Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core

Similar documents
August Initial Security Briefing Job Aid

Course No. S-3C-0001 Student Guide Lesson Topic 7.2 LESSON TOPIC 7.2. Personnel Security Investigations

Subj: DEPARTMENT OF THE NAVY (DON) PERSONNEL SECURITY PROGRAM (PSP) INSTRUCTION

Q-53 Security Training: Transmitting and Transporting Classified Information, Part I

Department of Homeland Security Management Directives System MD Number: Issue Date: 06/29/2004 PORTABLE ELECTRONIC DEVICES IN SCI FACILITIES

Introduction to the Department of the Navy Information and Personnel Security Program

Department of the Navy. Information Security Program

Personnel Clearances in the NISP

Student Guide: North Atlantic Treaty Organization

From: Commanding Officer/Leader, United States Navy Band

Balancing Requirements

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Protection of Classified National Intelligence, Including Sensitive Compartmented Information

HQMC IPSP SOP Table of Contents. Systems Support...Encl (1) Responsibilities...Encl (2) Program Management...Encl (3) Personnel Security...

UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM MANUAL (SHORT TITLE: MARINE CORPS IPSP)

Question Distractors References Linked Competency

NATO SECURITY INDOCTRINATION

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

Defense Security Service DELIVER! A Pamphlet On. How to Transmit and Transport Your Classified Materials. Prepared by

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

Department of Health and Human Services (HHS) National Security Information Manual, February 1, 2005

Self-Inspection Handbook for NISP Contractors

Course No. S-3C-0001 Student Guide Lesson Topic 7.0 LESSON TOPIC 7.0. Joint Personnel Adjudication System (JPAS) Overview

1. Functions of the Air Force SCI Security Program and the Special Security Officer (SSO) System.

DEPARTMENT OF DEFENSE (DoD) INITIAL TRAINING GUIDE

DoD M OPERATING MANUAL. February

Revised Mar Standard Practice Procedures For Security Services. George Mason University 4400 University Drive, MSN 6D4, Fairfax, Virginia 22030

NATO UNCLASSIFIED. 5 December 2006 DOCUMENT C-M(2002)49-COR3 SECURITY WITHIN THE NORTH ATLANTIC TREATY ORGANISATION

General Security. Question Answer Policy Resource

Industrial Security Program

DODEA ADMINISTRATIVE INSTRUCTION , VOLUME 1 DODEA PERSONNEL SECURITY AND SUITABILITY PROGRAM

FOR OFFICIAL USE ONLY. Naval Audit Service. Audit Report

ISL 02L-1 April 22, Industrial Requests Affected by Operation Enduring Freedom

Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY

RECORDS MANAGEMENT TRAINING

1. Purpose. To implement the guidance set forth in references (a) through (e) by:

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Chapter 9 Legal Aspects of Health Information Management

Commanding General, 2d Marine Aircraft Wing Distribution List

Question Distractors References Linked Competency

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

DoD R, August 1998

Student Guide - DSS Annual Security Awareness Training

OPNAVINST B N6 9 November 1999 OPNAV INSTRUCTION B

Question Distractors References Linked Competency

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Army Regulation Security. Department of the Army. Information Security Program. Headquarters. Washington, DC 29 September 2000 UNCLASSIFIED

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

OVERLOOK SYSTEMS TECHNOLOGIES, INC. Standard Practice Procedure

Defense Security Service Academy OCA Desk Reference Guide

Department of Defense INSTRUCTION. DoD Unclassified Controlled Nuclear Information (UCNI)

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE. SUBJECT: Security Requirements for Automated Information Systems (AISs)

BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE HEADQUARTERS OPERATING INSTRUCTION APRIL Security

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Security Classification Guidance v3

Initial Security Briefing

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Student Guide Course: Original Classification

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

Department of Defense DIRECTIVE

DEPARTMENT OF DEFENSE CONTRACT SECURITY CLASSIFICATION SPECIFICATION

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE

8/15/2013. Security Incidents Involving Special Circumstances. Information Security Webinar. Danny Jennings. DCO Meeting Room Navigation

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Department of Defense MANUAL

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION

Overview of Physical Security and Protective Measures

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, D,C,

Department of the Army TRADOC Memorandum Headquarters, United States Army Training and Doctrine Command Fort Eustis, Virginia

Subj: UNITED STATES MARINE CORPS INFORMATION AND PERSONNEL SECURITY PROGRAM (IPSP)

SUBJECT: Directive-Type Memorandum (DTM) Law Enforcement Reporting of Suspicious Activity

Department of Defense MANUAL

MILITARY PERSONNEL SECURITY PROGRAM

Identification and Protection of Unclassified Controlled Nuclear Information

BY ORDER OF THE COMMANDER AIR FORCE INSTRUCTION EGLIN AIR FORCE BASE EGLIN AIR FORCE BASE Supplement

Course No. S-3C-001 Exercise Guide Lesson Topic 8.2 ASSIGNMENT SHEET 8.2. Security Incidents Team Exercise

Department of Defense DIRECTIVE. SUBJECT: Department of Defense Unclassified Controlled Nuclear Information (DoD UCNI)

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Procedural Guidance for Conducting DoD Classified Conferences

Department of Defense DIRECTIVE

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

DEPUTY SECRETARY OF DEFENSE 1010 DEFENSE PENTAGON WASHINGTON, D.C

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release January 17, January 17, 2014

