Www.ispcert.com DEFENSIVE SECURITY BRIEFING. www.ispcert.com Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Licensing of Intangible Transfers of Technology
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
Counterintelligence Indicators Presented by Jerome Smith, Facility Security Officer, LAI/EES.
Ministry Health Care Corporate Responsibility Program Medical Staff Education.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Espionage Indicators Updated 08/21/13 U.S. Department of Commerce Office Of Security (OSY) Security is Everyone's Responsibility 1 Briefing.
Financial Recovery. Financial Recovery 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
CORPORATE ESPIONAGE COUNTERMEASURES Daniel J. Benny, M.A., CPP, PCI, CCO, CLET Private Investigator & Security Consultant.
The Department of Defense Intelligence Oversight Program
Provided by the LAUSD Food Services Division
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
COUNTERINTELLIGENCE TRENDS
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
INTERNET and CODE OF CONDUCT
{ What is Social Health? By Alex Seymour, Milan Bacovic, Remi Whyte & Tex Chapkoun.
DEED WorkForce Center Reception and Resource Area Certification Program Module 2 Unit 1b: WorkForce Center System II Learning Objectives III.
WHAT TO DO IF PULLED OVER BY AUTHORITIES IN THE UNITED STATES.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
UNCLASSIFIED SE 001 FOREIGN TRAVEL BRIEFING. UNCLASSIFIED FOREIGN RECRUITMENT As a (your company) employee, you have access to critical U.S. government.
Chapter 12 Managing the Team. Objectives Developing a strong corporate culture. Finding and hiring the best people. Dealing with firing an employee. Dealing.
BOM 120 Ethics and Social Responsibility in Business.
Security Education and Awareness Security 101 February 28, 2007 JSAC.
Donald van de Werken Director U.S. Department of Commerce International Trade Administration U.S. Commercial Service New Orleans, Louisiana Your Global.
Defensive Travel Briefing Cheryl L. Wieser Regional Security Officer US Department of Commerce (206) (206) Fax Updated 10/03/11 Security.
Los Angeles Youth At Work Larry Tash Los Angeles Chamber of Commerce UNITE-LA.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
Safety First Rotary’s Youth Protection Program Outbound Presentation.
HOME-BASED AGENTS Welcome to Unit 7. Review of unit reading material from textbook: Travel Career Development 8 th ed. Authors: Gagnon,P. & Houser, S.
Cultural Differences CE 104 Civil Engineering Projects Tim Ellis, Ph.D., P.E. Department of Civil Construction and Environmental Engineering Iowa State.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
THREAT AWARENESS. 1 What is “Threat”? Adversary with intent and capability to act against friendly interests. Other countries Business competitors Criminals.
Explain why the global market is important.
Information Systems Security Operational Control for Information Security.
DEFENSIVE SECURITY BRIEFING. Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
DEFENSE SECURITY SERVICE DSS Role in International Security.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
MEC EXPORT COMPLIANCE AWARENE$$ Presented by : Paul Divecchio –DiVecchio & Associate Phone: (617) , Fax: (508)
FERPA Family Educational Rights and Privacy Act A Tutorial.
Interpersonal Communication. Introduction Interpersonal communications means "showing appropriate ways to exchange your ideas and needs."
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
The Office Procedures and Technology
Global Opportunities Back to Table of Contents. Global Opportunities 2 Chapter 4 Global Opportunities Global Entrepreneurship Ways to Enter the Global.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Safety First Rotary’s Youth Protection Program Outbound Presentation.
Crisis Management. How to avoid a crisis  Stay on top of everything within your company  Listen to everything and always think how situations can turn.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
Threat Awareness Briefing. Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods.
Technical Counterintelligence Technical Surveillance Counter Measures Services.
GREENBERG TRAURIG, LLP ATTORNEYS AT LAW ©2010. All rights reserved. The New Form I-129: Are You Ready to Certify Compliance with US Export.
Argonne Office of Counterintelligence Intelligence Analysis Division Argonne National Laboratory.
Disclaimer This presentation is intended only for use by Tulane University faculty, staff, and students. No copy or use of this presentation should occur.
Welcome to the ICT Department Unit 3_5 Security Policies.
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
Chapter 3: IRS and FTC Data Security Rules
Cybersecurity Awareness
Security Guard Services - Make Your Choice Great.
Business cases on standardization
GDPR Quiz Today’s trainer: Click here to use Kahoot! 1
Clemson University Red Flags Rule Training
Government Data Practices & Open Meeting Law Overview
KONE Corporation Compliance Investigations
School of Medicine Orientation Information Security Training
Presentation transcript:

DEFENSIVE SECURITY BRIEFING

Employee Responsibilities While Traveling Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS This briefing is designed to prepare you the “cleared employee” for overseas travel. You have responsibilities to protect our employees, product, customers and those we do business with while you are traveling

 Notify FSO of travel plans  Ensure proper travel documentation  Protect export controlled technology and classified information  Visit the State Department website for up to date travel information EMPLOYEE RESPONSIBILITIES

 Notification to FSO includes travel plans for Canada, Mexico and Caribbean Countries  The state department website informs you of necessary travel documentation. Familiarize yourself with the site and use it to become an informed international traveler  Exports Compliance: Technical data can be transferred by reading a note, viewing a computer screen, conducting seminars and etc. Make sure you are authorized with a license and or TAA before discussing technical data that falls under exports compliance. EMPLOYEE RESPONSIBILITIES

 Maintain professional bearing  Remain in contact with host  Travel with others when possible  Display wealth as little as possible  Learn customs and courtesies of host country EMPLOYEE RESPONSIBILITIES

EMPLOYEE RESPONSIBILITIES  Conduct yourselves as professionals at all times. Pretend you are travelling with the CEO (or title of highest ranking officer) as you represent the company  Stick with your host-They will ensure your safety and refer you to reputable establishments  Travel in a group to make yourself as unattractive target of opportunity

 Protect Privileged Information (Classified, Proprietary, For Official Use Only and Sensitive Information) While Traveling  This information includes:  Carryon baggage  Laptop computers  Conversations EMPLOYEE RESPONSIBILITY

 Company employees should bring a sanitized computer while on travel. You can almost guarantee that you will be separated from your laptop at some point during customs checks. A sanitized computer provides no threat of exports violations or theft of economic or corporate data.  Keep all information that could lead to export violations or the release of proprietary data close at hand.  Company employees cannot transport classified material across international borders. EMPLOYEE RESPONSIBILITY

 Foreign Threat  Economic Classified information  Intelligence  Conduct Risk Analysis  Who is targeting  What do they want  How do they get it THREAT AWARENESS AND DEFENSE

 Economic Threat– theft of technology and commerce. Foreign entities may target classified or company sensitive information to gain a competitive edge. This costs millions of dollars in damage to U.S. business  Intelligence Threat-Collection efforts against the U.S. to increase for government power and competitive edge. THREAT AWARENESS AND DEFENSE

 When conducting analysis of threat ask the following questions:  What do we have?  What is our technology, defense or economic product  What do they want?  The product the foreign entity or government have the most to gain  How can they get it?  Where are we vulnerable  What efforts can we take to prevent unauthorized disclosure?  Training  Recognizing the threat  How to react to the threat  Reporting  How and what to report THREAT AWARENESS AND DEFENSE

 Could you be a target overseas?  Who are you and what will you do?  Science convention  Air shows  Business meetings Conduct Risk Analysis

 Will you be speaking?  Are you approved for a certain subject?  Watch for the cancellation and topic change For example, suppose you are approved to speak on the topic of a radar’s effects on bird migration. The foreign host may inform you that the conference has changed and they need you to present the subject of the weather’s effects on a specific radar.  What business will you be conducting?  Is it approved?  Make sure to stay on target For example, suppose you have approval to present a business opportunity for a teaming effort on your company’s refractor lenses for a foreign government’s telescope. The foreign entity brings the discussion to focus light beam intensity. Same product, different capabilities. Conduct Risk Analysis

 Some factors that could increase the possibility  Your access  Overseas locations  Ethnic, racial, or religious background COULD YOU BE A TARGET

 Just as in real estate, location is important. Your position, responsibilities and geographic location are circumstantial and may increase your chances of being targeted for recruitment.  Also, your background may cause you to be vulnerable. Foreign operatives may play on your sympathy if you have ties to foreign countries. It is important to always report foreign relations to the FSO  It is important to note that all the above factors that increase the chances of a person selected or initial targeting and assessment are circumstances you have little or no control over.  Most foreign contacts are perfectly legitimate and well meaning. Your ability to recognize the few who are not will help you avoid problems. It will also help your security officer help others avoid problems. COULD YOU BE A TARGET

