1 / 0

Annual Security MCCS NEW RIVER

Basic Information and Personnel Security Anti-Terrorism & Force Protection Counter-Espionage Awareness. Annual Security MCCS NEW RIVER. Training in 3 Sections. Basic Information & Personnel Security Anti-Terrorism & Force Protection Counter-Espionage Awareness. Overall Objectives.

luka
Télécharger la présentation

Annual Security MCCS NEW RIVER

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Basic Information and Personnel Security Anti-Terrorism & Force Protection Counter-Espionage Awareness

    Annual SecurityMCCS NEW RIVER

  2. Training in 3 Sections Basic Information & Personnel Security Anti-Terrorism & Force Protection Counter-Espionage Awareness
  3. Overall Objectives Identify the requirements for maintaining a security clearance Recognize appropriate individual protective measures in a variety of circumstances, including travelling or living overseas Recognize espionage methods, practices and indicators
  4. Understanding Classified Information Basic Information & Personnel Security
  5. Objectives Identify the requirements to maintain clearance eligibility for access to Top Secret, Secret or Confidential materials. Identify 3 major requirements for access to classified material. Recognize possible security risks. Recognize the difference between original and derivative classifications. Identify proper procedures for transporting or discussing classified materials.
  6. Classified Information As a civilian, military member or contractor you may need access to information that is classified in order to perform your job duties. Classified Information is any information that would damage national security if it was released. All classified material must be handled with care. 3 levels of classification
  7. 3 Levels of Classification Top Secret- exceptionally grave danger to national security. Secret- serious damage to national security. Confidential- damage to national security.
  8. Obtaining Security Clearance If you require access to classified information to perform your job duties you must obtain and maintain security clearance at the appropriate level. You must submit a questionnaire- request for personnel security investigation. DoN determines eligibility based on background check,including credit.
  9. Maintaining Security Clearance Financials are the most common reason for delay, denial or revocation of security clearance. Do not allow your clearance to lapse. Once granted you must maintain your clearance by following rules and submitting to periodic reinvestigation: Top Secret -5 years Secret- 10 years Confidential- 15 years.
  10. Clearance Eligibility Individuals with a security clearance eligibility may see information at that level or below.
  11. Eligibility vs. Entitlement Security Clearance grants eligibility to classified information, not automatic access. Must meet 3 key criteria: Valid Clearance eligibility Demonstrated Need to Know SF-312 non-disclosure agreement Transferred employees keep eligibility, but must obtain new access based on their need to know.
  12. Continuous Evaluation Program Every individual is expected to report any information that could affect continued eligibility for a security clearance.
  13. Review Break How often does clearance need to be re-obtained? What are the 3 requirements to access classified information? What should you do if you hold a security clearance and find yourself in debt?
  14. Should these be reported? A coworker downloading pornography at work? A low ranking government employee driving a new Mercedes and buying a yacht? An employee diagnosed with maniac depression? An employee who refuses to cooperate on a security investigation? An employee who befriends a foreign born neighbor who is overly curious about his work? An employee who takes up tennis or hiking to relieve his stress?
  15. Should these be reported? A coworker downloading pornography at work? Yes. A low ranking government employee driving a new Mercedes and buying a yacht? Yes. An employee diagnosed with maniac depression? Yes. An employee who refuses to cooperate on a security investigation? Yes. An employee who befriends a foreign born neighbor who is overly curious about his work? Yes. An employee who takes up tennis or hiking to relieve his stress? No.