For Security Professionals in the Combat Environment. October 2012

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

The DD254 & You (SBIR)

NNPI TERMS AND CONDITIONS

Introduction to Industrial Security, v3

Department of Defense MANUAL

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Transcription:

Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core Fleet Weather Center Norfolk 1

Objectives: Discuss the directives that govern personnel security Define and discuss the classification categories Explain need to know Identify the different types of security investigation Indentify SAER Define SSO and events that are reported to the SRO Define and discuss a SCIF Identify and discuss the various forms used in security procedures Discuss safe combinations Define the purpose of the DCS Explain the various procedures for the transportation of classified material Explain the TSCO Define and discuss THREATCON and Force Protection Explain RAM Define EAP Fleet Weather Center Norfolk 2

Objectives (cont): Explain EMD Define SCI Explain vault recertification and recurring inspections Discuss access lists, 2 person integrity and documentations logs Explain the DoD escort policy Define and discuss COMSEC, INFOSEC, COMPUSEC, PSP and ATFP Explain the purpose of the ICD system Identify and discuss the SSO Identify and discuss the CSM Define and discuss JPAS Define and discuss DONCAF Define and discuss INFOCON and its levels Discuss the procedures for magnetic and electronic media Fleet Weather Center Norfolk 3

References: SECNAVINST M-5510.30 Series DoD 5105.21-M-1 http://www.archives.gov/isoo/security-forms/ DoD 5200.33 Series SECNAVINST M-5510.36 Series OPNAVINST 3300.53 Series EKMS 1A ICPG 705.5 ICPG 705.2 ICD 2005-1 http://www.navysecurity.navy.mil SD 527-1 Joint DoDIIS/Cryptologic SCI Information Systems Security Standards DODI 8410.01 Series NAVY FOREIGN DISCLOSURE MANUAL SECNAVINST 3300.3 Series SECNAVINST 5239.3 series ACP-122E Fleet Weather Center Norfolk 4

Identify the directives that govern personnel security: 1. DoD 5105.21-M-1 2. SECNAV M-5510-30 3. DCID 6/4 and 6/9 4. JOINTDODISS Fleet Weather Center Norfolk 5

Define the following classification categories, how they differ, and the color codes used to idenify each one : a. TOP SECRET - Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Color Code is Orange. b. SECRET- Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause serious damage to the national security. Color Code is Red. c. CONFIDENTIAL Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause damage to the national security. Color Code is Blue. d. UNCLASSIFIED Classification level applied to information whose unauthorized disclosure could reasonably be expected to cause little to no damage to the national security. Color Code is Green. Fleet Weather Center Norfolk 6

Explain what is meant by need to know : Access to classified information is not authorized by the favorable conclusion of a clearance eligibility determination. Access is only permitted to eligible individuals after determining that the individual has a need-to-know. a. Need-to-know is a determination that an individual requires access to specific classified information in the performance of (or assist in the performance of) lawful and authorized government functions and duties. b. Need-to-know is one of two information points that must be determined by every authorized holder of classified information prior to relinquishing that classified information to a prospective recipient. 1.) The authorized holder of classified information must determine that the intended recipient has security clearance eligibility established at (or above) the level of access required. 2.) The authorized holder must determine that the prospective recipient needs-to-know that information in order to perform lawful and authorized government functions. 3.) These determinations must be based on reliable information, obtained formally or informally, from chain of command supervisors, security managers, or other sources in a position to know the prospective recipients security clearance eligibility and/or duties and organizational functions in relation to the specified classified information intended for release. c. Need-to-know is a preventative measure to identify and deter unauthorized access. 1.) Knowledge, possession of, or access to classified information is not provided to any individual solely by virtue of the individual s office, rank, or position. 2.) Although access can only be authorized for individuals with established security clearance eligibility at or above the level of classified information required, having security clearance eligibility DOES NOT equate to need-to-know. d. Classified discussions are prohibited in public areas; hallways, cafeterias, elevators, rest rooms or smoking areas because the discussion may be overheard by persons who do not have a need-to-know. (Individuals are obliged to report violations of the need-to-know principle to their security manager.) e. Need-to-know requires a level of personal responsibility that is challenging, particularly since it conflicts with human nature and the desire to share information with co-workers and colleagues. It is therefore critical to frequently focus on need-to-know requirements during security education briefings and refresher training. Fleet Weather Center Norfolk 7

State the type of investigation and how often it is updated for access to the following classification levels: a. Top Secret - The investigative basis for Top Secret clearance eligibility is a favorably completed SSBI, SSBI-PR or PPR. For those who have continuous assignment or access to Top Secret, critical sensitive positions, SCI, Presidential Support Activities, COSMIC Top Secret, LAA, PRP, IT-1 duties or SIOP-ESI, the SSBI must be updated every five years by a PR. b. Secret/Confidential - The investigative basis for a Secret clearance eligibility is a favorably completed NACLC or ANACI. Clearance eligibility established based on ENTNAC's, NAC's or NACI's prior to NACLC or ANACI implementation remain valid. For a Secret Clearance, the investigation is updated every 10 and 15-years, respectively. c. Confidential - The investigative basis for a Confidential clearance eligibility is a favorably completed NACLC or ANACI. Clearance eligibility established based on ENTNAC's, NAC's or NACI's prior to NACLC or ANACI implementation remain valid. For a Confidential clearance, the investigation is updated every 10 and 15-years, respectively. d. SCI - The investigative requirement for access to SCI is a favorably adjudicated SSBI. A SSBI-PR is required to be submitted every five years. The requirements for SCI access are established under Director of National Intelligence (DNI) authority (reference (d) applies). When military personnel are ordered to billets requiring SCI access, the transfer orders will identify the requirement. The losing command's Security Manager/SSO must ensure the required investigative requests are submitted promptly prior to transfer. If an individual is indoctrinated for SCI access, the commanding officer may not administratively lower the individual's security clearance below the Top Secret level without approval of the DON CAF. Fleet Weather Center Norfolk 8

