Creating an Insider Threat Program. NCMS June 2015
|
|
- Godwin Hardy
- 5 years ago
- Views:
Transcription
1 Creating an Insider Threat Program NCMS June 2015
2 Agenda Introduction History 101 Recent Events What is Insider Threat and Why We Need A Program? The National Archives Program NISPOM Requirements What is a Program? Sources of Data and the HUB Scope and Assets Base Line (What is Normal?) Implementation Case Studies (Data Use) Q & A Resources
3 Samuel Slater (June 9, 1768 April 21, 1835) In the UK he was called "Slater the Traitor
4 What about these? Wen Chyu Liu Kexue Hauang Yaun Li Elliot Doxer Sergey Aleynikov Michael Mitchell Shalin Jhaveri Hanuajn Jin Greg Chung Chi Mak Conspired with internal employees Foreign Travel Foreign Contacts Business Government Download and copied MBs of data Thousands of documents and files
5 Recent Events.. Many of the documents leaked by Manning to Wikileaks and Snowden have shown us a new wave of threats by personnel that have access and training that can damage national security.
6 What is an Insider Threat and Why do We Need A Program?
7 What is an insider threat? It is a threat posed to U.S. national security by someone who has authorized access to classified information but who misuses or betrays that access to provide classified information to another entity not authorized to possess it. That entity could be another government, another individual, or even the media.
8 Why does the United States need an Insider Threat Programs? The exposure of hundreds of thousands of classified and sensitive USG documents by the WikiLeaks internet site demonstrated to the government and the public that current sharing and safeguarding procedures for classified information were inadequate and put our nation s security at risk. In November 2012, after an interagency review of the NITTF s work products, the President issued the National Insider Threat Policy and the Minimum Standards for Executive Branch Insider Threat Programs via a Presidential Memorandum.
9 National Archives and Records Administration
10 Why does the National Archives need an Insider Threat Program? NARA is responsible for the safety and protection of holdings which include information classified by every department and agency authorized to do so, as well as electronic systems used as part of our work with those holdings or to otherwise support NARA operations. Hundreds of NARA staff, other agencies' employees, and Federal government contractors have access to this information and these systems every day in the course of their work. It is our responsibility, as directed by the President, to prevent individuals with access to NARA's classified holdings and systems from giving classified information to individuals or organizations not authorized to possess it.
11 Back Ground NARA We have 600 plus Employees and Contractors have access to National Security Information We have the most mosaic collection of classified information in the US government. Presidential Libraries Intelligence Community Records Department of Defense (Armed Services and Combatant Commands) Departments of State, Energy, Commerce, Treasury, etc, etc, We have generational media types, disks, tapes, textual, maps, photos, etc, of highly sensitive national security information.
12 ITP is within the Chief Operating Officers Office
13 NARA ITP Developed Policy NARA 242 On going development of Implementation Guide Developed Training Hired Staff (1 IT Security Specialist and 1 Program Analyst) Currently Base lining our Agency Gather Data Developing Priorities Reviewing Policies and Process
14 The Challenge Educating Leadership and Staff on what is and is not the Program is.. 46 Locations across the United States plus affiliated Archives and Records Facilities. We own the records but NOT the classified information and the records a PERMENANT! We do not classify records and most of our classified electronic systems are standalones and LANs. Plus we have 100 s of other Federal Employees and Contractors assisting in the review of classified information for declassification.
15 Economic Impact of the Insider Threat In the last fiscal year alone, economic espionage and theft of trade secrets cost the American economy more than $19 billion economic espionage and theft of trade secrets are increasingly linked to the insider threat -Christopher Munsey, FBI Counterintelligence Division (2013) The average cost per Insider Threat incident is $412,000. Average loss per industry is $14 million/year. Multiple incidents have exceeded $1 billion. -Patrick Reidy, FBI CISO, Black Hat Conference (2013) Source Global Skills Exchange, CORP.
