Procedural Guidance for Conducting DoD Classified Conferences

Similar documents
DDESB Seminar Explosives Safety Training

The Fully-Burdened Cost of Waste in Contingency Operations

Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft

ASAP-X, Automated Safety Assessment Protocol - Explosives. Mark Peterson Department of Defense Explosives Safety Board

Opportunities to Streamline DOD s Milestone Review Process

Planning Terrorism Counteraction ANTITERRORISM

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

Improving the Quality of Patient Care Utilizing Tracer Methodology

White Space and Other Emerging Issues. Conservation Conference 23 August 2004 Savannah, Georgia

Report No. D June 17, Long-term Travel Related to the Defense Comptrollership Program

MILITARY MUNITIONS RULE (MR) and DoD EXPLOSIVES SAFETY BOARD (DDESB)

Unexploded Ordnance Safety on Ranges a Draft DoD Instruction

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan

World-Wide Satellite Systems Program

Balancing Requirements

Report No. D May 14, Selected Controls for Information Assurance at the Defense Threat Reduction Agency

Incomplete Contract Files for Southwest Asia Task Orders on the Warfighter Field Operations Customer Support Contract

Office of the Assistant Secretary of Defense (Homeland Defense and Americas Security Affairs)

Shadow 200 TUAV Schoolhouse Training

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

Biometrics in US Army Accessions Command

Social Science Research on Sensitive Topics and the Exemptions. Caroline Miner

ALLEGED MISCONDUCT: GENERAL T. MICHAEL MOSELEY FORMER CHIEF OF STAFF, U.S. AIR FORCE

THE GUARDIA CIVIL AND ETA

terns Planning and E ik DeBolt ~nts Softwar~ RS) DMSMS Plan Buildt! August 2011 SYSPARS

Munitions Response Site Prioritization Protocol (MRSPP) Online Training Overview. Environmental, Energy, and Sustainability Symposium Wednesday, 6 May

Wildland Fire Assistance

Report No. D February 9, Internal Controls Over the United States Marine Corps Military Equipment Baseline Valuation Effort

MK 83 WARHEAD EFFECTIVENESS TESTS

U.S. ARMY EXPLOSIVES SAFETY TEST MANAGEMENT PROGRAM

The Coalition Warfare Program (CWP) OUSD(AT&L)/International Cooperation

Report Documentation Page

Mission Assurance Analysis Protocol (MAAP)

DoD Scientific & Technical Information Program (STIP) 18 November Shari Pitts

The Security Plan: Effectively Teaching How To Write One

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

Panel 12 - Issues In Outsourcing Reuben S. Pitts III, NSWCDL

Report No. D September 22, Kuwait Contractors Working in Sensitive Positions Without Security Clearances or CACs

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

United States Army Aviation Technology Center of Excellence (ATCoE) NASA/Army Systems and Software Engineering Forum

Electronic Attack/GPS EA Process

Quantifying Munitions Constituents Loading Rates at Operational Ranges

Report No. DODIG Department of Defense AUGUST 26, 2013

Integrated Comprehensive Planning for Range Sustainability

Development of a Hover Test Bed at the National Hover Test Facility

REPORT DOCUMENTATION PAGE 1. AGENCY USE ONLY 2. REPORT DATE 3. REPORT TYPE & DATE (leave blank)

Defense Health Care Issues and Data

Acquisition. Air Force Procurement of 60K Tunner Cargo Loader Contractor Logistics Support (D ) March 3, 2006

US Coast Guard Corrosion Program Office

COMPLIANCE WITH THIS PUBLICATION IS MANADATORY

Battle Captain Revisited. Contemporary Issues Paper Submitted by Captain T. E. Mahar to Major S. D. Griffin, CG 11 December 2005

DoD IG Report to Congress on Section 357 of the National Defense Authorization Act for Fiscal Year 2008

Lessons Learned From Product Manager (PM) Infantry Combat Vehicle (ICV) Using Soldier Evaluation in the Design Phase