Idenitfy what a SAER is and its purpose: Security Access Eligibility Report - Used to identify an incident or any change in eligibility if an employee is still eligible for the security clearance. Fleet Weather Center Norfolk 9

Identify the events that should be reported to the SSO: The following events should be reported to the Special Security Officer (SSO): 1. Involvement in activities or sympathetic association with persons which/who unlawfully practice or advocate the overflow or alteration of the United States Government by unconstitutional means. 2. Foreign influence concerns/close personal association with foreign nationals, Foreign citizenships, or foreign monetary interests. 3. Sexual behavior that is criminal or reflects a lack of judgment or discretion 4. Unwillingness to comply with rules and regulations or to cooperate with security processing 5. Change of Marital Status or Marriage/Cohabitation with a foreign national. Fleet Weather Center Norfolk 10

Identify who has overall authority of, and controls access to, a SCIF: The Special Security Officer (SSO) will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO. Fleet Weather Center Norfolk 11

Identify the use of the following forms: a. SF 700 Security Container Information; this form contains vital information about the security container in which it is located. This information includes location, container number, lock serial number, and contact information if the container is found open and unattended. b. SF 701 Activity Security Checklist; this form is a checklist that is filled out at the end of each day to insure that classified materials are secured properly and allows for employee accountability in the event that irregularities are discovered. c. SF 702 Security Container Check Sheet; this form provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information. d. SF 703 Top Secret Cover Sheet (Orange); this form is used as a cover sheet for Top Secret documents. e. SF 153 COMSEC Material Report; this form is not listed in the reference provided, however it can be found in the GSA Forms library: http://www.gsa.gov/portal/forms/download/468a17f7987b41ae85256d41004b4f0a according to GSA, it is no longer in available for order through their archives; last revision was Sept 1988 f. SF 312 Classified Information Nondisclosure Agreement; this form provides is a contractual agreement between the U.S. Government and a cleared employee that must be executed as a condition of access to classified information. By signing the SF-312, the cleared employee agrees never to disclose classified information to an unauthorized person. Fleet Weather Center Norfolk 12

State when safe combinations should be changed: Combinations will be changed when one of the following occurs: a. When first placed in use b. When an individual knowing the combination no longer requires access unless other sufficient controls (e.g., security in-depth) exist to prevent access to the lock; c. When subjected to compromise d. When taken out of service. Built-in combination locks will then be reset to the standard combination 50-25-50; combination padlocks will be reset to the standard combination 10-20-30 Fleet Weather Center Norfolk 13

What is a FDO and state their responsibilites: Foreign Disclosure Officer. This individual will process all foreign visit requests to the command. The FDO is also responsible for any foreign disclosure of information to foreign nationals. Fleet Weather Center Norfolk 14

State the purpose of the DCS: The Defense Courier Service (DCS) is a Joint Command and direct reporting unit (DRU) under the Commander in Chief United States Transportation Command (CINCTRANS). The DCS establishes, staffs, operates, and maintains an international network of couriers and courier stations for the expeditious, cost effective, and secure transmission of qualified classified documents and material. The Defense Courier Service (DCS) is established under the United States Transportation Command (USTRANSCOM), and is a global courier network for the expeditious, cost-effective, and secure distribution of highly classified and sensitive material. Operational control of global courier activities is exercised through USTRANSCOM's Defense Courier Division (TCJ3-C). The division oversees and synchronizes activity of 18 courier stations worldwide to service over six thousand accounts. Major accounts include the White House, the Department of Defense, the State Department, other federal agencies, authorized government contractors, and allied nations. The DCS directly supports the President, Unified and Specified COCOMs, joint military operations, the Joint Chiefs of Staff, National Security Agency, Central Intelligence Agency, U.S. allies, State Department, and other federal agencies. -The DCS was formerly the Armed Forces Courier Service (ARFCOS) but was reorganized and renamed in 1985 after the Walker spy case. Fleet Weather Center Norfolk 15

Describe the procedures for preparing hard copy classified material for transportation via: a. DCS - the following procedures must be followed: 1. No item entering the DCS shall weigh over 300 pounds, or exceed dimensions 45 1/2" X 26" X 22", except those items for which the physical structure prohibits breakdown into smaller units. The minimum size of a "flat" (envelope) entered into the DCS shall meet the standard 8 1/2" X 11" in size; small boxes and/or packages shall have a minimum total dimension of 26"; e.g., girth (twice its width plus twice the height) added to the length. Requests for exception to weight or size restrictions shall be submitted to the servicing DCS station, in advance. 2. Items shall be addressed with the standardized DCS two-line address; the Army/AirPost Office, the Fleet Post Office, and the street addresses shall not be used. 3. Envelopes, labels, or tags with visible "postage and fees paid" indicia shall not be used. 4. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. 5. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper. 6. Detailed information on wrappings, marking, and preparing material for movement is available from the servicing DCS station. 7. Packaging Material Generally, all packaging materials are permissible if they afford contents with concealment and protection, preclude physical and/or visual access, are sturdy, and pose no hazard to handlers. Use of metal strapping is specifically prohibited. For assistance and clarification, customers should contact their servicing DCS station. U.S. Postal Service bags, pouches, or sacks shall not be used for DCS material. DoS bags, pouches, or sacks shall not be used for non-dos material, except in specific, previously coordinated situations. Fleet Weather Center Norfolk 16