16 NIPSOM Requirements
17 What is your Challenge!? Establish a program that: Has a designated Senior Official and Insider Threat Official who will Gather, integrate, and report potential or actual insider threat Maintain pertinent records to insider threat for when requested and rendering assistance if necessary Report events that may indicate the employee poses an insider threat or affect proper safeguarding of classified information Training Requirement
18 Requirements Senior Official Establish a Program Train Staff Maintain Necessary Records and Documentation Report
19 What is the Program? Proactive Behavioral Risk Management Overlaid onto Existing Programs Integrates Data from MULTIPLE sources Discrete
20 Sources of Information Information flowing into the HUB can be passive and active. Active information is that information requested when it is believe that a staff member is engaged in malicious behavior. Passive information will feed into the HUB by electronic feeds with no human action. 4/3/2015 DRAFT DRAFT DRAFT 20
21 Data Sources UAM Data Financial Disclosure Physical Security Insider Threat Hub Foreign Contacts Foreign Travel Metrics Leads Human Resources Behavioral Assessments EAM Data Personnel Security Insider Inquiries Manual or Automated Processing ANALYST Reports 4/3/
22 Office Stakeholders Office of Human Capital Labor/Employee Relations and Benefits Staffing and Recruitment Business Support Services Facilities and Property Security Management Information Services IT Security External Owners of Classified Networks May need an MOU 4/3/
23 Labor/Employee Relations and Benefits Staffing and Recruitment DATA Name (First and Last) Organization Code, Office Symbol, and Description Pay Plan, Occupational Series, Position Title and Grade Supervisory Status Employees Supervisor Location (Physical) Employment Status Start Date Other needed Information Anniversary Dates Termination Date Performance Ratings Transfers, Promotions, and Details to other Offices that require different access Administrative Leave or other Disciplinary Action Work Hours, Flex Time, 4/10s etc Date in Current Position 4/3/
24 Security Management Information Via Forms Foreign Travel, Contacts (name and nationality), official or personal. Dates, Destination, and Unusual changes in itinerary Clearance Level and Access Security Infractions and Violations Statement of Personal History SF 86 Classified Room Access Logs Employee financial disclosure reports as appropriate Government Official Passport holders Requests for Access or Keys to Areas not within Staff Scope of Work Staff needing temporary pass Notifications via Changes in relationship status (divorced, widow, marriage) or cohabitation Financial Problems (bankruptcy, garnished wages, or leans) Arrests (for any reason), or other involvement with the legal system Psychological or Substance abuse counseling does not need reporting if sought on your own initiative. Outside Activities or Employment that could create an apparent conflict of interest Notification of pending termination or under special watch by Security Incident while attempting to leave through baggage checks 4/3/
25 IT Security Websites visited or repeated attempts Downloads from websites or Access to after work areas? Weekend? Holidays? Accessing shared drives after hours. Downloading off Attempting to access unauthorized drives during or after hours Attempts to bypass security protocols Attempts to encrypt data on drives Requests for new user accounts Remotely accessing the system and performing task atypical to the individuals responsibilities Elevating or assigning administrator roles to unauthorized users or accounts Accessing another users computer when left unattended Failing to follow policies and controls Accessing user s and administrators accounts after termination of employment. Using computer resources to conduct a side business Anyone staff member having been recently terminated, disciplined, demoted or changed duties and roles. 4/3/
26 SCOPE and Your Assets.
27 What is the scope of your Insider Threat Program? Will you only monitor staff that have direct access to classified national security information? Will you monitor trusted business partners? Will you monitor all system administrators? Unclassified networks? Where is your DATA? Who has access? How soon to new hires get access?
