Unauthorized Disclosure TRAINING FOR Security Professionals

Slides:



Advertisements
Similar presentations
C H A P T E R 15 Government at Work: The Bureaucracy
Advertisements

Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Special Category Cases. Special Categories  Military Whistleblower Reprisal  Senior Officials  Civilian Reprisal  Equal Opportunity  Equal Employment.
Special Category Cases. Special Categories  Military Whistleblower Reprisal  Senior Officials  Civilian Reprisal  Equal Opportunity  Equal Employment.
Department of the Navy Information Security Program
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
IS 700.a NIMS An Introduction. The NIMS Mandate HSPD-5 requires all Federal departments and agencies to: Adopt and use NIMS in incident management programs.
Walking Through the Breach Notification Process - Beginning to End HIPAA COW Presentation and Panel April 8, 2011.
The Department of Defense Intelligence Oversight Program
POLICY Defining DoD GHE  Coordination and adjudication process: Report on the results from a SACCP tasker review and coordination of DoD GHE definition.
Joint Personnel Adjudication System (JPAS) Overview
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Army Family Advocacy Program 1 of R APR 06 Restricted Reporting Policy for Incidents of Domestic Abuse.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Security Education and Awareness Security 101 February 28, 2007 JSAC.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
United States Army Freedom of Information Act (Freedom of Information Act Managerial Training)
Maureen B. Higgins Assistant Director, Agency Support & Technical Assistance Office of Personnel Management December 8, 2010.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
HIPAA PRIVACY AND SECURITY AWARENESS.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
Using NIMA Limited Distribution Data & Products Many of NIMA’s data and products are Unclassified Limited Distribution (LIMDIS). These materials are used.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Theme: classification & distribution of government control of FEA.
Recordkeeping for Councillors
F.E.R.P.A. Family Educational Rights and Privacy Act Cindy Johnson–Taylor, Ph.D. Mary Martin, Ed.D. Mark Mitchell, Ed.D. Linda Winter, Ph.D. Winthrop University.
Department of the Navy Information Security Program
Excellence in Executive Leadership UNCLASSIFIED – For Official Use Only (FOUO) APEX 29 Executive Roundtable Discussion SES Tiering within the Department.
DEFENSE SECURITY SERVICE DSS Role in International Security.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
UMBC POLICY ON ESH MANAGEMENT & ENFORCEMENT UMBC Policy #VI
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Creating an Insider Threat Program.
Unclassified/FOUO Intelligence Community Directive (ICD) 119 Media Contacts Training.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Privacy Act United States Army (Managerial Training)
Managing a “Data Spill”
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Small Business Programs Tatia Evelyn-Bellamy Director Small Business Division Small Business Center February 2016.
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
Information Management and the Departing Employee.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
The Common Assessment Framework (CAF) & Lead Professional (LP)
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Performance Management – Part 3 BCUHB Capability Procedure (WP3A) 69.
Criminal Justice Process: The Investigation
Module: Powers, Policies & Procedures
Managing a Security Container
Wyoming Statutes §§ through
Unauthorized Disclosure Training
Derivative Classification Overview
Yellow Ribbon Reintegration Program
Initial Security Indoctrination
HIPAA Pros - Disclosures
RECORDS AND INFORMATION
Federal Protective Service
AN OVERVIEW OF THE INDUSTRIAL SECURITY PROGRAM
IS-700.A: National Incident Management System, An Introduction
Annual Security Briefing
Government Data Practices & Open Meeting Law Overview
DOD Skillbridge Element 12 p. 132.
Government Data Practices & Open Meeting Law Overview
STATUTORY BASIS Title 10, United States Code, Section 1034
Bureaucracy A large, complex administrative structure that handles everyday business of an organization The Federal Government is the largest of these.
Presentation transcript:

Unauthorized Disclosure TRAINING FOR Security Professionals These slides have been provided by the DoD UD PMO for use in Unauthorized Disclosure briefings for Security Professionals within your component or command. Feel free to customize the briefing with your command’s name and logo. Slides 13 and 20 provide an opportunity to input customized reporting criteria, procedures, and Command level reporting POC. Consider supplementing this briefing with job aids, case studies, and other awareness materials available under Unauthorized Disclosure Toolkit at https://www.cdse.edu/toolkits/unauthorized/index.php   For questions on content or any other matters related to DoD Unauthorized Disclosure, please reach out to the DoD UD Program Management Office at dss.quantico.dss-hq.mbx.ditmac-unauthorized-disclosure@mail.mil. Unauthorized Disclosure TRAINING FOR Security Professionals DoD Component Name

The Problem Trusted individuals inside the DoD are leaking classified and controlled unclassified information (CUI) to unauthorized recipients.

What is an Unauthorized Disclosure? An Unauthorized Disclosure, or UD, is the communication or physical transfer of classified or CUI to an unauthorized recipient. Other related definitions: Compromise – A security incident in which there is an UD of classified information Data Spill – Transfer of classified or CUI to a computer system accredited at a lower classification level than the data being entered

Why do people leak information? Individuals who leak information do so for a number of reasons, including: Financial gain Influence political decisions Disagree with official government policy Believe the public has a need to know Disregard for security procedures Ego

Unauthorized Disclosure case examples

Benjamin Bishop SENTENCED TO 87 MONTHS Government Contractor and Retired Army O-5 Arrested March 2013 Emailed classified information to a Chinese woman with whom he had a romantic relationship Pled guilty March 13, 2014 for unlawfully retaining classified national defense information at his home and willfully communicating classified national defense information to a person not authorized to receive it Sentenced to 87 months of imprisonment and 3 years of supervised release SENTENCED TO 87 MONTHS

Bryan Martin SENTENCED TO 48 YEARS Navy E-4 Arrested December 2010 Attempted to deliver classified information to a representative of a foreign government Sentenced to 48 years in prison, forfeiture of all pay and allowance, reduction to pay grade of E-1, and a dishonorable discharge SENTENCED TO 48 YEARS

DoD’s Unauthorized Disclosure Program 2012 2018 DoD established a “top down” approach to the identification, investigation, and reporting of UDs Policy governing the UD of classified information was outlined in Information Security policy under DoDM 5200.01 Volume 3 UD Program Management Office (PMO) was established within the Office of the Under Secretary of Defense for Intelligence (OUSD(I)) Components were directed to identify security officials responsible for reporting UDs to UD PMO DoD determined the UD mission and policy should be moved from Information Security to Insider Threat UD PMO realigned from OUSD(I) to the Defense Security Service (DSS) where it now resides inside the DoD Insider Threat Management and Analysis Office (DITMAC) US specific policy within DoDM 5200.01 Volume 3will be written into Insider Threat policy documents, DoDD 5205.16 and DoDI 5205.83

Where to report an unauthorized disclosure All suspected or confirmed compromises of classified or controlled unclassified information can be reported to: Security Manager or Facility Security Officer DoD Inspector General Hotline Office of Special Council Security Managers will report disclosures to the Component UD program manager in accordance with Component policy.

Special Reporting Circumstances TYPE OF DISCLOSURE REPORT TO Disclosures of Special Access Program (SAP) material Component SAP program office reports to DoD SAP Central Office Disclosures of alternative compensatory control measures (ACCM) information Local ACCM control officer Disclosures of critical protection information (CPI) Program Manager of record and cognizant Defense Counterintelligence (CI) component Disclosures of foreign government information (FGI) or NATO information DoD Component senior agency official reports to the USD(P) Disclosures of sensitive compartmented information (SCI) Activity Special Security Office (SSO) Disclosure of communications security (COMSEC) or Cryptologic information Report in accordance with NSTISSI 4003 Deliberate Compromise Cognizant Defense CI component Compromise by a Foreign Intelligence Service or Terrorist Organization

More about UD PMO UD PMO provides enterprise level management and operational capability to improve the identification, investigation, tracking, and reporting of UDs. Specifically, the UD Program was directed to develop robust capabilities to: Coordinate reporting and report UDs to ensure the prompt and complete delivery of UD case referrals to DoD senior officials for administrative action or to seek civil remedies or to the Defense Criminal investigations; Serve as the operational arm of the DoD UD program in accordance with DoD policy and guidance; Serve as the central DoD office for consistent uniform, and timely reporting of UD; and Promote collaboration and information sharing across the Department on UD.

