Unauthorized Disclosure Training

Slides:



Advertisements
Similar presentations
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Advertisements

NATIONAL FRAUD AWARENESS CONFERENCE JULY 26-29, 2010 HEATHER ALBERT & THOMAS SHIPLEY DOT/OIG ARRA Whistleblower Jurisdiction A Brave New World.
Industrial Security 2010 Worldwide Security Conference.
Military Whistleblower Protection Act Training for All Hands March 2000.
The Department of Defense Intelligence Oversight Program
NC1 WETZEL. Purpose  To revise policy and provide guidance for the establishment of a sexual assault prevention/victim assistance program within the.
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
Investigation and Enforcement of competition law.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Page 1 Keep Your Company Out of the Media Workshop Rachel Verdugo March 23, 2011 Reno, Nevada Protect and Control Your Data.
HIPAA PRIVACY AND SECURITY AWARENESS.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
FERPA: What you Need to Know The Family Educational Rights and Privacy Act & SEI.
George W. Bush Foreign Policy War on Terror. 9/11 September 11, al-Qaeda terrorists. Four passenger airliners. Two succesful suicide attacks.
CHAPTER LOCAL FACILITIES FOR DETENTION County to maintain county jail; location; agreements for detention of prisoners Duties of.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
Military Whistleblower Protection Act Training for Supervisors March 2000.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
The Department of Defense Intelligence Oversight Program
Privacy Act United States Army (Managerial Training)
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Monetary Policy LETS FINISH THIS UP!. Monetary Policy :  Domain of the Federal Reserve  Known as the Fed  Regulate the amount of money in circulation.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Safeguarding CDI - compliance with DFARS
Rule By Desks—Bureaucracy
the POLICE – EXECUTIVE RELATIONSHIP IN TANZANIA: A FRAMEWORK
Element 51- Post Government Service Employment Restriction Counseling
Team 1 – Incident Response
Intellectual Property
The Criminal Justice System
Criminal Law ESSENTIAL QUESTIONS Why does conflict develop? How can governments ensure citizens are treated fairly?
Wyoming Statutes §§ through
TYPES OF COMPLAINTS Informal Formal Viewgraph #27-1.
POST GOVERNMENT SERVICE EMPLOYMENT RESTRICTIONS
Iowa Cancer Summit September 21, 2010
“Domestic policy can only defeat us. Foreign policy can kill us.”
Safeguarding Covered Defense Information
Unauthorized Disclosure TRAINING FOR Security Professionals
Derivative Classification Overview
Export Controls – Export Provisions in Research Agreements
Instructions To launch the Magic 8-Ball game, select “Slide Show” from the command menu and click on “From Beginning”.
Post Government Service Employment Restriction Counseling (18 U. S. C
POST GOVERNMENT SERVICE EMPLOYMENT RESTRICTIONS
Key terms and procedures involved in criminal cases
POST GOVERNMENT SERVICE EMPLOYMENT RESTRICTION COUNSELING
Post Government (Military) Service Employment Restriction Counseling
Personnel Clearance Debriefing
Rutgers Export Compliance Officer
Functions and Purposes of Government
Connections Abuse Prevention Plan 2018.
HIPAA Policy & Procedure Strategies
Intelligence Oversight U.S. Army Inspector General School 1
Key terms and procedures involved in criminal cases
Functions and Purposes of Government
Government Notes The Judicial Branch.
Virginia Sheriffs’ Institute New Sheriff Orientation
STATUTORY BASIS CONSTITUTIONAL BASIS
STATUTORY BASIS Title 10, United States Code, Section 1034
Export Controls – Export Provisions in Research Agreements
Government and Public Administration
Rule By Desks—Bureaucracy
TALKING POINTS Introduce yourself
Annual Training for Supervisors
Presentation transcript:

Unauthorized Disclosure Training These slides have been provided by the DoD UD PMO for use in command or component level Unauthorized Disclosure Awareness Briefings. Feel free to customize the briefing with your command’s name and logo. Slide 12 provides an opportunity to input customized reporting SOP and POC. Consider supplementing this briefing with job aids, case studies, and other awareness materials available under Unauthorized Disclosure Toolkit at https://www.cdse.edu/toolkits/unauthorized/index.php   For questions on content or any other matters related to DoD Unauthorized Disclosure, please reach out to the DoD UD Program Management Office at dss.quantico.dss-hq.mbx.ditmac-unauthorized-disclosure@mail.mil. Unauthorized Disclosure Training DoD Component Name

The Problem Trusted individuals inside the DoD are leaking classified and controlled unclassified information (CUI) to unauthorized recipients.

What is an Unauthorized Disclosure? The communication or physical transfer of classified or CUI to an unauthorized recipient. Other related definitions: Compromise – A security incident in which there is an UD of classified information Data Spill – Transfer of classified or CUI to a computer system accredited at a lower classification level than the data being entered

Whistleblowing vs. ud Whistleblowers are protected by law, executive order, and DoD policy Whistleblowers can make a protected disclosure to: A member of Congress An Inspector General A member of a DoD audit, inspection, or law enforcement organization Any person in the chain of command A court-martial proceeding Any other person designated pursuant to regulations or other established administrative procedures to receive such communications

Why do people leak information? Individuals who leak information do so for a number of reasons, including: Financial gain Influence political decisions Disagree with official government policy Believe the public has a need to know Ego

Case examples

Benjamin Bishop SENTENCED TO 87 MONTHS Government Contractor and Retired Army O-5 Arrested March 2013 Emailed classified information to a Chinese woman with whom he had a romantic relationship Pled guilty March 13, 2014 for unlawfully retaining classified national defense information at his home and willfully communicating classified national defense information to a person not authorized to receive it Sentenced to 87 months of imprisonment and 3 years of supervised release SENTENCED TO 87 MONTHS

FORFEITURE OF $6.8 MILLION Matt Bissonnette Former Navy SEAL Wrote “No Easy Day,” an account of the raid that killed Osama bin Laden which was published in 2012 Failed to submit the manuscript to the Defense Office of Prepublication and Security Review (DOPSR) for review, resulting in the publication of classified and sensitive unclassified information Agreed to forfeit $6.8 million in book royalties and speaking fees as part of a non-prosecution agreement FORFEITURE OF $6.8 MILLION

Bryan Martin SENTENCED TO 48 YEARS Navy E-4 Arrested December 2010 Attempted to deliver classified information to a representative of a foreign government Sentenced to 48 years in prison, forfeiture of all pay and allowance, reduction to pay grade of E-1, and a dishonorable discharge SENTENCED TO 48 YEARS

Gary Maziarz SENTENCED TO 26 MONTHS Marine Corps E-7 He and four co-conspirators were arrested in October 2006 for leaking classified information to the Los Angeles Terrorism Early Warning Group Pled guilty and received a 26 month jail sentence SENTENCED TO 26 MONTHS

Reporting unauthorized disclosures If you suspect an unauthorized disclosure has occurred REPORT IT TO SECURITY If you suspect an unauthorized disclosure has occurred REPORT IT TO SECURITY If you are a DoD employee ………………… report to your Security Manager Cleared contractor …………. report to your Facility Security Officer

Component Resources Component policy governing UDs: Policy/regulations Component UD program manager(s): Name(s) Office Contact information

Questions?