj:

More information

Question Distractors References Linked Competency

Question Distractors References Linked Competency ISOC Example Questions 1. Which statement regarding a corporation s common business structure and Facility Security Clearances (FCLs) is TRUE? Select all that apply. a. If a director does not require access

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5205.08 November 8, 2007 USD(I) SUBJECT: Access to Classified Cryptographic Information References: (a) DoD Directive 5205.8, subject as above, February 20, 1991

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5105.68 May 3, 2002 Certified Current as of November 21, 2003 SUBJECT: Pentagon Force Protection Agency DA&M References: (a) Title 10, United States Code (b) DoD

More information

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED Army Regulation 380 5 Security Department of the Army Information Security Program Headquarters Department of the Army Washington, DC 29 September 2000 UNCLASSIFIED SUMMARY of CHANGE AR 380 5 Department

More information

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities SECNAV INSTRUCTION 5500.36 From: Secretary of the Navy D E PA R T M E N T O F THE N AV Y OF FICE OF THE SECRETARY 1000 N AVY PENTAGON WASHING TON DC 20350-1000 SECNAVINST 5500.36 DUSN (P) Subj: DEPARTMENT

More information

OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure

OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure for Safeguarding Classified Information 25 March 2013 FOREWORD As stated in the Overlook Security Policy, dated 23 January 2013, Overlook

More information

Defense Security Service Academy OCA Desk Reference Guide

Defense Security Service Academy OCA Desk Reference Guide Defense Security Service Academy OCA Desk Reference Guide May 007 Final Page OCA Decision Aid The safety and security of the United States depend upon the protection of sensitive information. Classification

More information

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI) Department of Defense INSTRUCTION NUMBER 5210.83 July 12, 2012 Incorporating Change 1, Effective February 22, 2018 USD(I) SUBJECT: DoD Unclassified Controlled Nuclear Information (UCNI) References: See

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.8 February 20, 1991 Certified Current as of February 20, 2004 SUBJECT: Access to Classified Cryptographic Information ASD(C3I) References: (a) National Telecommunications

More information

Department of Defense DIRECTIVE. SUBJECT: Security Requirements for Automated Information Systems (AISs)

Department of Defense DIRECTIVE. SUBJECT: Security Requirements for Automated Information Systems (AISs) Department of Defense DIRECTIVE NUMBER 5200.28 March 21, 1988 SUBJECT: Security Requirements for Automated Information Systems (AISs) USD(A) References: (a) DoD Directive 5200.28, "Security Requirements

More information

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HEADQUARTERS OPERATING INSTRUCTION APRIL Security

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HEADQUARTERS OPERATING INSTRUCTION APRIL Security BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HEADQUARTERS OPERATING INSTRUCTION 31-2 1 APRIL 1998 Security POLICY AND PROCEDURES FOR HANDLING AND SAFEGUARDING NORTH ATLANTIC TREATY ORGANIZATION

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: Defense Security Service (DSS) References: See Enclosure 1 NUMBER 5105.42 August 3, 2010 Incorporating Change 1, March 31, 2011 DA&M 1. PURPOSE. Pursuant to the

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select

More information

Security Classification Guidance v3

Security Classification Guidance v3 Security Classification Guidance v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Course Overview Welcome to the Security Classification Guidance Course. The

More information

Initial Security Briefing

Initial Security Briefing UNIVERSITY OF CALIFORNIA BERKELEY DAVIS IRVINE LOS ANGELES MERCED RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ Initial Security Briefing This briefing paper sets forth certain basic Federal

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE COMMANDER AIR MOBILITY COMMAND (AMC) AIR MOBILITY COMMAND INSTRUCTION 16-1404 21 FEBRUARY 2017 Operations TOP SECRET CONTROL COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5510.165A DNS OPNAV INSTRUCTION 5510.165A From: Chief of Naval Operations Subj: NAVY

More information

Student Guide Course: Original Classification

Student Guide Course: Original Classification Course: Original Classification Lesson: Course Introduction Course Information Purpose Audience Pass/Fail % Estimated completion time Define original classification and identify the process for determining

More information

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1 000 SECNAVINST 5510.37 DUSN PPOI AUG - 8 2013 SECNAV INSTRUCTION 5510.37 From: Subj: Ref: Encl: Secretary of the

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.39 September 10, 1997 SUBJECT: Security, Intelligence, and Counterintelligence Support to Acquisition Program Protection ASD(C3I) References: (a) DoD Directive

More information

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION 1. CLEARANCE AND SAFEGUARDING DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION a. FACILITY CLEARANCE REQUIRED b. LEVEL OF SAFEGUARDING REQUIRED Print TOP SECRET (The requirements of

More information

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE SUBJECT: Defense Media Activity (DMA) NUMBER 5105.74 December 18, 2007 Incorporating Change 1, August 29, 2017 DA&M DCMO References: (a) Title 10, United States Code (b)

More information

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation Incidents Involving Special Circumstances Information Webinar Danny Jennings Physical & General Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military,

More information

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT) SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security

More information

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5200.02 March 21, 2014 USD(I) SUBJECT: DoD Personnel Security Program (PSP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive

More information

Overview of Physical Security and Protective Measures

Overview of Physical Security and Protective Measures Overview of Physical Security and Protective Measures NAVFAC Northwest Presented by: Richard Cofer, P.E. Naval Facilities Engineering Command Atlantic Capital Improvements Business Line Engineering Criteria

More information

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C,

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C, -= DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C, 20350-2000 IN REPLY REFER TO 5211 Ser DNS-36/6U833273 7 Sep 06 From: Subj: Chief of Naval Operations

More information

Department of the Army TRADOC Memorandum Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia

Department of the Army TRADOC Memorandum Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia Department of the Army TRADOC Memorandum 380-5 Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia 23604-5700 22 August 2016 Administration-General INFORMATION SECURITY

More information

Subj: UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM (IPSP)

Subj: UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM (IPSP) DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON DC 20350-3000 MCO 5510.18B PPO MARINE CORPS ORDER 5510.18B From: Commandant of the Marine Corps To:

More information

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity THE UNDER SECRETARY OF DEFENSE 2000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-2000 POLICY October 1, 2010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 10-018 Law Enforcement

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5105.21, Volume 1 October 19, 2012 Incorporating Change 1, Effective May 16, 2018 USD(I) SUBJECT: Sensitive Compartmented Information (SCI) Administrative Security Manual:

More information

MILITARY PERSONNEL SECURITY PROGRAM

MILITARY PERSONNEL SECURITY PROGRAM MILITARY PERSONNEL SECURITY PROGRAM COMDTINST M5520.12B Commandant United States Coast Guard 2100 2nd ST SW Washington, DC 20593-0001 Staff Symbol: G-CFI Phone: (202) 267-1481 COMDTINST M5520.12B SEP 4

More information

Identification and Protection of Unclassified Controlled Nuclear Information

Identification and Protection of Unclassified Controlled Nuclear Information ORDER DOE O 471.1B Approved: Identification and Protection of Unclassified Controlled Nuclear Information U.S. DEPARTMENT OF ENERGY Office of Health, Safety and Security DOE O 471.1B 1 IDENTIFICATION

More information

BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement

BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION 31-501 EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement 1 October 2009 Certified Current 01 June 2016 Security PERSONNEL SECURITY PROGRAM MANAGEMENT

More information

Course No. S-3C-001 Exercise Guide Lesson Topic 8.2 ASSIGNMENT SHEET 8.2. Security Incidents Team Exercise

Course No. S-3C-001 Exercise Guide Lesson Topic 8.2 ASSIGNMENT SHEET 8.2. Security Incidents Team Exercise INTRODUCTION ASSIGNMENT SHEET 8.2 Security Incidents Team Exercise This exercise provides practical application of information provided in Lesson Topic 8.1, Loss and Compromise of Classified Information.

More information

Department of Defense DIRECTIVE. SUBJECT: Department of Defense Unclassified Controlled Nuclear Information (DoD UCNI)

Department of Defense DIRECTIVE. SUBJECT: Department of Defense Unclassified Controlled Nuclear Information (DoD UCNI) Department of Defense DIRECTIVE NUMBER 5210.83 November 15, 1991 Certified Current as of November 24, 2003 Incorporating Change 1, November 16, 1994 ASD(C3I) SUBJECT: Department of Defense Unclassified

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 Incorporating Change 2, August 28, 2017 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 5100.76 February 28, 2014 USD(I) SUBJECT: Safeguarding Sensitive Conventional Arms, Ammunition, and Explosives (AA&E) References: See Enclosure 1 1. PURPOSE. This

More information

Procedural Guidance for Conducting DoD Classified Conferences

Procedural Guidance for Conducting DoD Classified Conferences Procedural Guidance for Conducting DoD Classified Conferences Prepared By July 2008 Security professionals may find this guidance useful when they are involved in hosting/coordinating DoD classified conferences.

More information

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE Department of Defense DIRECTIVE NUMBER 5200.2 April 9, 1999 ASD(C3I) SUBJECT: DoD Personnel Security Program References: (a) DoD Directive 5200.2, subject as above, May 6, 1992 (hereby canceled) (b) Executive

More information

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Acquisitions and Contracting Basics in the National Industrial Security Program (NISP) Lesson 1: Course Introduction Contents Introduction... 2 Opening... 2 Objectives... 2 September 2015 Center for Development

More information

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C. 20301-1010 May 10, 2010 Incorporating Change 1, September 29, 2010 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF

More information

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014 THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like

More information

For Security Professionals in the Combat Environment. October 2012

For Security Professionals in the Combat Environment. October 2012 Deployable Security Trainer For Security Professionals in the Combat Environment October 2012 OCTOBER Deployable 2011 Security Trainer OCTOber 2012 1 Deployable Security Trainer OCTOBER 2012 2 TABLE OF

More information

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense Department of Defense DIRECTIVE AD-A272 551 February 20, 1991 Il~~ I~~IlNUMBER ll l IIl ~l~ ~IiIll 5205.8 ASD(C31) SUBJECT: Access to Classified Cryptographic Information References: (a) National Telecommunications

More information

The DD254 & You (SBIR)

The DD254 & You (SBIR) The DD254 & You Small Business Innovative Research (SBIR) Joyce K. Foca P-8A MMA Security Manager (301) 757-2961 joyce.foca@navy.mil Remember To do great important tasks, Three things are necessary.. 1.

More information

NNPI TERMS AND CONDITIONS

NNPI TERMS AND CONDITIONS Nothing in the foregoing relieves any party of its obligations to protect export controlled and other proprietary and business sensitive technical data and information from unauthorized disclosure, public

More information

Introduction to Industrial Security, v3

Introduction to Industrial Security, v3 Introduction to Industrial Security, v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Introduction Introduction Subcontractor CEO: I m really excited -- my

More information

Department of Defense MANUAL

Department of Defense MANUAL Department of Defense MANUAL NUMBER 5105.21, Volume 3 October 19, 2012 Incorporating Effective April 5, 2018 USD(I) SUBJECT: Sensitive Compartmented Information (SCI) Administrative Security Manual: Administration

More information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection

More information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE INSTRUCTION 91-104 23 APRIL 2013 Safety NUCLEAR SURETY TAMPER CONTROL AND DETECTION PROGRAMS COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:

More information