Download presentation
Presentation is loading. Please wait.
1
ANNUAL REFRESHER BRIEFING AUGUST 2016
2
A SECURITY CLEARANCE IS A PRIVILAGE, NOT A RIGHT
When you accept the privilege of access to classified information, you are also accepting the responsibilities that accompany this privilege. Your clearance is granted to you by the Department of Defense (DOD), this is a lifelong responsibility. The purpose of this briefing is to keep you informed of appropriate changes in security regulations.
3
OVERVIEW OF THE SECURITY CLASSIFICATION SYSTEM
Classified information is official government information that requires protection in the interest of national security. Three levels have been established based on the criticality of the information or material to national interests. TOP SECRET: Information or material whose unauthorized disclosure could be expected to cause exceptionally grave damage to the national security. SECRET: Information or material whose unauthorized disclosure could be expected to cause serious damage to the national security. CONFIDENTIAL: Information or material whose unauthorized disclosure could be expected to cause damage to the national security. There are other categories of information which, while not classified, also could deserve mention: For Official Use Only (FOUO) is unclassified government information which is exempt from general public disclosure and must not be given general circulation. Company private or proprietary information is business information not to be divulged to individuals outside the company.
4
OVER VIEW OF PERSONNEL CLEARANCE AND ACCESS TO CLASSIFED INFORMATION
ELIGIBILITY NEED TO KNOW INDOCTRINATION Granted by CSA Established by Contract Completed by Company Favorable background inv. DD254 requirements Eligibility & Contract Limits TS: SSBI Access to all up to TS TS S: NACLC Access up to Secret S IT Levels: Sensitivity levels Based on systems/ access IT Level I, II, III Suitability: NACI Non-Sensitive None – Favorable Prior to being granted access, employees will be required to complete a Classified Information Non-Disclosure Agreement (SF312).
5
PROCEDURES APPLICABLE TO YOUR JOB
If you are a cleared employee you are required to complete an Indoctrination Briefing and all employees are required to complete the Insider Threat Briefing. Depending upon your specific job and location, security procedures will be based upon instructions provided by the client through DD254; Classification Guide or other instruction/requirement stated in contracts. All employees must comply with the client security requirements to include security briefings; access to client provided IT systems and classified information. A violation of client security policies and procedures may be grounds for removal from the contract.
6
THE THREAT
7
THE THREATS.. An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
8
THE THREATS – How its done
Suspicious Network Activity Cyber Intrusion Viruses; Malware Backdoor attacks Acquisition of user names and passwords All to exfiltration protected information Attempted Acquisition of Technology Direct acquisition of firms as front companies for agencies or third countries Acquire protected information Acquire controlled technologies Equipment, diagrams, schematics, plans, spec sheets Request for Information: Attempt to get protected information via phone, or web card Under the guise of Price quotes Marketing Surveys
9
THE THREATS – How its done cont’d
Solicitation or Marketing Services Attempts by foreign entities to establish a connection with a cleared contractor vulnerable to the extraction of protected information Via sales, representation or agency offers Via response to RFI / RFP for technical or business services Seeking Employment Attempts to introduce persons to gain access to protected information Via resume submissions; applications and references Exploitation of Relationships Gain unauthorized access to protected information through existing, innocuous relationships such as: Joint Ventures Foreign Military Sales Cultural commonality
10
THE THREAT – ECONOMIC & INDUSTRIAL ESPIONAGE
Foreign government’s continued ability to acquire state-of-the-art U.S. technology at little or no expense has undermined U.S. national security by enabling foreign firms to push aside U.S. business in the marketplace and by eroding the U.S. military lead. A clear line must be drawn to protect information that is: classified, or subject to export controls because it concerns military critical technologies, or proprietary information that is the intellectual property of a specific firm or individual. Controlled unclassified technology. The increasing value of technology and trade secrets in the global and domestic marketplaces, and the temporary nature of many high-tech employments, have increased both the opportunities and the incentives for economic espionage. The rapid expansion in foreign trade, travel, and personal relationships of all kinds, now makes it easier than ever for insiders to establish contact with potential buyers of classified and other protected information.
11
THE THREAT – ECONOMIC & INDUSTRIAL ESPIONAGE cont’d
The development of automated networks and the ease with which large quantities of data can be downloaded from those networks and stored and transmitted to others increases exponentially the amount of damage that can be done by a single insider who betrays his or her trust. How do we defend against threats? – THREAT AWARENESS…… Information concerning military capabilities, locations, Equipment; and technology is protected for a reason. Unauthorized release of this information, whether Classified or sensitive can have a detrimental effect on the Warfighter’s survivability.
12
HOW DO WE DEFEND AGAINST THREATS?
13
SAFEGUARD CLASSIFIED INFORMATION
Must never be left unattended. Must never be discussed in public places. Must never be transmitted in the clear. Must be under the control of an authorized person. Stored in an approved storage container. Never be processed on your computer unless approved by the U.S. Government. It is your personal responsibility to know that the person you are dealing with is both properly cleared and has a need to know. You must never reveal or discuss classified information with anyone other than those that are properly cleared and have a need to know.
14
SECURITY AWARENESS AND TRAVEL
When traveling on company business or for personal reasons, plan and prepare. Develop a personal travel plan and give it to your office and family. Learn about the culture, customs and laws of countries you visit. Visit the Department of State Web site for information on Threat Advisories. Coordinate with your FSO for overseas Company Travel.