UD PMO reportable events UDs Reportable to UD PMO MEDIA The release of classified information and/or controlled unclassified information (CUI) in the public domain. Public domain includes but is not limited to podcasts, print articles, internet-based articles, books, journals, speeches, television broadcasts, blogs, and social media postings. TECHNOLOGY Release or theft of information relating to any defense operation, system, or technology determines to be classified and/or CUI. UNAUTHORIZED RECIPIENT Information wherein individuals disclosed classified or CUI to unauthorized person or persons resulting in administrative action, referral for criminal and/or CI investigation, and/or resulted in the suspension or revocation of clearance.

Component UD Program **Recommend including: Items reportable to Component UD program office UD reporting chain within the Component Case management tools used by Component

What Happens After A Possible UD Is Identified? Security Managers will report suspected UDs to the Component UD program manager in accordance with Component policy Component UD programs with equity in the disclosure will arrange for an original classification authority (OCA) to conduct a classification review if not already completed The Component will complete a preliminary inquiry or investigation into the UD Component UD program will report the UD to the UD PMO, if required Component UD program will arrange for the completion of a damage assessment If the UD was in the public media, the Component UD program will arrange for the completion of a Department of Justice (DoJ) media leaks questionnaire If an individual is identified in the course of an investigation, the Component will determine if the administrative sanctions, a criminal investigation, or some other course of action is most appropriate.

Preliminary Inquiry/investigation What is it? Initial fact finding and analysis process to determine the facts of any security incident When is it required? All cases where information is compromised What is included? Who, what, when, where, how When should it be completed? As soon as possible, not to exceed 10 duty days

Damage Assessment What is it? Formal multidisciplinary analysis to determine the effect of a compromise of classified information on the national security When is it required? All cases where information is compromised What is included? Practical effects of a compromise on DoD programs, operations, systems, materials, and intelligence and on the Department of Defense’s ability to conduct missions When should it be completed? Within six months

Disclosures In The Public Media DoD has a responsibility to report certain Federal Crimes to the DoJ, including UD in the public media. UD PMO will refer UDs in the public media to the DoJ under one of the following Tiers: Tier 1 The Component’s inquiry or investigation determines that further investigation is not warranted. DoD does not ask for further action from DoJ Tier 2 DoD has determined that an internal or administrative investigation is appropriate Tier 3 DoD is requesting a criminal investigation from DoJ

Media Leaks Questionnaire What is it? Questionnaire required to refer an UD in the media to the DoJ When is it required? If the disclosure was in the public domain What is included? 11 specific questions When should it be completed? As soon as practical

-ATTORNEY GENERAL SESSIONS Conclusion Attribution is key to changing the culture where individuals believe they can leak national defense information Attribution cannot be achieved without timely reporting of unauthorized disclosures “THESE CASES ARE NEVER EASY. BUT CASES WILL BE MADE, AND LEAKERS WILL BE HELD ACCOUNTABLE.” -ATTORNEY GENERAL SESSIONS

Component Resources Component policy governing UDs: Policy/regulations Component UD program manager(s): Name(s) Office Contact information

Questions? Additional Resources for DoD Unauthorized Disclosure Policy: UD PMO SharePoint: https://intelshare.intelink.gov/sites/ousdi/hcis/sec/icdirect/ud/default.aspx CDSE UD Toolkit: https://www.cdse.edu/toolkits/unauthorized/index.php DoDD 5210.50, Management of Serious Security Incidents Involving Classified Information DoDM 5200.01, DoD Information Security Program Volumes 1-4