Initial Security Briefing

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

FOIA Exemption 1 & E.O Classified National Security Information
Merlin RAMCo Inc Initial Security Education.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
Department of the Navy Information Security Program
F ACILITY S ECURITY Presented by: Dela Williams. 2.
Section One: Classification System Overview Note: All classified markings contained within this presentation are for training purposes only.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Section Nine: Reporting Requirements Note: All classified markings contained within this presentation are for training purposes only.
The Department of Defense Intelligence Oversight Program
10/27/20111 Initial Security Indoctrination DoD. 10/27/20112 The protection of Government assets, people and property, both classified and controlled.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
The Islamic University of Gaza
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Session 3 – Information Security Policies
Virginia Army National Guard Personnel Security
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
DFARS & What is Unclassified Controlled Technical Information (UCTI)?
Personnel Management SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United.
HOMELAND SECURITY ADVISORY SYSTEM. Established after the terrorist attacks on America September 11, 2001.
9/15/20151 Initial Security Indoctrination. 9/15/20152 Agenda Physical Security Personnel Security Information Security Information Assurance Public Release.
ESPIONAGE INDICATORS. ESPIONAGE INDICATORS GUIDE BRIEFING DEPARTMENTAL ADMINISTRATIVE ORDER (DAO ) NOAA ADMINISTRATIVE ORDER (NAO )
SECURITY BRIEFING (ANNUAL REFRESHER)
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Ames Laboratory Privacy and Personally Identifiable Information (PII) Training Welcome to the Ames Laboratory’s training on Personally Identifiable Information.
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
Theme: classification & distribution of government control of FEA.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
1 SECURITY BRIEFING FOR ACCESSING CLASSIFIED INFORMATION.
1. Module Rev.F1 2  The Integrated Safety Management System (ISMS) is a systematic, common sense approach to working safely. The objective of.
Indoctrination Briefing 1SG Patrick Cullen KANSAS ARMY NATIONAL GUARD.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Creating an Insider Threat Program.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Sensitive But Unclassified (SBU) Information
NISPOM Chapter 1 Basics General Requirements Reporting Responsibilities Steven Rivera, FSO July 10, 2013.
Privacy Act United States Army (Managerial Training)
Managing a “Data Spill”
CLASSIFICATION. Classification Marking requirements Test CONTENTS.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Protection The Personnel Security Program (PSP) & Supervisors’ Responsibilities Mr. Connolly.
DOD - Accessing Classified Information Brought to you by your company Security Officer.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Department of the Navy Security Enterprise Leadership Course Curriculum for Security Program Oversight 1.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Declassifying the Foreign Relations Series Bringing the Official Record to light.
Insider Threat Awareness
Security Education Refresher Briefing. Objectives Annual requirement Satisfactory knowledge of processing, handling and safeguarding of Classified National.
Providing Access to Your Data: Handling sensitive data
NISPOM Basics What You Need to Know!
Unauthorized Disclosure Training
Unauthorized Disclosure TRAINING FOR Security Professionals
Derivative Classification Overview
Initial Security Indoctrination
Red Flags Rule An Introduction County College of Morris
ACCESSING CLASSIFIED INFORMATION
Annual Security Briefing
Foundations of Homeland Security & Emergency Management Law & Policy Post NPHS 1510.
Presentation transcript:

Initial Security Briefing Job Aid March 2015

A NOTE FOR SECURITY PERSONNEL: This initial briefing contains the basic security information personnel need to know when they first report for duty. This briefing is designed to be customizable to meet your organization’s operational requirement and local environment. The following tour will get you acquainted with the slide features available for navigation and customization.

Slide Navigation When in “Slide Show View,” select icons to go to various sections

Slide Show View Slide Show View occupies the full computer screen, exactly the way your presentation will look on a big screen when your audience sees it. You can see how your graphics, timings, movies, animated effects, and transition effects will look during the actual presentation. To exit Slide Show View, press ESC.

Customizing Slides Red text is a placeholder where you can enter your local information as appropriate

Adding Details Green text is a placeholder where you can provide additional details as appropriate

Adding a New Slide Step 2 Step 1 This PowerPoint presentation contains several different slide designs. To add a new slide, first select the position where the new slide will appear. You can do this by clicking on the slide within the left pane of PowerPoint. Yellow highlighting behind the slide indicates you have selected it. The new slide will appear after your selected slide. Next, on the Home tab, in the Slides group, click the arrow next to New Slide and select the desired slide design. Or, if you want your new slide to have the same layout of the slide you have selected, you can just click New Slide instead of clicking the arrow next to it. Step 2 Step 1

Notes You can use the notes pane in Normal View to write notes about your slides. To get a Normal view, click on the View tab, and in the Presentation Views group, click Normal. The Notes pane (circled in red) in Normal view Blue arrows show the View tab and Normal view indicator

Prepare your Presentation Review every slide and determine how you would best speak to the topics listed on the slides. If helpful, write notes to help you remember additional details. Identify slides with red and green text and add information as appropriate. After making edits, you can change the text color if desired. Remove instructional slides from the beginning of the presentation. Rehearse your presentation to determine approximate length. If desired, print slides to distribute to your audience.