Describe the procedures for preparing hard copy classified material for transportation via: b. Handcarry - the following procedures must be followed: 1. Prepare classified information for shipment by packaging and sealing it with tape which will retain the impression of any postal stamp, in ways that minimize risk of accidental exposure or undetected deliberate compromise. Classified information shall be packaged so that classified text is not in direct contact with the inner envelope or \container. 2. Enclose classified information transported outside the command in two opaque, sealed covers (e.g., envelopes, wrappings, or containers) durable enough to conceal and protect it from inadvertent exposure or tampering. The following exceptions apply: If the classified information is an internal component of a packageable item of equipment, the outside shell or body may be considered as the inner cover provided it does not reveal any classified information. If the classified information is an inaccessible internal component of a bulky item of equipment, the outside or body of the item may be considered a sufficient cover provided observation does not reveal classified information. If the classified information is an item of equipment that is not reasonably packageable and the shell or body is classified, it shall be concealed with an opaque covering that conceals all classified features. Specialized shipping containers, including closed cargo transporters, may be considered the outer wrapping or cover when used. Refer to the appropriate reference in paragraph 9-5 of SECNAV M-5510.36 preparation of special types of classified and controlled unclassified information for transmission or transportation. Fleet Weather Center Norfolk 17

State the responisbilites of the TSCO: The commanding officer shall designate, in writing, a command TOP SECRET CONTROL OFFICER (TSCO) for commands handling Top Secret information. Top Secret Control Assistants (TSCA) may be assigned as needed (see paragraph 2-4.3 of SECNAV M-5510.36). The TSCO reports directly to the security manager or the security manager may serve concurrently as the TSCO. The TSCO shall: a. Maintain a system of accountability (e.g., registry) to record the receipt, reproduction, transfer, transmission, downgrading, declassification and destruction of command Top Secret information, less SCI and other special types of classified information. b. Ensure that inventories of Top Secret information are conducted at least once annually, or more frequently when circumstances warrant (see chapter 7, paragraph 7-3 of SECNAV M-5510.36). As an exception, repositories, libraries, or activities that store large volumes of classified documents may limit their annual inventory to that which access has been given in the past 12 months, and 10 percent of the remaining inventory. Fleet Weather Center Norfolk 18

State the THREATCON recognition and Force Protection levels and discuss what each represents: a. FPCON NORMAL describes a situation or no current terrorist activity. The only security forces needed are enough to stop the everyday criminal, most likely civilian police forces. b. FPCON ALPHA describes a situation where there is a small and general terrorist activity that is not predictable. However, agencies will inform personnel that there is a possible threat and standard security procedure review is conducted. c. FPCON BRAVO describes a situation with somewhat predictable terrorist threat. Security measures taken by agency personnel may affect the activities of local law enforcement and the general public. d. FPCON CHARLIE describes a situation when an instance occurs or when intelligence reports that there is terrorist activity imminent. e. FPCON DELTA describes a situation when a terrorist attack is taking place or has just occurred. FPCON DELTA usually occurs only in the areas that are most vulnerable to or have been attacked. Fleet Weather Center Norfolk 19

Explain what a RAM is: Random Antiterrorism Measures. To maximize the effectiveness and deterrence value, RAM should be implemented without a set pattern, either in terms of the measure selected, time, place, or other variables. RAM, at a minimum, shall consist of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Random use of other physical security measures should be used to supplement FPCON measures. Fleet Weather Center Norfolk 20

Explain and state the purpose of an EAP: An Emergency Action Plan (EAP) is utilized when anticipating natural disasters. All activities located within the U.S and its territories that hold classified COMSEC or CCI material will maintain an up-to-date, written Emergency Action Plan for the protection of COMSEC material appropriate for natural disasters likely to occur in their region of the country (e.g., hurricanes in the South, tornados and floods in the mid-west, wild fires in the West, etc.). In addition, all activities located within the U.S and its territories will have conducted an initial written risk assessment and must maintain an up-to-date copy of the risk determination document that assesses the potential for hostile actions against their facilities (such as terrorist attack, rioting, or civil uprising). Based on the sensitivity of the operations, or the facility, the cognizant security official will either certify that the review has determined no need for the Emergency Plan to consider hostile actions, or, if it is determined that a potential risk exists, develop EDPs for inclusion in their Emergency Plan. Fleet Weather Center Norfolk 21