  16. Classifying Information Original Classifying Authorities (OCAs) are individuals specifically trained and delegated to classify information. Analysts and others may incorporate, paraphrase, restate, or develop new conclusions based on already classified information– This is derivative classification. Any derivative information must be classified at (at least) the same level as the originally classified information.
  17. Hard Copy Tracking of Printed Classified Materials Classified information that has been printed or downloaded to portable media is more easily compromised. To avoid mishandling and errors, all classified information is tracked: Cover pages are color coded Any documents at or above Top Secret are inventoried.
  18. Color Coded Cover Pages Confidential= Blue Secret = Red Top Secret= Orange
  19. Transporting Classified Info Even if you meet all three criteria and have access to classified information, you may not transport it. Must have specific authorization in writing (even if you possess a courier card) All information must be double wrapped.
  20. Spillage “Spillage” occurs any time classified information is introduced to an unclassified network or workstation. To prevent this classified documents may only be transmitted over a secure network (SIPRNET) and it is the sender’s responsibility to ensure each recipient has proper authorization to receive the information.
  21. Reporting Compromised Info The moment you suspect classified information may have been compromised, you must report it immediately. It does not matter how, why or by whom it was compromised.
  22. Any Questions?
  23. Staying Safe at Home & Abroad Anti-Terrorism & Force Protection
  24. Why Are We Discussing This? As a DoD employee, you could be a target. DoD personnel is generally easy to identify. Largest grouping of Government workers Symbols of the US government and strength. As an employee at a military installation, the Depot could be a target. September 11, 2001 proved no one is 100% safe.
  25. DoD Definition of Terrorism “The calculated use of violence or threat of violence to inculcate fear, intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious or ideological.”
  26. On the Depot Understand Force Protection Cons Normal Alpha Bravo Charlie Delta Obey instructions. If you are instructed to go to your car and leave, do it. If you are instructed to get out, leave immediately– do not try to collect your belongings. If you are not allowed on base, leave quickly and call in to report to management.
  27. Be Aware of Your Surroundings Notice and report suspicious activity. Notice and report suspicious items. Who to notify: Your supervisor Provost Marshal’s Office (PMO) 524-4202
  28. Vehicle Safety Maintain your vehicle– you want it to go when it should go. Gas tank half-full– no time to stop for gas. Locking gas cap Bolt through the tailpipe Walk around inspection
  29. Don’t Make Yourself A Target! Discretion is the better part of valor. No matter where you are, try to blend in. Be vague when discussing your job. Don’t wear your ID off duty. Be aware of anyone who may overhear.
  30. Best Practices at Home No name on mailbox or house. Answering the phone. Unlisted phone number. Screen and shred trash. Advise children not to discuss your job. Advise school officials. Alter your routines to everywhere. Routes to and from Times you arrive, depart
  31. Travelling Abroad Learn about where you are travelling. CIA Factbook- http://www.odci.gov/cia/publications/factbook Dept of State- http://www.travel.state.gov Seek to blend in Clothing Behavior Don’t identify yourself Be vague about your job, no work in public, keep passport out of sight.
  32. Best Practices for Air Travel Don’t go where it isn’t safe. Remove DoD identification from luggage. Get quickly to secured areas in airports or hotels. Ask for a window seat, near the middle of the plane. Find a hiding place for government IDs, but don’t lie if asked directly. Stay back and wait at the baggage claim.
  33. Best Practices at Destination Be on the lookout for surveillance. No one around = Not good situation. Stay above the second floor but below the eighth. Leave lights and TV on when out. Park in a secure area. Plan your escape routes. Have contact information and maps to the embassy.
  34. Any Questions?
  35. Recognizing and Reporting Spies in your Midst Counter-Espionage Awareness
  36. Objectives Identify types of people and organizations likely to conduct espionage against the US. Recognize circumstances & situations that allow sources to be targeted and recruited. Recognize indicators that espionage may be occurring. Identify behaviors & activities that must be reported.
