1 / 57

SCI Overview Seminar SCI Today

SCI Overview Seminar SCI Today. UNCLASSIFIED. DNI Special Security Center . v. July 2007. UNCLASSIFIED. Welcome and Objectives. Classification level Seminar room/SCIF No cell phones or other personal electronic devices Only authorized classified discussion area Seminar Objectives

colm
Télécharger la présentation

SCI Overview Seminar SCI Today

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SCI Overview SeminarSCI Today UNCLASSIFIED DNI Special Security Center v. July 2007 UNCLASSIFIED

  2. Welcome and Objectives • Classification level • Seminar room/SCIF • No cell phones or other personal electronic devices • Only authorized classified discussion area • Seminar Objectives • Reinforce the fundamental security basic practices • Describe your responsibilities in security and in the protection SCI • Correlate our changing world to your responsibilities • Inform of changes in SCI and the security world

  3. Your Seminar HostDNI Special Security Center • Established “To strengthen security in the Intelligence Community and wherever SCI and intelligence information is processed or held.” • Government and contractor personnel dedicated to: • Security policy creation and implementation • Security coordination and liaison • Security services

  4. About You… • Your Organization • Your job responsibilities • Greatest security challenge • What do you hope to get from this session

  5. UNCLASSIFIED Security FundamentalsA Refresher…

  6. Personnel Security – You Must Report… • Changes in personal status • Marriage, separation, divorce, cohabitation • Personal problems • Drugs & alcohol –misuse, abuse • Finances • Legal involvements • Litigation, arrest, court summons, etc. • Improper solicitations for information • Foreign-based outside employment • Adverse information about others • Contact with media Personnel Security

  7. Report Foreign Travel Report foreign travel in advance • Day trips to Mexico or Canada can be reported upon return • Pre-travel briefing may be required • Report unusual trip incidents Personnel Security

  8. Report Foreign Contacts • Reportable • Close continuing relationship, business or personal, with a citizen, resident or representative of foreign country (this includes contact via internet; email, chatrooms) • Not reportable • Casual contacts at social gatherings unless • Foreign contact displays strong interest in employment • Is not satisfied with answers • Follow up contact is sought Personnel Security

  9. Report Security Incidents • Violations • Involve loss, compromise, or suspected compromise of classified information and/or • Involve gross security carelessness • Infractions • When the rules have not been followed • Systemic weaknesses and anomalies • Internal, Disgruntled Employees: external-Activist Groups Personnel Security

  10. Pre-publication Review • Any written material that contains or purports to contain SCI • Material may contain description of activities that produce or relate to SCI • Anything entering public domain must be approved • Speeches, articles, white papers, advertisements • Web pages, web sites • Internet is an unclassified communication system • Do not write “around” classified subjects Personnel Security

  11. Unauthorized Disclosure • DCID 6/8 • Currently being re-written to reflect the Office of the Director of National Intelligence • Will be titled Intelligence Community Directive (ICD) 708 and 708.1 • Purpose • Emphasizes the responsibilities of the IC to protect intelligence information • Defines a process and establishes roles and responsibilities to deter, investigate and promptly report unauthorized disclosures, security violations, compromises of intelligence information • Ensures appropriate protective and corrective actions are taken Personnel Security

  12. Unauthorized Disclosure (cont) • Policy • To guard against, investigate report and redress unauthorized disclosures and other security violations • Continuously emphasize security and counterintelligence awareness • Promptly notify ODNI of any security violation, unauthorized disclosure of other compromise • Notification requirement includes persons deliberately disclosing classified information to the media – “leaks” • Includes classified information accidentally or intentionally disclosed across computer systems – “spills” Personnel Security

  13. What Should You Do? • Gather your facts • Report it immediately • Notify your immediate supervisor • Notify your security office Personnel Security

  14. Physical Security • Sensitive Compartmented Information Facility (SCIF) • Sole place for producing, processing, storing or discussing SCI • Only SCI approved persons are unescorted • Locked and alarmed when unattended • Classified talk stops at SCIF door Physical Security

  15. Information Systems Security • Information systems security is a significant IC concern • Information sharing is a significant government initiative Information Systems Security

  16. Critical to ISS • Configuration integrity critical for approved SCI systems • Media: declared and approved • “Once in the SCIF, always in the SCIF” • Security review prior to removal of any media or printed output Information Systems Security

  17. C!mePasu2 Password Protection • Passwords build security integrity • Protection Techniques • Memorize passwords • Do not share them • Use a smart password - see your ISSO • Combination of a minimum of 8 numbers, letters, special characters and capitalization • Change every six months Information Systems Security