Explain and state the purpose of Emergency Destruction Procedures: An Emergency Destruction Procedures (EDP) is utilized when anticipating a hostile action. Planning for hostile actions must concentrate on procedures to safely evacuate or securely destroy the COMSEC material, to include providing for the proper type and a sufficient number of destruction devices to carry out emergency destruction. Planning for hostile action shall also include the necessary training for all individuals who might perform emergency destruction. By contrast, planning for natural disasters should be directed toward maintaining security control over the material until the situation stabilizes, taking into account the possible loss of normal physical security protection that might occur during and after a natural disaster. The operating routines for COMSEC facilities should be structured so as to minimize the number and complexity of actions that must be taken during emergencies to protect COMSEC material. 1. Only the minimum amount of COMSEC material should be held at any one time; i.e., routine destruction should be conducted frequently and excess COMSEC material disposed of in accordance with department or agency directives. COMSEC requirements should be reviewed at least annually to validate need for material on hand. 2. COMSEC material should be stored and inventoried in ways that will facilitate emergency evacuation or destruction. Fleet Weather Center Norfolk 22

State who can give the order to initiate Emergency Destruction: The Commanding Officer/OIC or official responsible for safeguarding COMSEC material. Fleet Weather Center Norfolk 23

Explain how, and in what order, material is destroyed during Emergency Destruction: Material will be identified for emergency destruction/removal following the general guidelines listed below: 1. Priority One: All cryptographic equipment and documents 2. Priority Two: All operational SCI codeword material which might divulge targets and successes, documents dealing with U.S. SCI activities and documents concerning compartmented projects and other sensitive intelligence materials and TOP SECRET collateral. 3. Priority Three: Less sensitive administrative SCI material and collateral classified material not included above. Fleet Weather Center Norfolk 24

Define SCI: Sensitive Compartmented Information - Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence. Fleet Weather Center Norfolk 25

List the items prohibited in a SCIF and the security risks associated with them: No devices that transmits, receives, records or stores data is authorized into a SCIF without prior approval (i.e CO or SSO or ISSM). Also, no photography in or around a SCIF without CO approval. The ISSM must approve ALL IT software prior to its use in a SCIF. Fleet Weather Center Norfolk 26

Define the difference between a security violation and a practice dangerous to security: Fleet Weather Center Norfolk 27

Explain the secuirty requirements for the following: Fleet Weather Center Norfolk 28

Explain vault recertification and recurring inspections: The container or vault door must be inspected and recertified by a person specifically trained and authorized by the GSA before it can be used to protect classified material. Upon completion of the inspection, a GSA Approved Recertified Security Container label will be applied and the container/vault door is then considered authorized for storage/protection of classified material. If the container fails inspection, it must be repaired in accordance with Federal Standard 809, Federal Standard Neutralization and Repair of GSA-Approved Security containers, before the recertification label can be applied. Fleet Weather Center Norfolk 29

Discuss the need for access lists, required documenation logs, and two-person integrity: Access Lists are lists that specify who or what is allowed to access the object or place of interest. This applies to personnel who do not have to sign in when they enter a space. Per NCTAMSLANTINST 5510.1C, Access Lists must always be kept up to date and posted in the applicable space. Visitors who are not part of the command are required to sign the visitor s log in the specific space that they are visiting. Fleet Weather Center Norfolk 30

Explain the DoD escort policy: If an escort is required for the visitor, a military, civilian or a cleared contractor assigned to the command being visited may be assigned escort duties. As a matter of convenience and courtesy, flag officers, general officers and their civilian equivalents are not required to sign visitor records or display identification badges when being escorted as visitors. Identification of these senior visitors by escorts will normally be sufficient. The escort should be present at all times to avoid challenge and embarrassment and to ensure that necessary security controls are met. If the visitor is not being escorted, all normal security procedures will apply. Fleet Weather Center Norfolk 31

Discuss the procedures for sanitizing an area: The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. Properly sanitized media may be subsequently declassified upon observing the organization s respective verification and review procedures Fleet Weather Center Norfolk 32

Discuss each of the following, giving their definition and the purpose of each: a. COMSEC - Communications Security (COMSEC) material is that material used to protect U.S. Government transmissions, communications, and the processing of classified or sensitive unclassified information related to national security from unauthorized persons and that material used to ensure the authenticity of such communications. The protection of vital and sensitive information moving over government communications systems is crucial to the effective conduct of the government and specifically to the planning and execution of military operations. To this end, a system has been established to distribute, control, and safeguard COMSEC material. This system, which consists of production facilities, COMSEC Central Offices of Records (CORs), distribution facilities (i.e., depots), and EKMS accounts, is known collectively as the CMCS. The CMCS, as currently established, will continue to function until such time as the Electronic Key Management System (EKMS) is fully implemented. COMSEC material is managed in EKMS/COMSEC accounts throughout the federal government to include departments and civil agencies as well as the civilian sector supporting the federal government. b. INFOSEC (covered later in this training) c. COMPUSEC - Computer Security (COMPUSEC) is the protection of computing systems against threats to confidentiality, integrity, availability, and accountability. It must address the threats to electronic transactions and files. The context of computer security is always changing, due to rapidly changing technology, decentralization, networking, privacy issues, and the potential for fraud and abuse. d. PSP - The objective of the Personnel Security Program (PSP) is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements. e. ATFP - Fleet Weather Center Norfolk 33

State the purpose of the ICD systems: Intelligence Community Directive. The Director of National Intelligence (DNI) established Intelligence Community Directives (ICDs) as the principal means by which the DNI provides guidance, policy, and direction to the Intelligence Community. Fleet Weather Center Norfolk 34