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Subj: CHIEF OF NAVAL AIR TRAINING ANTITERRORISM PLAN

Information Technology

Laboratory Accreditation Bureau (L-A-B)

Cerberus Partnership with Industry. Distribution authorized to Public Release

Department of Defense DIRECTIVE

Required PME for Promotion to Captain in the Infantry EWS Contemporary Issue Paper Submitted by Captain MC Danner to Major CJ Bronzi, CG 12 19

Overview of Physical Security and Protective Measures

Report No. D-2011-RAM-004 November 29, American Recovery and Reinvestment Act Projects--Georgia Army National Guard

Streamlining U.S. Army Military Installation Map (MIM) Production

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance

Report No. DODIG December 5, TRICARE Managed Care Support Contractor Program Integrity Units Met Contract Requirements

Report No. D July 25, Guam Medical Plans Do Not Ensure Active Duty Family Members Will Have Adequate Access To Dental Care

Fiscal Year 2011 Department of Homeland Security Assistance to States and Localities

NORMALIZATION OF EXPLOSIVES SAFETY REGULATIONS BETWEEN U.S. NAVY AND AUSTRALIAN DEFENCE FORCE

Tannis Danley, Calibre Systems. 10 May Technology Transition Supporting DoD Readiness, Sustainability, and the Warfighter. DoD Executive Agent

NORAD CONUS Fighter Basing

DOING BUSINESS WITH THE OFFICE OF NAVAL RESEARCH. Ms. Vera M. Carroll Acquisition Branch Head ONR BD 251

Contemporary Issues Paper EWS Submitted by K. D. Stevenson to

Chief of Staff, United States Army, before the House Committee on Armed Services, Subcommittee on Readiness, 113th Cong., 2nd sess., April 10, 2014.

Army Environmental Liability Recognition, Valuation, and Reporting June 2010

From: Commanding Officer/Leader, United States Navy Band

Research to advance the Development of River Information Services (RIS) Technologies

Military Health System Conference. Putting it All Together: The DoD/VA Integrated Mental Health Strategy (IMHS)

Representability of METT-TC Factors in JC3IEDM

Veterans Affairs: Gray Area Retirees Issues and Related Legislation

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A

The first EHCC to be deployed to Afghanistan in support

August Initial Security Briefing Job Aid

Operational Energy: ENERGY FOR THE WARFIGHTER

Internal Controls Over the Department of the Navy Cash and Other Monetary Assets Held in the Continental United States

CRS prepared this memorandum for distribution to more than one congressional office.

DETENTION OPERATIONS IN A COUNTERINSURGENCY

Department of Defense INSTRUCTION

Award and Administration of Multiple Award Contracts for Services at U.S. Army Medical Research Acquisition Activity Need Improvement

Mission Task Analysis for the NATO Defence Requirements Review

A Scalable, Collaborative, Interactive Light-field Display System

The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of

Report Documentation Page

Army Aviation and Missile Command (AMCOM) Corrosion Program Update. Steven F. Carr Corrosion Program Manager

Financial Management

Report No. D February 22, Internal Controls over FY 2007 Army Adjusting Journal Vouchers

New Tactics for a New Enemy By John C. Decker

Report No. D July 30, Status of the Defense Emergency Response Fund in Support of the Global War on Terror

Product Manager Force Sustainment Systems

In 2007, the United States Army Reserve completed its

Transcription:

Procedural Guidance for Conducting DoD Classified Conferences Prepared By July 2008 Security professionals may find this guidance useful when they are involved in hosting/coordinating DoD classified conferences. The security procedures in this guide are not intended to be all encompassing nor are they meant to act as firm instruction/policy. 1