  37. In Layman’s Terms Espionage is spying. Counter-Espionage is spying on the spies. For the DoN and Marine Corps, this is done by NCIS.
  38. Supervisory Special Agent Robert Hanssen, FBI Spied for USSR/Russia Compromised top secret programs and named 3 KGB counteragents- 2 were executed. Received $1.4M in cash and diamonds Sentenced to Life in Prison w/o Parole
  39. Col. George Trofimoff, Army Reserve Spied for USSR/Russia Sold classified documents. Recruited by a childhood friend. Received $250K over 25 years. Sentenced to Life in Prison
  40. Sgt. Clayton J. Lonetree, USMC Spied for USSR/Russia Named covert agents and sold floor plans to US embassies Spied for Russian girlfriend and $3,600 Sentenced to 30 years
  41. MstSgt Brian P. Regan, USAF In debt $116K Offered to sell US satellite images to Iraq and China for $13M Sentenced to Life in Prison w/o Parole
  42. Ana Belen Montes, Sr. Analyst, Defense Intelligence Agency Spied for Cuba Relayed Top Secret information via shortwave radio Named 4 US agents in Cuba Loved Cuba and hated US policy. Sentenced to 25 years.
  43. Four Primary Intelligence Sources Open- news, computer, trash, etc. Human- willing, pressured, accidental. Signals- Telephone, Radio, Other Satellite Imagery
  44. Who Might Want to Spy on Us? Foreign Governments Adversaries Allies Econ. Competitors Terrorists Foreign Companies International Organized Crime
  45. What Might They Want to Know? Intelligence Military Strength and Readiness System Capabilities Security Procedures Economic Information Research & Development Technology
  46. Who Might They Target? Anyone who has access to information they want People with vulnerabilities Involved in illegal activities Indiscrete sexual activities Substance abuse People with financial problems People with attitude or ego issues Disgruntled employees Unwarranted high self esteem Low self esteem
  47. Who Else Might They Target? People living or working abroad People with commonalities Ideology Social views Religion Ethnicity Sympathetic
  48. Steps to Securing the Target Identify the target Assess the target Collect information on the target Re-assess the target Use info, commonalities and sympathies to make the pitch. 64% of convicted spies volunteered to spy!!!
  49. Other Techniques to Secure Info Requesting Information Unclassified information can be aggregated. Sending Visitors Flying a False Flag Foreign Companies are actually intelligence gathering fronts. Buying Companies Hiring Consultants Attending Conventions
  50. Avoid Becoming A Target Keep your private information private. Don’t post PII online. Shred documents with PII. Don’t have your name on the mailbox. Don’t answer home phone with name and rank. Protect your PII– Avoid Identity Theft. Avoid the possibility of blackmail Avoid compromising situations. Report unavoidable circumstances.
  51. If You Are Approached Be non-committal Don’t say “No”, this buys time for investigators Be observant Note the who, what, where, when, why and how. Don’t discuss it w/ anyone other than NCIS. You don’t know who may be involved. NCIS Contact (202)433-3858
  52. Indicators of Possible Espionage Unexplained Affluence Unexplained Work Hours Attempts to obtain information without a “need to know” Unauthorized removal of classified info Unreported foreign contacts Unreported foreign travel
  53. Any Questions?
  54. Quick Review What are the 4 main types of intelligence gathering? Which is most important/ dangerous? If you are approached by an espionage recruiter, what 3 steps should you take?
  55. Quick Review What are the 4 main types of intelligence gathering? Open, Human, Signals, Satellite Which is most important/ dangerous? Trick Question- They can all be dangerous when aggregated. If you are approached by an espionage recruiter, what 3 steps should you take? Be non-committal, be observant, report directly to NCIS.
  56. Congratulations!!!! You have successfully completed Annual Security Training for MCRD MCCS! If you would like additional information on any of these topics you can visit: http://www.ncis.navy.mil/
  57. UNITED STATES MARINE CORPS MARINE CORPS COMMUNITY SERVICES Certificate of Training This is to certify that NAME NAME HAS SATISFACTORILY COMPLETED USMC Annual Security / Counter Espionage Training at MCAS New River, North Carolina XXXXXXXX XXXXX Employee ID # Date
More Related