Idenitfy SSO Navy: The Director, Security and Corporate Services (ONI-05) as Special Security Officer for the DON (SSO Navy) has been designated as the Cognizant Security Authority (CSA). As CSA, SSO Navy is responsible for implementing SCI security policy and procedures and performs management and oversight of the Department s SCI security program. Fleet Weather Center Norfolk 35

List the duties and responsibilites of the SSO: Commands in the DON accredited for and authorized to receive, process and store SCI will designate a Special Security Officer (SSO). The SSO is the principal advisor on the SCI security program in the command and is responsible to the commanding officer for the management and administration of the program. SCI security program responsibilities are detailed in reference (d). The SSO will be afforded direct access to the commanding officer to ensure effective management of the command's SCI security program. The SSO will be responsible for the operation of the Sensitive Compartmented Information Facility (SCIF) and the security control and use of the SCIF. All SCI matters shall be referred to the SSO. a. The SSO and a subordinate SSO will be appointed, in writing, and each will be a U.S. citizen and either a commissioned officer or a civilian employee GS-9 or above, and must meet Director, Central Intelligence Directive (DCID) 6/4, "Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI)" (NOTAL)standards. The same grade limitations apply to assistant SSOs. The security manager cannot function as the SSO unless authorized by the Director, ONI or Commander, NETWARCOM (IOD). b. Although the SSO administers the SCI program independent of the security manager, the security manager must account for all clearance and access determinations made on members of the command. There is great need for cooperation and coordination between the SSO and security manager, especially for personnel security matters. For individuals who are SCI eligible, the security manager and the SSO must keep one another advised of any changes in status regarding clearance and access and of information developed that may affect eligibility. The security manager and SSO must also advise each other of changes in SCI and command security program policies and procedures as they may impact on the overall command security posture. Fleet Weather Center Norfolk 36

Idenitfy who can be a CSM: The command security manager may be assigned full-time, part-time or as a collateral duty and must be an officer or a civilian employee, GS-11 or above, with sufficient authority and staff to manage the program for the command. The security manager must be a U.S. citizen and have been the subject of a favorably adjudicated Single Scope Background Investigation (SSBI) completed within five years prior to assignment. The security manager shall be identified by name on command organizational charts, telephone listings, rosters, or other media. Reference (c) recommends that the security manager report to the commanding officer on functional security matters and to the executive officer for administration of the ISP Fleet Weather Center Norfolk 37

State the duties and responsibilites of a CSM: The security manager is responsible for implementing the ISP and shall have direct access to the commanding officer. Some tasks may be assigned to a number of command personnel and may even be assigned to persons senior to the security manager. Nevertheless, the security manager shall remain cognizant of all command information, personnel, and industrial security functions and ensure that the security program is coordinated and inclusive of all requirements in this policy manual. The security manager shall: a. Serve as the principal advisor and representative to the commanding officer in matters pertaining to the classification, safeguarding, transmission, and destruction of classified information. b. Develop a written command security instruction (see exhibit 2A in SECNAV M-5510.36), to include provisions for safeguarding classified information during military operations or emergency situations. c. Ensure that personnel in the command who perform security duties are kept abreast of changes in policies and procedures, and provide assistance in problem solving. d. Formulate, coordinate, and conduct the command security education program. e. Ensure that threats to security and other security violations are reported, recorded, and when necessary investigated. Ensure that incidents described in chapter 12 of SECNAV M-5510.36 are immediately referred to the nearest NCIS office. f. Ensure that all security violations or incidents involving the possible compromise of classified information, to include those involving information technology (IT) systems, are investigated and reported in accordance with chapter 12 of SECNAV M-5510.36. Coordinate after-incident responses involving classified information processed on IT systems with the command Information Assurance Manager (IAM). Fleet Weather Center Norfolk 38

State the duties and responsibilites of a CSM (cont): g. Coordinate the preparation and maintenance of security classification guides under the command's cognizance. h. Maintain liaison with the command Public Affairs Officer (PAO) to ensure that proposed press releases and information intended for public release are subjected to a security review (see chapter 8 of SECNAV M-5510.36). i. Coordinate with other command officials regarding security measures for the classification, safeguarding, transmission and destruction of classified information. j. Develop security measures and procedures regarding visitors who require access to classified information. k. Ensure that classified information is secured and controlled areas are sanitized when a visitor is not authorized access. l. Implement and interpret, as needed, regulations governing the disclosure of classified information to foreign governments. m. Ensure compliance with the requirements of SECNAV M-5510.36 when access to classified information is provided at the command to cleared contractors in connection with a classified contract. n. Ensure that access to classified information is limited to appropriately cleared personnel with a need-to-know per reference (b) of SECNAV M-5510.36. Fleet Weather Center Norfolk 39

Explain and state the purpose of JPAS: The Joint Personnel Adjudication System (JPAS) is a DoD system that uses NIPRNET to connect all DoD security personnel around the world with their Central Adjudication Facility (CAF). The JPAS web site runs on a secured port with secured socket layer (SSL) 128-bit encryption. JPAS is the Department of Defense (DoD) personnel security clearance and access database. It facilitates personnel security program management for the Department of Defense Central Adjudication Facilities, for DoD security managers, and Sensitive Compartment Information (SCI) program managers. JPAS interfaces with the Defense Security Service (DSS) and the Office of Personnel Management (OPM) to populate personnel security investigation data and the personnel systems, Defense Enrollment Eligibility Reporting System (DEERS) and Defense Civilian Personnel Data System (DCPDS), to populate identifying data. JPAS is the system of record for personnel security adjudication, clearance and verification and history. Fleet Weather Center Norfolk 40

