Download presentation
Presentation is loading. Please wait.
Published byAmie George Modified over 8 years ago
1
DOD - Accessing Classified Information Brought to you by your company Security Officer
2
This briefing applies to you If you have never had a security clearance OR If you are having your security clearance re-instated after a period of non-use. 2
3
A Look Ahead There are 35 slides, divided into 6 sections. Some slides go along fairly fast, some have a lot of text that you need to read and understand. All of the information is required training as designated in the NISPOM*, Chapter 3. So, get a soft drink or a cup of coffee, settle back, but pay close attention and stay awake. This training is important to our national security and especially important if the local Security person checks on your understanding of what you are about to study. To keep you awake, you have to click to advance the slide. 3 * NISPOM – National Industrial Security Operating Manual (DoD 5220.22-M, Feb 2006)
4
Six Sections to be Reviewed 4 These six sections meet the training requirements of NISPOM 3-106 The Threat to National Security The Industrial Security Program Types of Classified Information Marking of Classified Working in the Classified World Your Reporting Requirements
5
You are the key to defending against the threat! 5
6
Threat to National Security Fellow American, these are the technologies targeted by our adversaries in 2008 in order of precedence. Ask yourself, “Is my area of expertise on the Threat List?” Were you previously aware your expertise was targeted? 6 * A Trend Analysis of Reporting from Defense Industry, 2008 by DSS. Find the complete report at DSS Counterintelligence SiteDSS Counterintelligence Site
7
Threat to National Security 7 You don’t know right now who is watching you, gathering information on your company, stealing information, or planning that next terrorist attack. In America’s history, the breaking of the Japanese secret code helped bring U.S. victory in the Pacific during World War II. On the other hand, the loss of key U.S. secrets greatly aided the interests of the Soviet Union. Today, theft of U.S. technology and key Industrial proprietary information can put us out of business. No matter from where the attack comes or the target of the attack, there are citizens like you who, when alert, observant, and trained, can and will detect the threat. Let’s get you trained!
8
To support the United States of America 8
9
The Industrial Security Program The Defense Security Service (DSS) is responsible for the DoD industrial security program. DSS supports and inspects your company. The NISPOM, DoD 5220.22-M, is the operative manual for the industrial security program. All facility clearances and personnel clearances flow via contracts requiring eligibility and access to classified information. Those contracts are issued by government agencies or industrial contractors. The government uses a Security Classification System to control classified information. 9
10
The Industrial Security Program We are going to train you so that you can properly and aggressively defend against threats, attempts and acts against our nation. Each of us as a U.S. citizen takes on that responsibility when we accept a personnel security clearance. 10
11
The Industrial Security Program Your personnel clearance is made up of four elements. First is “Need to Know” - Because you are taking this training, your present or planned duties meet this element. Second - you must be awarded a personnel security clearance. You will meet this element after the training. Thirdly - Eligibility which means you are eligible to access classified at the level of your issued clearance (i.e. Confidential, Secret or Top Secret), and Fourth - Access which means you have been (will be) given access to classified at a specific level (i.e. Confidential, Secret or Top Secret) 11 Your personnel clearance is made up of four elements. First is “Need to Know” - Because you are taking this training, your present or planned duties meet this element. Second - you must be awarded a personnel security clearance. You will meet this element after the training. Thirdly - Eligibility which means you are eligible to access classified at the level of your issued clearance (i.e. Confidential, Secret or Top Secret), and Fourth - Access which means you have been (will be) given access to classified at a specific level (i.e. Confidential, Secret or Top Secret)
12
The Industrial Security Program There are a couple of things you agree to when you get your clearance. They are: You bind yourself to protect classified information by the Department of Defense (DoD) rules and regulations; and You will properly protect and control all classified material in your possession, whether physical objects or information of which you have knowledge. You bind yourself by signing the form shown on the next page. 12
13
The Industrial Security Program The SF SF312, Classified Information Nondisclosure Agreement - You can’t read it on this page, but you get the idea. You acknowledge that: A special trust has been placed in you; You are bound for life (even if you no longer require access) You are responsible to protect classified information from unauthorized disclosure; and, There are serious consequences for not complying with the terms of the agreement. 13
14
The classified you said you would protect 14
15
Types of National Security Information 15 Here are some levels of information you might be working with, depending on the level of your clearance. Some have additional restrictive caveats that read like alphabet soup. CNWDI – Critical Nuclear Weapons Design Information COMSEC – Communications Security NATO – NATO Information restricted to NATO affiliates. Restricted –due to nuclear association or content Formerly-Restricted – Old nuclear information still hanging around.
16
16 Types of National Security Information - Release of this material could “gravely damage national security” - Release of this material could “seriously damage national security” - Release of this material could “damage national security” Here is why information is marked and controlled at different levels.