28 HUB Priorities All New Employees and Contractor s Moderate Risk Offices and Staff High Risk Offices or Staff Problem Employees or Watch List Highly Sensitive Information Offices and Staff Other Agency Staff and Contractors HUB IT Program Staff Low Risk Offices and Staff Special Studies and Audits 4/3/
29 User Activity Monitoring (UAM) USER Analyst Workbench Analytic HUB (Private Enclave) ANALYST 4/3/
30 Baseline What is your normal? Foreign Travel Base Travel
31 Implementation Have a written Policy And Implementing Guide Engage the C Suite Educate and Inform Internal Communication on the Program ICN Web Be Transparent Train, Train, and Train staff Set Reasonable Goals when beginning Document and Record your internal activities Stay Current with your organization
32 Turning on the Switch
33 Case Studies
34
35 Resources FBI CERT NCIX DSS
36 My Contact Information Neil C. Carmichael, Jr. Program Manager Insider Threat Program National Archives and Records Administration (office) (bb) Member NCMS Chesapeake Bay Chapter
GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information
GAO United States General Accounting Office Report to the Committee on Armed Services, U.S. Senate March 2004 INDUSTRIAL SECURITY DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection
More informationDOD Insider Threat Management and Analysis Center COUNTERINTELLIGENCE AWARENESS WEBINAR SERIES
JUNE, MARCH 2015 2016 DOD Insider Threat Management and Analysis Center COUNTERINTELLIGENCE AWARENESS WEBINAR SERIES DITMAC Host: Rebecca Morgan Insider Threat Instructor - CDSE Guests: Matt Guy Asst.
More informationINSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems
United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544
More information8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation
Incidents Involving Special Circumstances Information Webinar Danny Jennings Physical & General Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military,
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5210.50 October 27, 2014 Incorporating Change 1, Effective February 16, 2018 USD(I) SUBJECT: Management of Serious Security Incidents Involving Classified Information
More informationDEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE
DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE Lockheed Martin Security TABLE OF CONTENTS Congratulations 2 Introduction 3 Reporting Requirements 4 Procedures and Duties 5 Safeguarding 6 Reproduction
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5200.39 September 10, 1997 SUBJECT: Security, Intelligence, and Counterintelligence Support to Acquisition Program Protection ASD(C3I) References: (a) DoD Directive
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 5510.165A DNS OPNAV INSTRUCTION 5510.165A From: Chief of Naval Operations Subj: NAVY
More informationEXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES
EXECUTIVE ORDER 12333: UNITED STATES INTELLIGENCE ACTIVITIES (Federal Register Vol. 40, No. 235 (December 8, 1981), amended by EO 13284 (2003), EO 13355 (2004), and EO 13470 (2008)) PREAMBLE Timely, accurate,
More informationInitial Security Briefing
UNIVERSITY OF CALIFORNIA BERKELEY DAVIS IRVINE LOS ANGELES MERCED RIVERSIDE SAN DIEGO SAN FRANCISCO SANTA BARBARA SANTA CRUZ Initial Security Briefing This briefing paper sets forth certain basic Federal
More informationDepartment of Defense DIRECTIVE. SUBJECT: Unauthorized Disclosure of Classified Information to the Public
Department of Defense DIRECTIVE NUMBER 5210.50 July 22, 2005 USD(I) SUBJECT: Unauthorized Disclosure of Classified Information to the Public References: (a) DoD Directive 5210.50, subject as above, February
More informationDefense Security Service Intelligence Oversight Awareness Training Course Transcript for CI
Welcome In a 2013 testimony to congress on Foreign Intelligence Surveillance, the former Director of National Intelligence, LT GEN James Clapper (Ret) spoke about limitations to intelligence activities
More informationv. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a "Ninoy" The Grand Jury in and for the District of New Jersey,
2005R00881/SJR/KHB UNITED STATES DISTRICT COURT DISTRICT OF NEW JERSEY UNITED STATES OF AMERICA : Criminal No. 05- v. : 18 U.S.C. 371, 951 & 2 MICHAEL RAY AQUINO, : I N D I C T M E N T a/k/a "Ninoy" The
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.07, Volume 2 November 24, 2015 Incorporating Change 1, Effective February 12, 2018 USD(I) SUBJECT: Special Access Program (SAP) Security Manual: Personnel Security
More informationSecurity Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)
SAPPC Knowledge Checkup Please note: Cyber items are indicated with a ** at the end of the practice test questions. Question Answer Linked 1. What is the security professionals role in pursuing and meeting
More informationNUCLEAR REGULATORY COMMISSION [NRC ] Nuclear Regulatory Commission Insider Threat Program Policy Statement
This document is scheduled to be published in the Federal Register on 02/25/2016 and available online at http://federalregister.gov/a/2016-04026, and on FDsys.gov [7590-01-P] NUCLEAR REGULATORY COMMISSION
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 Incorporating Change 2, August 28, 2017 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance
More informationDoD Initial Briefing
DoD Initial Briefing 1 Overview Lockheed Martin plays a direct role in our nation s defense. Our technical systems and solutions are among the finest ever created, enabling the United States to prevail
More informationJanuary 3, 2011 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR January 3, 2011 M-11-08 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES FROM: SUBJECT:
More informationDepartment of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information
Department of Defense INSTRUCTION NUMBER 5200.01 October 9, 2008 SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information References: See Enclosure 1 USD(I) 1. PURPOSE.