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 15 JUL 2008 2. REPORT TYPE 3. DATES COVERED 00-00-2008 to 00-00-2008 4. TITLE AND SUBTITLE Procedural Guidance for Conducting DoD Classified Conference 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Security Service Academy,Linthicum,MD 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 11. SPONSOR/MONITOR S REPORT NUMBER(S) 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT a. REPORT unclassified b. ABSTRACT unclassified c. THIS PAGE unclassified Same as Report (SAR) 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Table of Contents Page Purpose..................................................... 3 References.................................................. 3 Definitions................................................... 3 Requirements................................................ 4 Procedures.................................................. 5 APPENDICES A - 1 Vulnerability Assessment Template.................... 6 A - 2 Conference Security Plan Template.................... 8 A - 3 Classified Conference Checklist....................... 10 2

Purpose This guide outlines procedures for preparing, processing, providing security, and approving requests for DoD-sponsored classified conferences as defined below. References DoD 5200.1-R, Information Security Program (January 1997) DoD 5220.22-M, National Industrial Security Program Operating Manual (February 2006) DoD Directive 2000.12, DoD Antiterrorism (AT) Program (18 August 2003) DoD Instruction 2000.16, DoD Antiterrorism Standards (2 October 2006 w/change 2 of 8 December 2006) DoD Directive 5230.20, Visits and Assignments of Foreign Nationals (22 June 2005) DoD Directive 5230.11, Disclosure of Classified Military Information to Foreign Governments and International Organizations (16 June 1992) USDI(I) Memorandum dated April 16, 2004, Subject: Interim Information Security Guidance USDI(I) Memorandum dated April 1, 2005, Subject: Facilitating Classified Visits Within the Department of Defense Definitions Conference: A conference for purposes of this guide is an official exhibit, convention, symposium, retreat, meeting, seminar, workshop, assembly, training activity, or other such gatherings during which classified information is disseminated. Conference Proponent: The organization or activity sponsoring the conference. Threat Assessment: A resultant product of the defined process used to conduct a threat analysis and develop an evaluation of a potential threat. Also, it is the product of a threat analysis for a particular unit, installation, or activity. Vulnerability Assessment: The comprehensive evaluation of an installation, facility, or activity to determine preparedness to deter, withstand, and/or recover from the full range of adversarial capabilities based on the threat assessment, compliance with protection standards, and risk management. 3

Requirements Classified conferences can only be conducted in approved locations, such as U.S. military or government facilities and cleared contractor facilities. Refer to component specific guidelines for requirements. The conference proponent should ensure security measures are integrated early in the planning process. It is recommended that the security of participants and protection of classified information be a consideration in the selection of an event location. Access to the classified conferences, or specific sessions should be limited to persons who possess an appropriate security clearance and need-to-know. The person releasing the information must be satisfied that a cleared recipient has a need-to-know. All attendees must have their clearance/access level verified before entering the conference. Proof may be: o o Confirm the attendee s access in the Joint Personnel Adjudication System (JPAS); or Accept a properly completed Visit Request from the attendee s security manager or facility security officer. Conference proponents should provide security personnel to assist in planning and implementing security measures and contingency plans for emergencies, including threats. The selection decision for a conference facility should consider the facility s security arrangements and ability to augment security with professional security personnel. It is suggested that the conference proponent coordinate security requirements, vehicle control, parking, points of ingress/egress, identification requirements, and any other pertinent security issues. This may require a pre-conference site survey. Procedures should ensure that classified documents, recordings, audiovisual material, notes, and other materials created, distributed, or used during the conference are controlled, safeguarded, and transported in accordance with Conference Security Plan. The conference proponent is responsible for providing access control to the conference area through visual recognition or identification. If appropriate, the conference proponent may request the conference facility to provide supplemental security personnel (e.g., military security forces, contractor guard force). Announcement of the classified conference should be unclassified and limited to a general description of topics expected to be presented, names of speakers, logistical information, and administrative and security instructions. 4