Explain and state the purpose of JPAS (cont): JPAS has two applications. The Joint Adjudication Management System (JAMS) and the Joint Clearance and Access Verification System (JCAVS). 1. JAMS is the application which supports central adjudication facilities personnel and provides capabilities and data such as case management/ distribution, adjudication history, due process history, revocations and denial action information, and will have the ability to electronically access personnel security investigative reports from either the DSS or the OPM. JCAVS is the application which supports command security personnel and provides capabilities and data such as local access record capabilities, debriefings, incident file reports and eligibility data, SAP access information and security management reports. 2. Department of the Navy (DON) commands are required to use JCAVS exclusively to record all access determinations which includes temporary access, upgrades, downgrades, and suspensions. Commands must document interim security clearance determinations, execution of Nondisclosure Agreements (SF-189, SF-189A or SF-312), and personal attestations and use JCAVS to submit continuous evaluation reports, pass visit requests, determine security clearance and Sensitive Compartmented Information (SCI) access eligibility, determine status of requested personnel security investigation (PSI), record PSI submission dates and request DON CAF determinations, record all access determinations, JCAVS users will be responsible for changes to an individual s access within the JCAVS. The minimum investigative standards required for access to JCAVS can be found in chapter 3-1. The minimum security clearance eligibility for access to JCAVS can be found in chapter 3-1. Data will be permanently retained within JPAS but it will not always be displayed. Data pertaining to individuals that retire or separate from the DON will be visibly retained for 24 months. However, if no action occurs on the individual record for twenty-four months, the record will be purged from display and archived. General Officer and Senior Executive Service employee data will be visibly retained indefinitely. Fleet Weather Center Norfolk 41

Explain and state the responsibilites of DONCAF: The Department of the Navy Central Adjudication Facility (DONCAF), is a Naval Criminal Investigative Service (NCIS) organization, and is responsible for determining who within the Department of the Navy is eligible to hold a security clearance, to have access to Sensitive Compartmented Information (SCI), or to be assigned to sensitive duties. The aggregate body of DON personnel consists of Active Duty and Reserve components of the United States Navy and Marine Corps, as well as civilians and contractors. In addition, DONCAF makes SCI eligibility determinations for select contractor personnel. Collateral clearance determinations for contractor personnel are established by DISCO (Defense Industrial Service Clearance Office). DONCAF also maintains an extensive database of its security decisions and provides overall operational support to the Navy s personnel security program. Adjudication is the review and consideration of all available information to ensure an individual s loyalty, reliability, and trustworthiness are such that entrusting an individual with national security information or assigning an individual to sensitive duties is clearly in the best interest of national security. Our mission is to provide excellent customer service, accurate and timely adjudication, and implement innovative strategies for the DON Personnel Security Program. Fleet Weather Center Norfolk 42

Discuss how long a CO can administratively suspend access before DONCAF revokes a clearance: SCI access suspension is a temporary measure designed to safeguard sensitive classified information or facilities. Suspension of SCI access will not exceed 90 days without the express consent of the SOIC or designee. Forward follow-up and final reports of investigation to the cognizant SOIC(Senior Official of the Intelligence Community) CAF (Central Adjudication Facility). Fleet Weather Center Norfolk 43

State the levels of INFOCON and what each signifies: The Information Operations Condition (INFOCON) system provides a framework within which the Commander USSTRATCOM (CDRUSSTRATCOM), regional commanders, service chiefs, base/post/camp/station/vessel commanders, or agency directors can increase the measurable readiness of their networks to match operational priorities. The INFOCONs mirror Defense Conditions (DEFCON) defined in CJCSM 3402.1B, (S) Alert System of the Chairman of the Joint Chiefs of Staff (U), and are a uniform system of five progressive readiness conditions - INFOCON 5, INFOCON 4, INFOCON 3, INFOCON 2, and INFOCON 1. (There is no direct correlation between INFOCON and DEFCON levels, though commanders should consider changes in INFOCON when DEFCON changes.) INFOCON 5 is normal readiness and INFOCON 1 is maximum readiness. Each level represents an increasing level of network readiness based on tradeoffs in resource balancing (e.g., downtime versus level of assured confidence regarding malicious activity) that every commander must make. The INFOCONs are supplemented by Tailored Readiness Options (TRO), which are applied in order to respond to specific intrusion characteristics or activities, directed by CDRUSSTRATCOM or commanders. INFOCON procedures focus on proactively establishing and re-establishing a secure baseline based on a periodic, operational rhythm. This cycle varies, based on perceived operational needs, from bringing systems back to a secure baseline every 180 days at INFOCON 5, to restoring that secure baseline every 15 days at INFOCON 1. The definitions of each INFOCON are as follows: INFOCON 5 - Normal Readiness Procedures INFOCON 4 - Increased Military Vigilance Procedures INFOCON 3 - Enhanced Readiness Procedures INFOCON 2 - Greater Readiness Procedures INFOCON 1 - Maximum Readiness Procedures Fleet Weather Center Norfolk 44