More informationNATO SECURITY INDOCTRINATION
NATO SECURITY INDOCTRINATION This security briefing contains the minimum elements of information that must be provided to individuals upon initial indoctrination for access to NATO classified information.
More informationOverview of the Act on the Protection of Specially Designated Secrets (SDS)
Overview of the Act on the Protection of Specially Designated Secrets (SDS) Cabinet Secretariat Cabinet Intelligence and Research Office Overview of the Act on SDS Protection: 1. Designation of SDS 1.
More informationDEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities
DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1 000 SECNAVINST 5510.37 DUSN PPOI AUG - 8 2013 SECNAV INSTRUCTION 5510.37 From: Subj: Ref: Encl: Secretary of the
More informationSeptember 02, 2009 Incorporating Change 3, December 1, 2011
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE September 02, 2009 Incorporating Change 3, December 1, 2011 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS
More informationStudent Guide - DSS Annual Security Awareness Training
Introduction - DSS Annual Security Awareness Training Hello, I m Tim Harrison, Chief of Security for the Defense Security Service (or DSS). Welcome to the DSS Annual Security Awareness Training. Here at
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER O-5205.13 April 26, 2012 DoD CIO SUBJECT: Defense Industrial Base (DIB) Cyber Security and Information Assurance (CS/IA) Program Security Classification Manual (SCM)
More informationDepartment of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 Incorporating Change 1, July 27, 2017 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See
More informationDODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM
DODEA ADMINISTRATIVE INSTRUCTION 5210.03, VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM Originating Component: Security Management Division Effective: March 23, 2018 Releasability: Cleared
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5240.04 April 1, 2016 Incorporating Change 1, Effective April 26, 2018 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE.
More informationQuestion Distractors References Linked Competency
ISOC Example Questions 1. Which statement regarding a corporation s common business structure and Facility Security Clearances (FCLs) is TRUE? Select all that apply. a. If a director does not require access
More informationB. ACCESS, STORAGE, CUSTODY, CONTROL AND TRANSMISSION OF CLASSIFIED INFORMATION
International Programs Security Handbook 11-1 CHAPTER 11 CONTRACTOR OPERATIONS ABROAD A. INTRODUCTION This Chapter sets forth requirements governing contractor operations abroad, including security clearances
More informationNISPOM Update & Security Basics
NISPOM Update & Security Basics Government Contractors Forum: Security Clearance and Insider Threat Boot Camp February 9, 2016 Thomas J. Langer Vice President of Security, BAE Systems, Inc. Kevin Bickmore
More informationDEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC
DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, DC 20301-1010 October 8, 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF STAFF UNDER SECRETARIES
More informationUNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND
UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND **APPLICATIONS WILL ONLY BE ACCEPTED DURING THE CAREER FAIR** ANNOUNCEMENT NUMBER: INSCOM-JF-G2-0049 JOB TITLE: Intelligence Specialist (GMI Analyst)
More informationInformation Security Oversight Office
Information Security Oversight Office National Archives and Records Administration 700 Pennsylvania Avenue, NW Washington, DC 20408 November 30, 2004 The President The White House Washington, DC 20500
More informationSECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT
UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS B141176 STUDENT HANDOUT Basic Officer Course Introduction Importance
More informationPreserving Investigative and Operational Viability in Insider Threat
Preserving Investigative and Operational Viability in Insider Threat September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Overview Welcome Your Insider Threat Program
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.02E June 20, 2012 Incorporating Change 1, Effective May 11, 2018 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program References: See Enclosure 1 1. PURPOSE.