INITIAL SECURITY BRIEFING

TOPICS Physical Security Personnel Security Information Security Antiterrorism Cybersecurity Public Release of Information Operations Security Policies

PURPOSE Understand National and DoD security policies to counter threats Identify threats to classified and unclassified government assets including, but not limited to: Insider Criminal and Terrorist Activities Foreign Intelligence Entities Foreign Governments

PERSONNEL Know your security manager or security officer: Name Location Contact information

PHYSICAL SECURITY

PHYSICAL SECURITY Includes, but is not limited to: Perimeter Fences Prohibited items Antiterrorism Entry/exit inspections Employee and visitor access controls Escorting Local procedures Badging Insert additional briefing topics as needed Intrusion Detection Systems Guards/patrols

PERSONNEL SECURITY

PERSONNEL SECURITY | SECURITY CLEARANCE Position sensitivity and/or duties determine level of clearance and access Clearance levels Top Secret, Secret, or Confidential Local clearance investigation processing procedures Insert language related to local procedures

PERSONNEL SECURITY | BACKGROUND INVESTIGATION Includes investigations for: DoD Civilians Military Contractors Conducted to determine suitability for granting a security clearance Single Scope Background Investigation (SSBI) Access National Agency Check and Inquires (ANACI) National Agency Check with Law and Credit (NACLC) Subject to continuous evaluation SSBI-Periodic Reinvestigation (SSBI-PR) Phased Periodic Reinvestigation (PPR) NACLC

PERSONNEL SECURITY | ACCESS REQUIREMENTS CLEARANCE ELIGIBILITY SF 312 ACCESS NEED TO KNOW

PERSONNEL SECURITY | DEBRIEFING REQUIREMENTS Coordinate access debriefing during out-processing Include or remove all that are applicable SCI SAP NATO COMSEC Collateral Insert others as necessary

PERSONNEL SECURITY | REPORTING REQUIREMENTS Changes to: Name Marital Status Citizenship Adverse information Based on facts NOT rumors Self or co-worker Includes but not limited to: - Criminal activities - Alcohol or drug related incidents - Financial difficulties

PERSONNEL SECURITY | REPORTING REQUIREMENTS Loss, compromise, or suspected compromise of classified information Secure information immediately Report immediately to security or supervisor Insert local procedures Foreign contacts Continuous contact with foreign nationals Includes, but is not limited to: - Cohabitation - Marriage Suspicious contacts with or by foreign nationals Member of immediate family or spouse’s immediate family is a citizen of a foreign country

PERSONNEL SECURITY | REPORTING REQUIREMENTS Foreign Travel Insert local reporting procedures Other employment or service Foreign government, national, organization or entity, or a representative of any foreign interest (paid or unpaid) Lost or stolen badges

PERSONNEL SECURITY | REPORTING REQUIREMENTS Potential Espionage Indicators Exhibited by Others Unexplained affluence Verbal or physical threats Keeping unusual work hours Inquiring about operations/projects where no legitimate need to know exists Divided loyalty or allegiance to the U.S. Willfully disregarding security procedures Unauthorized removal of classified information Unreported foreign contact and travel Fraud/Waste/Abuse of government credit cards Pattern of lying Attempts to enlist others in illegal or questionable activity

INFORMATION SECURITY

INFORMATION SECURITY Pertains to the protection of classified and controlled unclassified information (CUI) from unauthorized disclosure, including, but not limited to: Marking Handling Transmission Storage Destruction Provide additional guidance as necessary

INFORMATION SECURITY | CLASSIFICATION LEVELS TOP SECRET Exceptionally Grave Damage to the National Security SECRET Serious Damage to the National Security CONFIDENTIAL Damage to the National Security

INFORMATION SECURITY | TYPES OF MATERIAL Includes, but is not limited to: Machinery Reproductions Documents Storage media Emails Working papers Models Sketches Faxes Maps Photographs

INFORMATION SECURITY | MARKING Appropriately marked to alert recipients of the information’s classification TOP SECRET (TS) SECRET (S) CONFIDENTIAL (C)

INFORMATION SECURITY How Is Information Classified? Original Classification Only specific positions within the U.S. Government can originally classify information Derivative Classification All cleared DoD and contractor personnel can be derivative classifiers Provide definitions of original classification and derivative classification according to EO 13526 and DoD Manual 5200.01 Volume 1