 You have no control over whether or not you are targeted  Most foreign contacts are perfectly legitimate and well meaning COULD YOU BE A TARGET

 Your present situation may cause you to look vulnerable, but it doesn’t mean you will be targeted. Also, you may be targeted even if your circumstances aren’t as above. It’s all out of your control. However, you can control your actions and how you react to assessment and recruiting efforts.  Your ability to recognize the few who are not will help you avoid problems. It will also help your security officer help others avoid problems. COULD YOU BE A TARGET

 Who Could Target You?  Third party spies  Students  Convention Attendees  The next table over  Anyone Conduct Risk Analysis

 When traveling overseas, things may not be the way they seem. Friendly encounters, business meetings, symposiums and etc could provide a fertile market for collection efforts.  Remain vigilant, but remember to obey laws and practice local customs and courtesies if they don’t violate ethics.  Report all suspicious contacts to security Conduct Risk Analysis

 Collection efforts  Elicitation  Eavesdropping  Surveillance  Theft  Interception THREAT AWARENESS AND DEFENSE

 Elicitation-Subtle form of questioning where conversation is directed to collect information- It is a different method than direct questioning and is hard to recognize  Example of Elicitation can be found in the recent case of Ben- Ami Kadish, who gave secrets to Israel. His handler, who also handled a spy name Pollard, smoothly convinced him to turn over documents to help maintain the security of Israel. Kadish received small gifts and private dinners. dyn/content/article/2008/04/22/AR html?wpisrc =newsletter dyn/content/article/2008/04/22/AR html?wpisrc =newsletter  Eavesdropping-Listening in to get information  Surveillance-Watching target unobserved THREAT AWARENESS AND DEFENSE

 Today’s business puts many employees in contact with foreign entities. Some of these contacts can lead to elicitation  Elicitation is different than direct recruitment  Subtle, but enough to obtain privileged information  Listen to your gut; if the conversation feels wrong…  Change the topic and move on  A reluctant prospect may not be pressed into service A WORD ABOUT ELICITATION

 Economical need for information is strong  Spies look and act like normal people  Any traveler can be assessed  Privileged information is damaging  Report suspicious situations KEEP YOUR EYES OPEN

 Organized Government Services Could:  Follow you  Sneak into your quarters  Tap your communications  Arrange audio and video coverage  Use guides and interpreters WHAT’S THE WORSE THAT COULD HAPPEN?

 Security or foreign intelligence services are active  They can and do review Visa requests  You may be assessed  At the very least, these services may “debriefed” some of your foreign contacts  If you are of interest, the next step is Recruitment WHAT’S THE WORSE THAT COULD HAPPEN?

 Remain non-committal if approached  Report all suspicious activities to FSO  Practice smart information systems security  Escort visitors COUNTERMEASURES More than 140 countries actively target US information-Largest collection effort since the cold war

 Report to Security for a debriefing  Bring any notes  Be open and honest WELCOME HOME

Click on the correct answers TEST

1.Which of the following are factors that may make you a target of espionage: A.Ethnic backgroundEthnic background B.Annual incomeAnnual income C.Rental carRental car 2.Where might a foreign service glean privileged information A.Magazines you readMagazines you read B.TV shows you watchTV shows you watch C.Products you buyProducts you buy D.Conversations you haveConversations you have 3.While traveling, you have control over all situations A.TrueTrue B.FalseFalse 4.All are examples of collection methods EXCEPT: A.ElicitationElicitation B.SurveillanceSurveillance C.Currency exchangeCurrency exchange D.EavesdroppingEavesdropping TEST-SELECT THE CORRECT ANSWER

5.Which of the following are the most correct countermeasures of a solicitation effort A.Agree to provide then contact the authoritiesAgree to provide then contact the authorities B.Say “no” and then contact the authoritiesSay “no” and then contact the authorities C.Continue the conversation so as not to offend the hostContinue the conversation so as not to offend the host D.Make attempts to change the subjectMake attempts to change the subject 6.Most foreign contacts are well meaning and legitimate A.TrueTrue B.FalseFalse TEST-SELECT THE CORRECT ANSWER

Go Back!

Go Back!

Go Back!

Go Back!

CERTIFICATE