More informationJoint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008)
Joint Base Lewis-McChord (JBLM), WA Network Enterprise Center (NEC) COMPUTER-USER AGREEMENT Change 1 (30 Jun 2008) Your Information Management Officer (IMO), System Administrator (SA) or Information Assurance
More informationBY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement
BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION 31-501 EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement 1 October 2009 Certified Current 01 June 2016 Security PERSONNEL SECURITY PROGRAM MANAGEMENT
More informationSUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity
THE UNDER SECRETARY OF DEFENSE 2000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-2000 POLICY October 1, 2010 MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT: Directive-Type Memorandum (DTM) 10-018 Law Enforcement
More information2011 Annual Refresher Briefing
2011 Annual Refresher Briefing Protecting Our America~Your National Laboratories University of California, Office of the President 1111 Franklin Street Oakland, CA 94607 CONTENTS Introduction... 1 Objective...1
More informationPersonnel Clearances in the NISP
Personnel Clearances in the NISP Student Guide August 2016 Center for Development of Security Excellence Lesson 1: Course Introduction Course Introduction Course Information Welcome to the Personnel Clearances
More informationProtection of Classified National Intelligence, Including Sensitive Compartmented Information
Protection of Classified National Intelligence, Including Sensitive Compartmented Information 703 A. AUTHORITY 1. The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended;
More informationSTATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE
STATEMENT OF JAMES R. CLAPPER FORMER DIRECTOR OF NATIONAL INTELLIGENCE BEFORE THE COMMITTEE ON THE JUDICIARY SUBCOMMITTEE ON CRIME AND TERRORISM UNITED STATES SENATE CONCERNING RUSSIAN INTERFERENCE IN
More informationINTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501
INTELLIGENCE COMMUNITY DIRECTIVE NUMBER 501 DISCOVERY AND DISSEMINATION OR RETRIEVAL OF INFORMATION WITHIN THE INTELLIGENCE COMMUNITY (EFFECTIVE: 21 JANUARY 2009) A. AUTHORITY: The National Security Act
More informationDOD DIRECTIVE INTELLIGENCE OVERSIGHT
DOD DIRECTIVE 5148.13 INTELLIGENCE OVERSIGHT Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective: April 26, 2017 Releasability: Cleared for public
More informationDEFENSE OFFICE OF HEARINGS & APPEALS (DOHA) April 20, 2006 Briefing for the JSAC and NCMS (ISSIG)
DEFENSE OFFICE OF HEARINGS & APPEALS (DOHA) April 20, 2006 Briefing for the JSAC and NCMS (ISSIG) History of Personnel Security Clearance Due Process: Green v. McElroy (1959), E.O. 10865 (1960), Department
More informationThe Joint Legislative Audit Committee requested that we
DEPARTMENT OF SOCIAL SERVICES Continuing Weaknesses in the Department s Community Care Licensing Programs May Put the Health and Safety of Vulnerable Clients at Risk REPORT NUMBER 2002-114, AUGUST 2003
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5205.08 November 8, 2007 USD(I) SUBJECT: Access to Classified Cryptographic Information References: (a) DoD Directive 5205.8, subject as above, February 20, 1991
More informationAnnual Report to Congress on Foreign Economic Collection and Industrial Espionage 2001
Annual Report to Congress on Foreign Economic Collection and Industrial Espionage 2001 This report was prepared by the Office of the National Counterintelligence Executive. Reverse Blank October 2001 Annual
More informationIntelligence Community Whistleblower Protection
Intelligence Community Whistleblower Protection A. AUTHORITY: The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended; EO 13467, as amended; the Inspector General Act of 1978,
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5240.6 July 16, 1996 SUBJECT: Counterintelligence (CI) Awareness and Briefing Program ASD(C3I) References: (a) DoD Directive 5240.6, subject as above, February