  18. Viruses • Information Systems • Protection Techniques • Have ISSO scan incoming media • React to any virus suspicion • Notify ISSO or system administrator immediately Information Systems Security

  19. Telephone Communications • Non-Secure (Open) Telephones • No talking around classified information • Ensure classified conversations cannot be picked up by open line • Secure • Lots of colors – Red, Grey, Green • STUIII/STE • Key to common level • Telephone protocol - confirm to whom you are talking Information Systems Security

  20. Personal Electronic Devices • Electronic devices that can store, record and/or transmit digital text, digital image/video, or audio data. • May interact electrically or optically with other information systems in an accredited SCIF • Learn PED ground rules for the SCIFs you work in • See ISSO before introducing and PEDs into a SCIF Information Systems Security

  21. Internet Discipline • The Internet is an unclassified communication system • Do not “write around” classified subjects • The U.S. Government has invested significantly in classified information systems for the purpose of performing classified work • Use them! Information Systems Security

  22. Classification Management • Process for determining nature of information and assigning proper classification, markings, dissemination and declassification instructions • Required by EO 12958, as amended; Director of Central Intelligence Directives (DCIDs) • E.O. 12958 establishes 3 levels of classification • TOP SECRET: may cause exceptionally grave damage to national security • SECRET: may cause serious damage • CONFIDENTIAL: may cause damage Classification Management

  23. National Security Information • Military plans, weapons systems or operations • Foreign government information • Intelligence activities (including special activities), intelligence sources and methods or cryptology • Foreign relations or diplomatic activities of the US, including confidential sources • Scientific, technological or economic matters relating to national security, which includes defense against transnational terrorism • Program for safeguarding nuclear materials or facilities • Vulnerabilities or capabilities of systems, installations, infrastructures, projects/plans relating to national security • Foreign Government Information and weapons of mass destruction Classification Management

  24. UNCLASSIFIED Spies, Lies and Myths Espionage UNCLASSIFIED

  25. Espionage Since World War II • 151 persons convicted of espionage • 140 male/11 female • 100 government/51 non-government • Most held “Secret” clearances or above • Six million non-spies held clearances during the period • The latest case: Brian Regan

  26. Brian Regan “If I commit esponage (sic)I will be putting my self and family at great risk. If I am caught I will be enprisioned (sic) for the rest of my life, if not executed for this deed.” • In a letter to Saddam Hussein, Brian Regan demanded $13 million in exchange for providing data such as detailed information about US reconnaissance satellites

  27. Brian Regan Facts • USAF assignee to NRO (7/95 – 8/00) • Considered espionage in late 1998 to solve financial problems ($100,000+) • Began downloading from Intelink in 1999 • Removed 15,000 pages, CD-Roms and video tapes from NRO • Hired by TRW October 2000 • Brought back to NRO but monitored • Surfs Libya, Iraq and China on Intelink • Arrested/indicted/convicted (8/01 – 2/03) • (Attempted espionage and gathering national security information)

  28. Brian Regan’s Behavior • The Telltale Indicators • Deeply in debt • Worked odd hours • Foreign national spouse • Late nights in copy room • Non-reporter of foreign travel • “Top Fifty” user of Intelink

  29. Myths About Spies • Get rich • Are insane • Realize they are bad people • Consumed by guilt • Driven by excitement • Plan their final escape • Display deteriorating job performance • Show outwardly suspicious behavior • Caught by co-workers • Control their own destiny Source: www.fbi.gov and www.ncix.gov

  30. Sensitive Compartmented Information (SCI)A special category of national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems UNCLASSIFIED UNCLASSIFIED

  31. National Security Information

  32. National Security and SCI Protection Policies • National security policies • Come from National Security Council • In the name of President • As Executive Orders, Presidential or National Security Decision Directive • SCI protection policies • In name of DNI • as IC Directives (ICDs) formerly DCIDs • DNI SSC • Facilitated and coordinated rewrite of security series of ICDs Executive Orders; Presidential Decision Directives EO 12958 EO 12968 EO 12333 President George W. Bush DCID 6/3 DCID 6/4 DCID 6/9 DNI J. M. McConnell

  33. How We Collect Intelligence • Open Source Intelligence (OSINT) • Geospatial Intelligence (GEOINT) • Human Intelligence (HUMINT) • Signals Intelligence (SIGINT)

