Instructions To Play the Counterintelligence Magic 8-Ball game, go to the “Slide Show” menu and select the “From Beginning” icon. Once the game launches,

Slides:



Advertisements
Similar presentations
Welcome to the Travel Help Desk Ticket System. To access the Travel Help Desk Ticket System use this url To access the Travel.
Advertisements

EXPORT CONTROLS. Export Controls are established to implement treaties and national security laws, generally protect national security and to combat terrorism.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Author Instructions How to upload a full session proposal with abstracts – two step process.
Tutorial Video basic skills basic skills Next page -->
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Export Controls Marci Copeland Office of Research Export Control Administrator.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2008 Qwest. All Rights Reserved. Welcome to the Qwest Web Conferencing.
Menu How to use msn messenger… How to identify the msn icon… Once you’ve signed in What msn messenger should look like… msn website (alternative)
WHAT ARE EXPORT CONTROLS? U.S. laws and their implementing regulations that govern the distribution to foreign nationals and foreign countries of strategically.
Get schall Career Center Workshop. What is Linkedin? A social networking website for people in professional occupations. Launched in 2003 it is mainly.
Partnership  excellence  growth WorldFish Center Survey Module.
Division of Risk Management State of Florida Loss Prevention Program.
Computer Use Guidelines Business Lab. Computers are Important Tools! Internet Research Learning Software Word Processing Multimedia Presentations.
A U.S. Department of Energy Office of Science Laboratory Operated by The University of Chicago Argonne National Laboratory Office of Science U.S. Department.
Insider Threat Awareness
How to Claim Your Jennifer Maimone from Dual Crossroads
An Information Protection Assessment
Export Control U.S. federal regulations involving exporting items and technologies (widgets, software, data, etc.) to foreign nationals, both on campus.
EXPORT CONTROLS.
Creating your online identity
$$$ DEAL OR NO DEAL $$$.
The Inner Game of Assertiveness
Introducing ‘Snap Maps’
August 22 E10 and EH10.
Nobody’s Friend Enid Blyton.
In the message bar, click Enable Editing,
Self Service Portal Invites
Online Testing System Assessment Viewing Application (AVA)
SSETS-EBD Student Instructional Guide
Computer Use Guidelines
Phishing is a form of social engineering that attempts to steal sensitive information.
“SHOW IT” CATEGORY QuickSign [Jinx takes the stage.]
Technical Steps to Install Norton Mobile Security on Android Phone.
Possessive Pronouns What does the underlined word in each sentence indicate? In the first and third sentences, what is the relationship of the underlined.
DIRECT A PRINT JOB TO HP PRINTER BY SPEAKING TO ALEXA
Online Testing System Assessment Viewing Application (AVA)
STOP. THINK. CONNECT. Online Safety Quiz.
Instructions To launch the Magic 8-Ball game, select “Slide Show” from the command menu and click on “From Beginning”.
BUSINESS ENGLISH 1 The Start of Unit 2.
Assessment Viewing Application (AVA)
Member Training Global CE Help
Construction, Housekeeping, Venues and Warehouse
How to Embed Videos into Powerpoint
Portal 2.0 SVI 2.0 Update.
Mobile Game - Java.
OSCAR/Surface How to register
Online Manual Game.
BE SAFE.
HOW TO QUICKLY ADD A CONTACT IN GMAIL Add a contact in Gmail Once opened, you just need to move your cursor to the top of the and over the sender.
Instructions To Play the Cybersecurity Magic 8-Ball game, go to the “Slide Show” menu and select the “From Beginning” icon. Once the game launches, click.
Shame on you if you aren’t making required security reports
CONFLICT MODEL OF MIGRATION
$$$ DEAL OR NO DEAL $$$.
Online Testing System Assessment Viewing Application (AVA)
Welcome to my class Our Class Rules.
Trying New Things.
Privacy & Security ABC Family Practice.
How to Accept or Reject a Software Access Request
EMPLOYEE ACTION MANUAL FOR MANAGERS
View from the bridge …...
$$$ DEAL OR NO DEAL $$$.
Welcome to My Class Our Class Rules.
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Introducing ‘Snap Maps’
Join a Shared Space.
Using Google drive Mrs. Carr.
Presentation transcript:

Instructions To Play the Counterintelligence Magic 8-Ball game, go to the “Slide Show” menu and select the “From Beginning” icon. Once the game launches, click to begin the game.

Counterintelligence Ask the Magic 8 Ball! 8 PLAY

Click “Ask” to see what the CI Magic 8 ball says. Should I accept an unsolicited invitation to lecture in a foreign country? 8 ASK

This could be an attempt by a Foreign Entity to collect classified information! I don’t think that’s wise! Next Question

If a coworker does not report his foreign contacts should I report it? Click “Ask” to see what the CI Magic 8 ball says. If a coworker does not report his foreign contacts should I report it? ASK

Unreported foreign contacts represent a security vulnerability and potentially increase the risk of the loss or compromise of classified information. Absolutely Yes! Next Question

Click “Ask” to see what the CI Magic 8 ball says. Should I respond to a Request for Information about a classified project from someone I don’t know? ASK

Unsolicited requests for information should be viewed with caution. Never discuss classified information with anyone who does not have the proper clearance and need to know. I wouldn’t do it!

Click “Ask” to see what the CI Magic 8 ball says. If I receive an email requesting ITAR materials with no information on the identity of the end user, should I report this to my FSO? ASK

Done Violation of International Traffic in Arms Regulation and Export Control policies negatively impact national security. Most definitely yes! Done

Click to learn more about Foreign Collection Methods Thanks for playing! Click to learn more about Foreign Collection Methods 8