More informationIdentification and Protection of Unclassified Controlled Nuclear Information
ORDER DOE O 471.1B Approved: Identification and Protection of Unclassified Controlled Nuclear Information U.S. DEPARTMENT OF ENERGY Office of Health, Safety and Security DOE O 471.1B 1 IDENTIFICATION
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE SUBJECT: Defense Security Service (DSS) References: See Enclosure 1 NUMBER 5105.42 August 3, 2010 Incorporating Change 1, March 31, 2011 DA&M 1. PURPOSE. Pursuant to the
More informationAugust Initial Security Briefing Job Aid
August 2015 Initial Security Briefing Job Aid A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing
More informationUNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND
UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND **APPLICATIONS WILL ONLY BE ACCEPTED DURING THE CAREER FAIR** ANNOUNCEMENT NUMBER: INSCOM-JF-NGIC-0014 JOB TITLE: INTELLIGENCE SPECIALIST (GMI ANALYST)
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5210.48 December 24, 1984 USD(P) SUBJECT: DoD Polygraph Program References: (a) DoD Directive 5210.48, "Polygraph Examinations and Examiners," October 6, 1975 (hereby
More informationProtecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information
Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for
More informationThe DD254 & You (SBIR)
The DD254 & You Small Business Innovative Research (SBIR) Joyce K. Foca P-8A MMA Security Manager (301) 757-2961 joyce.foca@navy.mil Remember To do great important tasks, Three things are necessary.. 1.
More informationPERSONNEL SECURITY CLEARANCES
United States Government Accountability Office Report to Congressional Requesters November 2017 PERSONNEL SECURITY CLEARANCES Plans Needed to Fully Implement and Oversee Continuous Evaluation of Clearance
More informationSenate Select Committee on Intelligence. July 3, 2018
Senate Select Committee on Intelligence July 3, 2018 The Senate Select Committee on Intelligence (SSCI) is conducting a bipartisan investigation into a wide range of Russian activities relating to the
More informationSECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT
UNITED STATES MARINE CORPS THE BASIC SCHOOL MARINE CORPS TRAINING COMMAND CAMP BARRETT, VIRGINIA 22134-5019 SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT Warrant Officer Basic Course Introduction
More informationUnited States District Court
Case 1:17-mj-00024-BKE Document 5 Filed 06/05/17 Page 1 of 1 A091(Rcv. 11/1 1) Criminal Complaint United States District Court for the Southern District of Georgia United States of America V. REALITY LEIGH
More informationDO Off-Boarding Session Agenda Tuesday January 10, 2017
DO Off-Boarding Session Agenda Tuesday January 10, 2017 Welcome Mary Lhotsky, Director of Communications, Treasury Management and Budget Navigating the Off-Boarding Site & Tools (P4P Process) and Human
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: Law Enforcement Defense Data Exchange (LE D-DEx) References: See Enclosure 1 NUMBER 5525.16 August 29, 2013 Incorporating Change 1, Effective June 29, 2018 USD(P&R)USD(I)
More informationI. PURPOSE DEFINITIONS. Page 1 of 5
Policy Title: Computer, E-mail and Mobile Computing Device Use Accreditation Reference: Effective Date: October 15, 2014 Review Date: Supercedes: Policy Number: 4.31 Pages: 1.5.9 Attachments: October 15,
More informationGeneral Security. Question Answer Policy Resource
General Security Briefly define a Special Access Program. A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: Counterintelligence (CI) Analysis and Production References: See Enclosure 1 NUMBER 5240.18 November 17, 2009 Incorporating Change 2, Effective April 25, 2018
More informationSan Francisco Bay Area
San Francisco Bay Area PREVENTIVE RADIOLOGICAL AND NUCLEAR DETECTION REGIONAL PROGRAM STRATEGY Revision 0 DRAFT 20 October 2014 Please send any comments regarding this document to: Chemical, Biological,
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5240.02 March 17, 2015 USD(I) SUBJECT: Counterintelligence (CI) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) O-5240.02