INFORMATION SECURITY What Information Can Be Classified? Only Information that falls under one or more categories of section 1.4 of Executive Order 13526 may be eligible to be classified: military plans, weapons systems, or operations United States Government programs for safeguarding nuclear materials or facilities foreign government information vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans, or protection services relating to the national security intelligence activities (including covert action), intelligence sources, methods, or cryptology foreign relations or foreign activities of the United States, including confidential sources the development, production, or use of weapons of mass destruction scientific, technological, or economic matters relating to the national security

INFORMATION SECURITY Information cannot be classified to: Conceal violations of law, inefficiency, or administrative error Prevent or delay the release of information that does not require protection in the interest of the national security Prevent embarrassment to a person, organization, or agency Classify basic scientific research information not clearly related to national security Restrain competition

INFORMATION SECURITY Classification Challenges You have a responsibility to report information that you believe is improperly or unnecessarily classified. Contact your security official for additional guidance for submitting a classification challenge. Insert local procedures

INFORMATION SECURITY Safeguarding Classified Information Must be under the positive control by an authorized person or stored in a locked security container, vault, secure room, or secure area Must receive appropriate training prior to performing derivative classification duties and refresher training every two years thereafter Must respect and understand the markings and the downgrade/declassification instructions on classified material Discuss or send via secure communications Process on approved equipment Destroy by approved methods Discuss in an area authorized for classified discussion

INFORMATION SECURITY Sanctions You may be subject to criminal, civil or administrative sanctions if you knowingly, willfully, or negligently: Disclose classified information to unauthorized persons Classify or continue the classification of information in violation of DoD regulations Create or continue a Special Access Program (SAP) contrary to the requirements of DoD regulations Disclose controlled unclassified information (CUI) to unauthorized persons Violate any other provision of applicable DoD regulations Contact your Security Official at phone number or other contact information for additional guidance

INFORMATION SECURITY Sanctions Sanctions may include, but are not limited to: Warning Reprimand Loss or denial of classified access Suspension without pay Removal from employment Discharge from military service Criminal prosecution

INFORMATION SECURITY Controlled Unclassified Information (CUI) CUI is unclassified information that requires safeguarding or dissemination controls pursuant to and consistent with applicable law, regulation, and Government-wide policy. Departments and agencies within the U.S. Government assign different CUI designations. CUI designations include, but are not limited to: For Official Use Only (FOUO) Law Enforcement Sensitive (LES) Sensitive But Unclassified (SBU)

ANTITERRORISM

ANTITERRORISM Antiterrorism includes defensive measures used to reduce the vulnerability of individuals and property to terrorist acts, including limited response and containment by local military and civilian forces. Additionally, antiterrorism includes actions taken to prevent or mitigate hostile actions against personnel (including family members), information, equipment, facilities, activities, and operations. Personnel must participate in annual ATO Level I training; see your antiterrorism officer for local guidance.

CYBERSECURITY

CYBERSECURITY Cybersecurity prevents damage to, protects, and restores information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. Information systems include, but are not limited to: Computers Electronic communications systems/services Personal Digital Assistant (PDA) (i.e. BlackBerry)

CYBERSECURITY Responsibilities Participate in annual cybersecurity training Comply with password policy directives and protect passwords from unauthorized disclosure Contact local security official for additional guidance

PUBLIC RELEASE OF INFORMATION

PUBLIC RELEASE OF INFORMATION Release of government information must be approved by the Public Affairs Office (PAO) Do not discuss classified or sensitive information with the media; refer inquiries to your local PAO Insert local PAO or security official contact information

OPERATIONS SECURITY

OPERATIONS SECURITY Operations Security (OPSEC) is a systematic process that is used to mitigate vulnerabilities and protect sensitive, critical, or classified information Initial orientation at a minimum shall include an explanation of OPSEC, its purpose, threat awareness, the organization’s critical information, and the individual’s role in protecting it. Contact local security official name for additional guidance

POLICIES

POLICIES Reference Security Policies and Regulations (not all inclusive): Executive Order 13526 - Classified National Security Information Executive Order 12968 - Access to Classified Information DoDD 5205.02E, DoD OPSEC Program DoDI 2000.12, DoD Antiterrorism (AT) Program DoDI 8500.01, Cybersecurity DoDM 5200.01, Vol. 1-4, DoD Information Security Program DoD 5200.2-R, DoD Personnel Security Program DoD 5200.08-R, DoD Physical Security Program Homeland Security Presidential Directive (HSPD)-12, Policy for a Common Identification Standard for Federal Employees and Contractors

QUESTIONS Security Manager Contact List Security Officer Security Monitor Antiterrorism Officer OPSEC Officer Information System Security Manager Add/delete as necessary Contact List