Discuss the secuirty rules and procedures for magnetic and electronic media: a. Magnetic Media - For clarification, Magnetic storage media is considered to be any component of a system which, by design, is capable of retaining information without power. The procedures contained below meet the minimum security requirements for the clearing, sanitizing, releasing, and disposal of magnetic media as well as guidance for other types of information storage media. These procedures will be followed when it becomes necessary to release magnetic media, regardless of classification, from Sensitive Compartmented Information (SCI) channels. Media that has ever contained SCI, other intelligence information, or Restricted Data cannot be sanitized by overwriting; such media must be degaussed before release. Review of Terms. To better understand the procedures contained herein, it should be understood that overwriting, clearing, purging, degaussing, and sanitizing are not synonymous with declassification. The following are definitions: 1. Clearing. Clearing is the process of removing information from a system or the media to facilitate continued use and to preclude the AIS system from recovering previously stored data. In general, laboratory techniques allow the retrieval of information that has been cleared, but normal operations do not allow such retrieval. Clearing can be accomplished by overwriting or degaussing. 2. Sanitizing (Also Purging). Sanitizing is the process of removing information from the media or equipment such that data recovery using any known technique or analysis is prevented. Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs. In general, laboratory techniques cannot retrieve data that has been sanitized/purged. Sanitizing may be accomplished by degaussing. 3. Destruction. Destruction is the process of physically damaging media so that it is not usable and there is no known method of retrieving the data. 4. Declassification. Declassification is an administrative process used to determine whether media no longer requires protection as classified information. The procedures for declassifying media require Designated Approving Authority (DAA) Representative (Rep) or Service Certifying Organization (SCO) approval. Fleet Weather Center Norfolk 45

Discuss the secuirty rules and procedures for magnetic and electronic media (cont): b. Electronic Media - A portable electronic device is a generic term used to describe the myriad of small electronic items that are widely available. The rapid growth in technological capabilities of portable electronic devices/portable computing devices (PEDs/PCDs) has led to concerns about their portability into and out of Sensitive Compartmented Information Facilities (SCIFs). PEDs include cellular telephones, two way pagers, palm sized computing devices, two-way radios, audio/video/data recording, playback features, personal digital assistants, palm tops, laptops, notebooks, data diaries, and watches with communications software and synchronization hardware, that may be used to telecommunicate. These devices must be closely monitored to ensure effective control and protection of all information on our IS. The use of PEDs in a SCI environment presents a high degree of risk for the compromise of classified or sensitive information. PEDs will only be used to fulfill mission requirements. Additionally, very specific handling procedures must be developed and made available to the user of the PED. The Agency in charge of any given SCIF is the authority for the procedures to move PEDs in or out of their facilities. Specific requirements/procedures are: All of the following requirements must be satisfied prior to approving the use of portable electronic devices: 1. Personal PEDs Personal PEDs, hardware/software associated with them, and media are prohibited from entering/exiting a SCIF unless authorized by the Agency granting SCIF accreditation. Personal PEDs are prohibited from operating within a SCIF unless authorized by the agency granting SCIF accreditation. If approved, the owner of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. Connection of a Personal PED to any IS within a SCIF is prohibited. PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. Fleet Weather Center Norfolk 46

Discuss the secuirty rules and procedures for magnetic and electronic media (cont): 2. Government Owned PEDs Government PEDs, hardware/software associated with them, and media must be controlled when entering/exiting a SCIF. Government PEDs are prohibited from operating within a SCIF unless authorized and accredited by the agency granting the SCIF accreditation. As part of the accreditation requirements, the user of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. Connection of a Government PED to any IS within a SCIF must be approved by the ISSM in writing. PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. Specified PEDs (i.e. Laptop Computers) may be used to process classified information. In addition, these PEDs may be granted approval to connect to ISs on a case-by-case basis in writing by the ISSM. Specified PEDs approved to process classified information must meet minimum technical security requirements. If approved, the PED and associated media must be transported and stored in a manner that affords security sufficient to preclude compromise of information, sabotage, theft, or tampering. Procedures for handling the PED in a SCIF must be available and provided to the user. Fleet Weather Center Norfolk 47

Explain why the U.S. Navy only uses.mil email addresses on government systems: In the Domain Name System (DNS) naming of computers, there is a hierarchy of names. There is a set of top-level domain names (TLDs). These are the generic TLDs and the two letter country codes from International Organization for Standardization (ISO) Standard Number 3166 (Reference (e) of DoD Instruction 8410.01). The Internet Assigned Numbers Authority (IANA) provides a list of the generic TLDs that presently includes twenty domains and descriptions. A hierarchy of names usually exists under each TLD. For example,.mil is a TLD,.OSD.MIL is a Second Level Domain (SLD) and TRICARE.OSD.MIL is a Third Level Domain (not usually referred to with an acronym). Each of the generic TLDs was created for a general category of organizations. The country code domains (e.g., FR, NL, KR, US) are each organized by an administrator for that country. All generic TLDs are international in nature, with the exception of two (.MIL and.gov) that are restricted to use by entities in the United States. Descriptions for each follow: a.).gov Agencies of the U.S. Federal government have exclusive use of this domain. State and local agencies use the.us country domain. (See paragraph 4.h. of DoD Instruction 8410.01) DoD Components do not generally qualify for use of this domain. b.).mil The U.S. Department of Defense has exclusive use of this domain. Fleet Weather Center Norfolk 48

QUESTIONS? Fleet Weather Center Norfolk 49