17
This type of information flows from Intelligence Agencies (CIA, NRO, NSA, etc.). It is provided by and controlled by the agency that owns the information. It has restrictions and clearances over and above DoD requirements. 17 Types of National Security Information (Sensitive Compartmented Information) (Special Access Program) This type of information comes from the DoD side. Normally, an employee will not be authorized access to a SAP unless he/she is materially contributing to the accomplishment of SAP objectives.. Here are some special types of information
18
Types of National Security Information So we have described, Confidential, Secret, Top Secret, SCI, and SAP information and mentioned various caveats that can go along with any of them. We went over the levels of damage that the loss of the information can bring upon the United States. Now, how is such information marked so that when working with it you can protect it properly? 18
19
Markings so you can protect the right stuff 19 You are a little over half way through. Don’t despair.
20
Marking of Classified Per the Contract Security Classification Guide (SCG)*, classified information must be marked using the following method: Documents are boldly marked with the highest classification Individual paragraphs have markings: (C), (S), (TS) If you want to know what information needs to be protected in a specific contract, ask to see the SCG. The next slide mentions types of classified information you might come across. 20 * Each classified contract has an SCG
21
Included in classified material and information are: Documents; Devices; Models; Systems; Computers; Machinery; Photographs; Recordings; Phones, Reproductions; Notes; Sketches; Maps; Letters; produced Products; Substances and chemicals. The next slide shows you classified cover sheets that are commonly used to protect classified documents from being seen. 21 Marking of Classified
22
22 Sheets will rotate through sequence These cover sheets are used when documents are taken from a safe. Anything they cover must be controlled and stored properly. Now let’s look at a document you would find under such cover sheets.
23
Marking of Classified Here is what a classified document looks like (this one is for training, hence does not contain classified information). Portion Marking means portions of a document are marked as to level of classification. Note each paragraph is marked, plus the highest level is on the top and bottom of each page. The “Classified by:” marking at the bottom is found only on the first page of a document. Now lets give you insight into HOW to protect classified. 23
24
How to protect information that is marked classified 24
25
Working in the Classified World Here are a few things that will keep you out of jail… Never leave classified unattended. Keep it under your control at all times. Never discuss classified in public places, hotels, planes, etc. Never process classified on your computer unless approved by the “Designated Approval Authority” (that is the government). Store classified in an approved safe or closed area when done. 25
26
Working in the Classified World Here is another rule that will save you from jail. Classified material may only be taken from the facility where it is stored after obtaining proper approval from the Security Office of that facility. 26 * As an aside, even unclassified information pertaining to a classified contract must be approved through your Security Office or your company’s Public Affairs Office prior to release. Remember that SCG mentioned earlier? It will tell you the rule on releasing information.
27
Working in the Classified World We have reviewed threat awareness, the Industrial Security Program, types and marking of classified, and working in the classified world. One wrinkle on working… most of you will access classified “elsewhere”. That is, not in your home facility but in a customer’s facility or on their base. That type of access is known as access “elsewhere”. When you do that, you must have a Visit Authorization Request (VAR) to prove you have a clearance at the level needed. Your Security Office will help you get that VAR in place before you arrive “elsewhere”. 27
28
Working in the Classified World One other important aspect of working with classified… use of computers. If you use computers for classified processing, you must Follow the hosting company’s procedures and be trained and approved to use the classified computer; Never copy classified information to media or print out a hard copy without their approval and guidance. 28
29
You take on some responsibilities for the security of the United States What do you mean this is the 11 th Commandment? We are nearing the end!!
30
Your Reporting Requirements You have to report the following occurrences. We will tell you to whom you report in a minute: Adverse information* concerning yourself, a fellow employee, or a visitor who have access to classified information. All contacts with known or suspected intelligence officers from any country, or any contact which suggests the employee may be the target of an attempted exploitation by the intelligence services of another country. Loss, compromise, (or suspected loss or compromise) of classified or proprietary information, including evidence of tampering with a container used for storage of classified information. 30 * Adverse information includes any convictions, arrests, any major financial difficulties, any psychiatric treatment or counseling other than family counseling.
31
Your Reporting Requirements You have to report If you find an unlocked security container which is unguarded or left unlocked after-hours. If a member of your immediate family (or your spouse’s immediate family) takes up residence outside the United States, or if you acquire relatives (through marriage) who are residents or citizens of a foreign country. Interest by a foreign government, business enterprise, or person in your company’s proprietary or the government’s classified information. 31
32
Your Reporting Requirements So who do your report to? Either to Your company FSO or Security Officer, and/or Your immediate Supervisor or host if visiting another company or agency, or By calling the Defense Hotline as shown below 32
33
Your Reporting Requirements One last item of information and you are done! Your company has a written graduated discipline policy for security violations. They can include, Minor violations - verbal and/ or written counseling; Major violations – that can include: ○ Loss of your security clearance ○ Arrest by a government law-enforcement agency; ○ If found guilty of violations by a court, imprisonment or fines or both Your goal is to never have them apply this policy! 33
34
You Are Done!! If you have any question about your responsibilities or how to comply with your responsibilities, please contact your company Facility Security Officer. Now, let your Security Officer know you completed the training. You don’t want to have to go through this again… at least for a year. 34
35
DOD - Accessing Classified Information Brought to you by your company Security Officer
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.