More informationNational Security Program Application
National Security Program Application DATE: Applicant Information: Name: First Middle Last Address: Street (Apt) City/State Zip Street City/State Zip (Alternate Address) ( ) Telephone Number Email Address
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5240.04 February 2, 2009 USD(I) SUBJECT: Counterintelligence (CI) Investigations References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
More informationPresenting a live 90 minute webinar with interactive Q&A. Td Today s faculty features:
Presenting a live 90 minute webinar with interactive Q&A Foreign Ownership, Control or Influence and Government Contractor Security Clearance Mitigating FOCI and Meeting Requirements for National Interest
More informationContract Security Classification Specification. DD-254 Guidance
Contract Security Classification Specification DD-254 Guidance DD 254 Roadmap Justification Step by Step Common DSS findings Why a DD-254? The document provides the basis for a contractor to have a facility
More informationSECRETARY OF THE ARMY WASHINGTON
SECRETARY OF THE ARMY WASHINGTON 3 1 JUL 2013 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2013-18 (Army Insider Threat Program) 1. References: a. Presidential Memorandum (National Insider Threat
More informationChapter 2 - Organization and Administration
San Francisco Community College Police Department Chapter 2 - Organization and Administration Organization and Administration - 17 Policy 200 San Francisco Community College Police Department Organizational
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in
More informationA. AUTHORITY: The National Security Act of 1947, as amended; Executive Order (EO) 12333, as amended; and other applicable provisions of law.
Coordination of Clandestine Human Source and Human-Enabled Foreign Intelligence Collection and Counterintelligence Activities Outside the United States A. AUTHORITY: The National Security Act of 1947,
More informationUNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND
UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND **APPLICATIONS WILL ONLY BE ACCEPTED DURING THE CAREER FAIR** ANNOUNCEMENT NUMBER: INSCOM-JF-G7-0017 JOB TITLE: Intelligence Specialist (I&TS) SERIES
More informationDepartment of Defense MANUAL
Department of Defense MANUAL SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 NUMBER 5205.02-M November 3, 2008 Incorporating Change 1, Effective April 26, 2018 USD(I)
More informationREPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005
REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005 BACKGROUND AND METHODOLOGY As part of its responsibilities to oversee agency actions to ensure compliance with Executive Order 12958,
More informationINSTRUCTIONS FOR REQUESTING AN AFOSI LEOSA ID CARD Updated: 1 February 2018
INSTRUCTIONS FOR REQUESTING AN AFOSI LEOSA ID CARD Updated: 1 February 2018 As of February 2016, we no longer require weapons qualification documents for LEOSA ID packages. These instructions have been
More informationJOINT REGIONAL INTELLIGENCE CENTER (JRIC) MEMORANDUM OF UNDERSTANDING (MOU)
JOINT REGIONAL INTELLIGENCE CENTER (JRIC) MEMORANDUM OF UNDERSTANDING (MOU) A. PREAMBLE This MOU is entered into by the Federal Bureau of Investigation (FBI), Los Angeles County Sheriff's Department (LASD),
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5210.88 February 11, 2004 USD(I) SUBJECT: Safeguarding Biological Select Agents and Toxins References: (a) Directive-Type Memorandum, "Safeguarding Biological Select
More informationCompliance Program Updated August 2017
Compliance Program Updated August 2017 Table of Contents Section I. Purpose of the Compliance Program... 3 Section II. Elements of an Effective Compliance Program... 4 A. Written Policies and Procedures...
More informationANNUAL POST-EMPLOYMENT CERTIFICATION & NOTIFICATION TO SENIOR OFFICIALS OF POST-GOVERNMENT EMPLOYMENT RESTRICTIONS UNDER 18 U.S.C.