  34. Signals Intelligence (SIGINT) • Collecting verbal and nonverbal signals from land, sea and satellite • Protected within COMINT Control System managed by D/NSA • Categories: • Communications Intelligence (COMINT) • Electronic Intelligence (ELINT) • Foreign Instrumentation Signals Intelligence (FISINT)

  35. COMINT (SI) Control System • Special access program designed to protect signals intelligence • Named for first product it afforded protection: • COMINT (Communications intelligence) • Also called • Special Intelligence Control System • SI Control System • Its information is only available to holders of SI access approval • Managed by D/NSA

  36. COMINT (SI) Control System • The original SIGINT • Intercepted communications: • Telephone, email, fax, etc. • Still referred to as Special Intelligence or SI • Must protect • What was collected • How collection was accomplished – tactics, equipment • Intelligence implications • Degree of success • Plans and targets • Sharing with foreign partners

  37. TALENT-KEYHOLE (TK) Control System • SAP established by DCI for products from satellite reconnaissance (1960) • To protect most sensitive details of satellite collection capabilities and derived information • Consistent with EO 12333 and EO 12958 directing DCI to develop programs to protect intelligence sources and methods and analytical procedures

  38. TALENT-KEYHOLE (TK) Control System • Must protect • What’s being collected • Collection techniques • Intelligence implications • System effectiveness • Plans and targets • Operational information formerly known as “B” material • Operational, engineering and technical information

  39. Director, NSA/CSS SIGINT Program Signals Intelligence Security Regulations Director, CIA National Clandestine Service HUMINT Control System Manual Open Source Intelligence (OSINT) Center Director, NRO National Reconnaissance Program RESERVE Control System Manual Director, DIA GDIP MASINT Program MASINT Policy Series Executive Assistant Director, National Security Branch Counterterrorism Counterintelligence Director, NGA Geo-spatial Intelligence (GEOINT) Imagery Policy Series IC Program Managers

  40. A Changing World

  41. The Day That Changed The World… September 11, 2001 The Pentagon World Trade Center Shanksville, PA

  42. The Post 9/11 World “We will never be the same” • New threat matrix • Terrorism in forefront • Espionage still here • New Security perspectives • From nation states to threatening groups • Global view with moving targets • Focus on foreign involvements and influences • Hardening of facilities • Greater emphasis on information sharing • Analysis and risk management

  43. Today’s Delicate Balance INFORMATION PROTECTION (NEED TO KNOW) VS. INFORMATION SHARING (Criteria for Access)

  44. Global Warfare • Current state of affairs • The world's major intelligence agencies employ the latest technologies available in collection, communication and analysis of information from abroad • Counterintelligence agencies employ other technologies in efforts to identify and eliminate foreign spies at home Extracted from Spies in the Digital Age, H. Keith Melton

  45. Global Warfare • Some important changes to come • The primary targets of spies for all intelligence services have shifted • The traditional roles of "friends and foes" continue to blur • New technologies are changing the traditional methods and techniques (called "tradecraft") by which spies operate • Traditional tradecraft of spies are applied in new ways Extracted from Spies in the Digital Age, H. Keith Melton

  46. National Threats The single greatest threat to world peace in the early part of this century will be the utilization of weapons of mass destruction―nuclear, chemical, biological and digital―by fundamentalist terrorist organizations Extracted from Spies in the Digital Age, H. Keith Melton

  47. National Threats • Terrorist organizations are already using Internet to: • Recruit and communicate members with similar fundamentalist beliefs • Coordinate terrorist activities with other aligned groups that share interests in a common outcome • Raise money through computer based cyber-crime • Attack national information infrastructures of hostile countries from thousands of miles away Extracted from Spies in the Digital Age, H. Keith Melton

  48. The 911 Commission (2004) • Concluded we should: • Attack terrorist organizations • Curb growth of radical Islam • Prepare for and protect against terrorist attacks • Recommendations • Create a National Counterterrorism Center (NCTC) • Unify IC under a DNI • Strengthen FBI and homeland defenders • Unify and strengthen Congressional oversight DONE

  49. Intelligence Reform Act of 2004 • Establishes a Senate-confirmed Director of National Intelligence (DNI) • Re-designates the National Foreign Intelligence Program (NFIP) as the National Intelligence Program (NIP) DONE

  50. Director of National Intelligence (DNI) • Intelligence Reform and Terrorism Prevention Act of 2004 • Title 1, Reform of the Intelligence Community • Section 1001, Subtitle A, Establishment of the Director of National Intelligence

More Related