1 / 30

PERSEC Annual Training

Annual Personnel Security Training for Rear-D Armor School Personnel Training Requirement

Télécharger la présentation

PERSEC Annual Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Personnel Security SGT Perkins Headquarters, Armor School Security Manager

  2. Three Components of Security • Personnel Security • Information Security • SAEDA Personnel Security SAEDA Information Security

  3. Personnel Security • Measures must be taken to safeguard the Armor School employees and those coming to a place of business either for business reasons or as a guest. • Controlling access includes systems that control access in and out of specific premises. (e.g., main entrances)

  4. Personnel Security • Various identification card systems, passes, and permits used by the installation are considered personnel control. • Probably the most recent concerns classified under personnel security are executive protection and background investigations.

  5. Interaction of Security Components Alarms & Hardware Reinforcement Utilization Response Protective (Security) Components Security Personnel Employee Support Safeguards Controls Enforcement Compliance Security Policy & Procedures

  6. Success Important Points for Success • A Security program must become an integral part of both the operations and management systems of an organization. • Unlike most other components of an organization, security directly affects every other component and thus must be all personnel concern. Success

  7. The Human Factor • FBI statistics indicate that 72% of all thefts, fraud, sabotage, and accidents are caused by a company’s own employees. • Another 15 to 20% comes from contractors and consultants. • Only about 5%to 8% is external people. FOR MORE INFO REFER TO CURRENT FBI STATISICS

  8. Personnel • Customers • Visitors • Employees • Contractors & Consultants • Unauthorized persons • Volunteers

  9. Customers and Visitors • What is the rule of thumb when it comes to protecting guests who come to your premises? • History of security incidents where people have been the target. • Efforts to provide adequate security can prevent or reduce liability.

  10. Employees • Human factors, probably the greatest single source of risk, including both human error and failure. • An organization’s employees are now considered a corporate resource and asset, requiring constant care and management.

  11. Importance Personnel Practices • Employees integrity: An organization’s existence could depend on it’s honesty. • Organization’s reputation: Without security processes in place the organization could be destroy. • Employee’s ethic: doing what’s right.

  12. Importance Personnel Practices • Security: safeguarding extremely sensitive and confidential information. • Information: Unauthorized release of sensitive information could destroy the organization’s reputation or damage it financially.

  13. Importance Personnel Practices • Employees/Volunteers are sometimes entrusted to safeguard the organization’s operational secrets that could be the foundation for success or failure of the organization.

  14. Hiring Practices What to Look For? A Straw person Perhaps? Education Training Experience Stable Work History Professional Certifications Clear Criminal Record Fiscal Responsibility Background Continuity

  15. SAEDA Subversion and Espionage Directed Against the U.S. Army AR 381-12

  16. The Threat • Approximately 200 existing countries • 50% of which actively conduct operations against the U.S. GLOBAL

  17. Why Report it? • Reporting a SAEDA Incident Is Mandatory • Failure to Report - Disciplinary Action Under UCMJ, Other Applicable Regulations, and Civil Laws (U.S. Code)

  18. Define SAEDA Subversion: Actively encouraging military or DOD civilians to violate laws, disobey lawful orders or regulations, or disrupt military activities With the willful intent to interfere with, or impair the Loyalty, Morale, or Discipline of the US Armed Forces Espionage: The act of obtaining, delivering, transmitting, communicating, or receiving anyinformation in respect to the national defense.With an intent or reason to believe that the information may be used to the injury of the US, or to the advantage of anyforeign nation.

  19. Penalties Punishment for Espionage under UCMJ and Title 18 U.S. Code: • Confinement for any number of years • Life imprisonment • Death

  20. What Are They After? • Military Plans and Capabilities • Classified/Controlled Unclassified Diplomatic and Military Information • Intelligence Operations • Technological Advances • “Open Source” Information • Access into our Computer Networks PROTECTED INFORMATION OR TECHNOLOGY

  21. Espionage Incidents to Report Attempts by unauthorized persons to obtain any classified or unclassified information concerning DoD or a DoD Contractor: • Facility • Activity • Technology • Personnel • Materials

  22. Questioning Elicitation Trickery Bribery Threats Coercion Blackmail Photography Observation Collection of documents/materials Correspondence Computer Hacking Espionage Incidents to Report(continued) Attempts by unauthorized persons to obtain any information concerning the DoD or DoD Contractors through the use of:

  23. If Approached for Information… • Remember as many Details as Possible. • Neither Refuse nor Agree to Cooperate. • Do Not try to Investigate the Incident Yourself. • Report the Incident to the Nearest CI Office IMMEDIATELY!

  24. Preparing Reports ofInformation When? What? Where? Who? How? Slide #58

  25. Remember... The most common, most dangerous agent is the one who compromises their integrity!

  26. Final Thoughts “I’m not anti-American. I wave the flag as much as anybody. I just didn’t want to worry about where my next dollar was coming from.” WO1 James W. Hall III, Convicted of Espionage for East Germany Sentenced to 40 years in Prison. When in doubt....Report It!

  27. RECAP • EVERYONE HAS A PART IN THE ORGANIZATION SECURITY PROGRAM • SAEDA DOES EXIST • YOU ARE A POTENTIAL TARGET • THE THREAT CHANGES, BUT IT DOES NOT DISAPPEAR • MOST INCIDENTS ARE COMMITTED BYVOLUNTEERS • IF EVEN SLIGHTLY SUSPICIOUS, REPORT IT, IT’S THE LAW.

  28. EVERYBODY HAS A PART IN THE TOTAL SECURITY PROGRAM Slide #17

  29. SECURITY MANAGER SGT Perkins Comm: 624-3584 DSN: 464-3584 Bldg 1101 (Basement) Email: aaron.w.perkins@us.army.mil Slide #1

  30. QUESTIONS?

More Related