Conduct end of day security checks to ensure no unsecured classified material remains in the conference area. All classified materials will be stored in a GSA approved security container. The attendance of foreign nationals must comply with the requirements of DoD Directive 5230.20 and DoD Directive 5230.11. Written concurrence must be obtained from the responsible U.S. Government foreign disclosure office(s) that the information to be presented has been cleared for foreign disclosure. Coordination efforts should be given 120 days lead time prior to the conference date to ensure completion. Procedures The approval process for conducting classified conferences may vary. Conference proponents should be aware that a proposed conference location may be denied due to an unfavorable threat assessment. Refer to Component-specific guidelines. It is recommended that the conference proponent s security lead ensure the following are accomplished: o Security Liaison - Contact the host security officer to obtain information regarding local Force Protection Conditions. o Threat Assessment - After the proposed conference facility has been selected, a threat assessment should be prepared to ensure proper protection of personnel and other assets. o Vulnerability Assessment After the selected conference facility has been approved, coordination should be made to conduct and document a vulnerability assessment in the format provided in Appendix A-1. A vulnerability assessment is not necessary for conferences held at sites on military installations or where the Force Protection Condition is ALPHA or below, unless the threat assessment identifies immediate known threats in the vicinity. The host security officer should be contacted for assistance in completing the vulnerability assessment. Potential threats based on the event mission, location, and the security environment must be evaluated to determine the appropriate level of required security. The assessment should be coordinated with the conference facility and local authorities. o Conference Security Plan A Conference Security Plan is recommended for large events. A sample format is provided in Appendix A-2. The host security officer should be contacted to aid in providing technical expertise in plan development. o Lessons Learned Lessons learned should be documented for inclusion into future security plans. 5

APPENDIX A-1 Vulnerability Assessment Template Event Overview Includes: Name of conference security officer Date, name and location of event Date of assessment Brief summary of assessment Event overview (unclassified) Chronological outline of scheduled activities Brief description of venues and pertinent dates Estimated Number of attendees Threat Information Describe: Known threats to the facility or event to include planned demonstrations Site information (outside) o o o Location and normal use of venue site Structure and surrounding area Location and capacity for parking and entrances/exits, noting vulnerabilities and strengths Site Information (inside) o Normal and emergency power and water sources to include fire suppression systems Normal power HVAC system Emergency power Underground utility passages Water source Obvious deterrents to terrorist or criminal activity (video camera coverage, fencing, etc.) Alarms, magnetometers, or X-ray systems in use (type, design, sensitivity). Discuss qualifications of personnel operating systems Number and type of security force, (armed/unarmed) to include off-duty police officers and their designated authority 6

Vulnerability issues in close proximity to the venue site (active train stations, major roadways, etc.) Requirement for employee background checks if applicable Positive or negative media coverage/publicity about the event On-going military events that might directly affect the conference On-going civilian events that might directly affect the conference VIPs expected to attend the conference Access control systems to be used to identify conference attendees, support personnel, or security and safety personnel (identification tags, ID cards, visual recognition) Emergency Response Capabilities: Does the venue have an emergency response plan (fire, bomb threat, weather, hostage, power failure, etc.)? Response time of local police Response time of local ambulance/paramedics Response time of local fire department Hostage rescue team Explosive Ordnance Disposal (EOD) Additional Input Travel time for high risk personnel (HRP) to return to home of record Travel time to local hospital with emergency medical treatment capabilities Distance to closest military hospital Conclusion: Recommended enhancements to security procedures based on assessment (list recommendations) 7

APPENDIX A-2 Conference Security Plan Template Situation Threat Assessment Security Graphic Vulnerability Assessment Venue Graphic Sequence of Events Maps Attendees Mission Execution Concept of operations: Three tier security involving close-in, middle, and outer perimeter security support Personal Security: Responsible for security of principles to include movement during emergency response procedures Access Control: Responsible for checking access badges and escorting attendees to proper locations during emergency response procedures Roving patrols Explosive detector dogs Technical countermeasures Venue Security Main conference room o Access control o Roving patrols o Explosive detector dog sweep Technical countermeasures Video teleconference (if applicable) Breakout rooms (If applicable) o Access control o Roving patrols o Explosive detector dog sweep Technical countermeasures Video teleconference (if applicable) 8

