Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the security classification system. Employee reporting obligations and requirements. Security procedures and duties applicable to the employee's job.
Sample only Order at Report to DISCO Employees who do not want to perform on classified work Refusal to sign SF 312
Sample only Order at Hotlines Hotlines are available. However, recommend that company officers have chance to handle situation Not to take place of investigations May be used to tip off Defense Hotline The Pentagon Washington, DC (800)
Sample only Order at Reporting Events that impact: –FCL –PCL –Protection of classified information –Loss or compromise Contractors cleared employees on reporting channels with: –Federal agencies –FBI –CSA
Sample only Order at Reporting (To FBI) Reports to FBI –Espionage –Sabotage –Terrorism –Subversive activities –Submit copy of written report to CSA
Sample only Order at How to Report Report to the FBI Follow up with written report Send copy to IS Rep with FBI approval Contact FBI File Office Send Written Report Notify DSS when permitted
Sample only Order at Reporting (To CSA) Reports to CSA –Adverse information –Suspicious contacts –Change in cleared employee status –Naturalization –Not desiring to work on classified contract
Sample only Order at DISCO Adverse Information Changes in Cleared Employee Status Citizenship by Naturalization Employees Desiring Not to Perform on Classified Work Standard Form (SF) 312
Sample only Order at Reporting (to CSA) Reports to CSA –SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts
Sample only Order at Reporting (to CSA) Reports to CSA –Refusal to sign SF 312 –Changes affecting FCL –Changes in storage capability –Inability to protect classified –Security equipment vulnerabilities –Unauthorized receipt of classified –Compromise information –Disposition of classified information –Foreign classified contracts
Sample only Order at Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report
Sample only Order at Loss, Compromise or Suspected Compromise Conduct preliminary inquiry Submit initial report Submit final report Discover circumstances surrounding the reported loss, compromise or suspected compromise.
Threat Awareness Briefing
Sample only Order at Why Our Information Employee Responsibilities Threat Awareness and Defensive Information Methods of Contact Countermeasures Test CONTENTS
Why go through process of Research and Development Let someone else pay for R&D Possible military application WHY OUR TECHNOLOGY?
Sample only Order at Protect Proprietary, For Official Use Only and Sensitive Information This information includes: Vendor prices personnel ratings medical records corporate financial investments and resources trade secret information corporate/government relations corporate security vulnerabilities financial forecasts and budget information EMPLOYEE RESPONSIBILITY
Sample only Order at Company Computer Security Safeguards Use computers for authorized business Establish and protect passwords Visit only authorized websites Use caution when downloading attachments Save all work Use classified systems for classified processing EMPLOYEE RESPONSIBILITY
Sample only Order at The following may indicate that you could be targeted: Your access to active intelligence interest Overseas locations where foreign intelligence operates Located in the U.S. where foreign nationals can gain access to you Ethnic, racial, or religious background that may attract the attention of a foreign intelligence operative EMPLOYEE RESPONSIBILITY
Sample only Order at Foreign Threat Economic – theft of technology and commerce Classified information-solicitation for unauthorized disclosure Intelligence-collection efforts Conduct Risk Analysis Who is targeting What do they want How do they get it THREAT AWARENESS AND DEFENSE
Sample only Order at Collection efforts Elicitation Eavesdropping Surveillance Theft Interception THREAT AWARENESS AND DEFENSE
Sample only Order at Suspicious Activities Requests for information outside of need to know Unauthorized reproduction of materials Unauthorized removal/destruction of materials Unexplained affluence Regular, unexplained foreign travel Maintains long hours in spite of job dissatisfaction Employees are required to report efforts by any individual to obtain illegal or unauthorized access to classified or sensitive information— This include proprietary information INSIDER THREAT Robert Philip Hanssen
Sample only Order at Fax Snail Mail Telephone Personal Contact May seem innocent enough, but…. Legitimate business requests will come through appropriate channels Personal Contact: Asks about project specifics, whether or not classified or proprietary details address originated in a foreign country METHODS OF CONTACT
Sample only Order at Remain non-committal if approached Report all suspicious activities to FSO Practice smart information systems security Escort visitors Pay attention to surroundings Secure building at the end of the day COUNTERMEASURES