Certification: Because you are a member of the Department of Defense who files a public financial disclosure report (SF 278), DoD 5500.7-R, Joint Ethics Regulation (JER), requires you to certify each year
More informationSuggested Contractor File Folder Headings
Suggested Contractor File Folder Headings 1. Facility Clearance 2. Personnel Clearances 3. Recurring Security Education 4. Self-Inspection 5. Security Correspondence 6. Standard Practice Procedures 7.
More informationJOINT INTERAGENCY TASK FORCE SOUTH
ANNOUNCEMENT NUMBER: JIATFS - 023 JOB TITLE: Intelligence Specialist (Operations) SERIES & GRADE: GG-0132-12 SALARY RANGE: $81,548 to 106,012/Per Year (DCB Locality) OPEN PERIOD: 08 November 2018 POSITION
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5240.19 January 31, 2014 Incorporating Change 1, August 17, 2017 USD(I) SUBJECT: Counterintelligence Support to the Defense Critical Infrastructure Program (DCIP)
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.02 March 21, 2014 USD(I) SUBJECT: DoD Personnel Security Program (PSP) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Directive
More informationOFFICE OF THE DIRECTOR OF NATION At INTELLIGENCE WASHINGTON, DC 20511
OFFICE OF THE DIRECTOR OF NATION At INTELLIGENCE WASHINGTON, DC 20511 Steven Aftergood Federation of American Scientists 1725 DeSales Street NW, Suite 600 Washington, DC 20036 ~ov 2 5 2015 Reference: ODNI
More informationRecommendations Table
Recommendations Table Management Director of Security Forces, Deputy Chief of Staff for Logistics, Engineering and Force Protection, Headquarters Air Force Recommendations Requiring Comment Provost Marshal
More informationWebinar. Insider Threat Brief
011614 Webinar Insider Threat Brief Today s conference is being recorded, if you have any objections you may disconnect at this time. The host for today s call is Mr. Peter DeCesare, thank you and you
More informationUNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND
UNITED STATES ARMY INTELLIGENCE AND SECURITY COMMAND **APPLICATIONS WILL ONLY BE ACCEPTED DURING THE CAREER FAIR** ANNOUNCEMENT NUMBER: INSCOM-JF-G2-0056 JOB TITLE: Supervisory Security Specialist SERIES
More informationIntroduction to Industrial Security, v3
Introduction to Industrial Security, v3 September 2017 Center for Development of Security Excellence Lesson 1: Course Introduction Introduction Introduction Subcontractor CEO: I m really excited -- my
More informationDoD Update Insider Threat and the NISP
UNCLASSIFIED OFFICE OF THE UNDER SECRETARY OF DEFENSE DoD Update Insider Threat and the NISP Steve Lewis Valerie Heil May 19, 2015 UNCLASSIFIED Continuous Evaluation IMESA Insider Threat NISPOM Change
More informationJOINT INTERAGENCY TASK FORCE SOUTH
ANNOUNCEMENT NUMBER: JIATFS - 028 JOB TITLE: Supervisory Intelligence Specialist (Operations) SERIES & GRADE: GG-0132-13 SALARY RANGE: $96,970 to 126,062/Per Year (DCB Locality) OPEN PERIOD: 08 November
More informationDALLAS CYBER TASK FORCE. Standard Memorandum of Understanding. Between THE FEDERAL BUREAU OF INVESTIGATION. and
DALLAS CYBER TASK FORCE Standard Memorandum of Understanding Between THE FEDERAL BUREAU OF INVESTIGATION and THE ARLINGTON POLICE DEPARTMENT (the Participating Agency ) I. PARTIES This Memorandum of Understanding
More informationTHE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014
THE WHITE HOUSE Office of the Press Secretary For Immediate Release January 17, 2014 January 17, 2014 PRESIDENTIAL POLICY DIRECTIVE/PPD-28 SUBJECT: Signals Intelligence Activities The United States, like
More information