Administration Room (if applicable) o Access control o Roving patrols o Explosive detector dog sweep Technical countermeasures Video teleconference (if applicable) Billeting o Access control o Roving patrols o Explosive detector dog sweep Technical countermeasures Video teleconference (if applicable) Parking o Access control o Roving patrols o Explosive detector dog sweep Technical countermeasures Video teleconference (if applicable) High Risk Personnel (HRP) Recommend all HRPs bring protective service Security Operations Center o Venue Room Phone Manning Fax Response Force Operations Coordinating Instructions Administration and logistics Command and Signal o Security Officer (name): o Emergency response/contacts Onsite security Explosive ordnance Venue operations center disposal (EOD) Local police Civilian hospital Fire Military hospital Ambulance Helipad Hostage rescue team 9

APPENDIX A-3 Classified Conference Checklist INITIAL PREPARATION Determine subject of conference and highest level of classification. Determine if entire meeting will be classified or limited to classified sessions. Determine transmission requirements for classified material to be used at the conference. Determine where the classified material will be stored before, during, and after the meeting. If possible, select a meeting location that provides good physical control, has storage containers, and provides protection from unauthorized audio and visual access. Identify potential attendees. Identify foreign attendees or representatives, if any. NOTE: Get approval for and document release of any information (unclassified and classified) from the Foreign Disclosure Policy Officer. Any U.S. citizen representing a foreign interest is a foreign representative. Announce the meeting on a need-to-know basis (mail, phone, etc.). Verify security clearances and establish need-to-know. Establish methods to identify attendees for entry/exit. Identify any special communication requirements e.g., STE, STU-III, SIPRNET, secure telecommunications, etc. INSPECT AREA PRIOR TO CONFERENCE If not familiar with area, request presence of building manager. Check walls, ceilings, and floors for suspicious objects, e.g., holes, openings, exposed wires, recording devices, etc. Ensure all doors, windows, and other openings are closed before classified briefing begins. First floor windows should be covered to prevent visual access. Check all physically accessible areas. 10

If possible, check, touch and lift the following items/areas for things out of the ordinary, e.g., recording devices, suspicious packages, etc.: Trash containers Fire extinguishers Tables, desks, and chairs Curtains, pictures, or like accessible items on walls and windows Circuit breaker boxes; use safety precautions Familiarize yourself with emergency exits. Technical Surveillance Counter-Measures (TSCM) as required. Maintain physical control after inspection of space. DURING THE CONFERENCE Announce the highest classification level to be discussed during the course of the conference and any other special security considerations. Prevent unauthorized entry by posting personnel outside the conference area to control access. (Consider random checks of any other exterior doors.) Identify all attendees upon reentry from breaks, etc. Verify identification of attendees with approved conference attendance roster. Consider random checks of briefcases for unusual or suspicious items, if allowed beyond entry control point. Ensure telephones, radios, tape recorders, or devices that can transmit or record are not allowed within rooms/areas during such meetings(s). (Examples of equipment normally permitted include electronic calculators, electronic spell checkers, wristwatches, data diaries and "receive only" beepers or pagers.) Discourage note taking. If notes are allowed, ensure there is a procedure for collection and dissemination. Ensure the highest level of each classified session is appropriately identified to the attendees at the start of each session. Remind each attendee that the classified portion of the briefing should not be discussed freely once the meeting is finished and their responsibility to protect classified information. 11

Safeguard classified material through the use of required classification markings, labels, cover sheets, etc. Ensure equipment used to process or project classified information is approved for classified use. Protect classified material and facility during any breaks to include the end of each conference day as appropriate. Follow established procedures for protection and storage of classified material at all times. Notify security authorities of all violations. AFTER THE CONFERENCE Check area for unsecured classified material. Notify security authorities of all violations. Conduct after action review to include lessons learned. 12