15
So, you’ve got your clearance. Now, how to keep it
So, you’ve got your clearance. Now, how to keep it! STANDARDS OF CONDUCT – THE GUIDELINES To maintain access, you must recognize and avoid behavior that might jeopardize your clearance. Recognize behaviors in yourself or others that may need to be reported to your security officer and may signal that you or a co-worker need assistance. Early intervention is often the key to quick, effective resolution of problems without harming you or the organization. Linked to the 13 adjudication guidelines. (see next few pages)
16
BEHAVIOR THAT MIGHT JEOPARDIZE YOUR CLEARANCE…..
FINANCIAL ALCOHOL RELATED FOREIGN PREFERENCE Not paying your bills DUI, DWI Unreported personal Living or spending Concealing alcohol at contacts with foreign beyond your means work or in a car intel service, Not filling tax returns, Irresponsible behavior government or person tax evasion while under the influence seeking classified Bankruptcy DRUG INVOLEMENT information. PERSONAL CONDUCT Use of illegal/illicit drugs Immediate family Recurring pattern of Misuse of a prescription drug member who is a Poor judgment, Testing positive for foreign national. irresponsibility or illegal drug use Unreported close and unstable behavior CRIMINAL CONDUCT continuing contact Deliberate omission or Arrest with a foreign national Falsification of information in Spouse or child abuse or including intimate, or security questionnaires neglect marriage. Pattern of disregard for Exercise of any right, rules and regulations privilege or obligation of foreign citizenship. While possessing and using marijuana Is legal in some states, it is still a federal crime and will impact your clearance
17
BEHAVIOR THAT MIGHT JEOPARDIZE YOUR CLEARANCE
INFORMATION TECHNOLOGY OUTSIDE ACTIVITIESSECURITY VIOLATIONS Unauthorized entry into any Service, employment - Examples of security compartmented system. whether paid or not with: violations that may Attempting to circumvent or A foreign government have a detrimental defeat security or auditing systems. Any representative, person, affect on your ability Introduction, removal, or or other entity of a foreign to maintain a duplication of hardware, software, interest clearance: or media to or from any system ALLEGIANCE TO THE U.S. Unauthorized dis- without authorization. Sabotage, espionage, treason, closures terrorism, or sedition Taking classified SEXUAL BEHAVIOR Association or sympathy with information home Criminal Sexual Behavior persons who have committed Multiple security Pattern of compulsive, self or are committing any of the infractions destructive and high risk sexual above Downloading behavior that you are unable to Any statement or action that classified to an stop. Show allegiance to a country unapproved system other than the U.S. (SIPRNET to NIPRNET)
18
RECOGNIZING AND REPORTING BEHAVIOR ISSUES AND DISCIPLINARY ACTIONS
Exhibiting one or more of the described behaviors does NOT mean the individual is a security risk. Security judgment is based on pattern behavior, not a single action. ‘Whole Person” If you are unsure, talk with your Security FSO or your supervisor. “If I report as required won’t I lose my clearance and get fired?” First, not reporting may be sufficient cause for your access to classified information be suspended. Second – the company expects you to report. If disciplinary action is warranted, it will be done so on a scale. Examples: Minor issues – possibly a verbal warning A second issue – may result in a written reprimand Serious issue – may result in a loss of employment or access to classified information.
19
SELF-REPORTING.. KNOW WHAT AND WHEN TO REPORT SELF-REPORTING ON YOUR PERSONAL ACTIVITIES
Change in Personal Status Suspicious Contacts Financial Problems Martial status – married, divorced Must report contact with Filing for bankruptcy Cohabitation – living in spouse-like individuals of any nationality, Garnishment of wages relationship; intimate relationship, either within or outside the Have a lien placed on engaged scope of your official duties, your property for Change of name in which: failing to pay creditor Illegal or unauthorized Eviction from a Foreign Travel access is sought to residence for failure SCI: Receive clearance for travel classified or otherwise to pay rent to hazardous countries. sensitive information. Arrests Receive a defensive security briefing. You may be concerned Any, regardless of that you are a target of an whether or not Loss or Compromise of Information attempted exploitation. You were convicted Suspected or actual loss or compromise SCI cleared individuals must or charges were of classified or other sensitive information. report all close and continuing dropped. First Priority: Regain control of the classified relationships with foreign Other involvement material. nationals. with the Legal System: Target of legal action such as being sued.
20
SELF-REPORTING Psychological Counseling Where To Go For Help Psychological treatment is reported unless it is Employee Assistance Program for martial, family or grief counseling. Place of Worship Viewed as a positive sign that an individual Financial counselors recognizes that a problem exists and is willing Supervisor to take steps toward resolving it. Community Mental Health Centers Does not jeopardize your security clearance. Credit Unions At some time in your life, you may face Legal Services. problems with inter-personal relationships, depression, alcohol, family issues, or similar difficulties. Vast majority of those seeking professional help do not suffer damage to their career. On the contrary, it enables one to get help with an unmanageable problem in order to get on with life. Early intervention is often a key to early resolution.
21
REPORT IT! (HOTLINE NUMBERS)
Defense Department Department of State Bureau of Diplomatic Security Defense Intelligence Agency When traveling overseas, suspect incidents should be reported to the National Security Agency Regional Security Officer (RSO) or Post Security Officer (PSO) at the nearest U.S. diplomatic facility. Central Intelligence Agency Office of Inspector General Department of State Bureau of Diplomatic Security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.