1 / 33

Initial Security Indoctrination

Initial Security Indoctrination. Agenda. Physical Security Personnel Security Information Security Information Assurance Public Release of Information Reporting Requirements Regulations. Your Facility Security Officer (FSO) is: Your Assistant Facility Security Officer is: Call anytime!.

donnel
Download Presentation

Initial Security Indoctrination

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Initial Security Indoctrination

  2. Agenda • Physical Security • Personnel Security • Information Security • Information Assurance • Public Release of Information • Reporting Requirements • Regulations

  3. Your Facility Security Officer (FSO) is: Your Assistant Facility Security Officer is: Call anytime! Your Facility Security Officer

  4. Security Message The United States Government classification system is established under Executive Order 13292 by President George W. Bush in 2003 which lays out the system of classification, declassification, and handling of national security information, generated by the United States Government, its employees and contractors, as well as information received from other governments. The protection of Government assets, people and property, both classified and controlled unclassified, is the responsibility of each and every employee, regardless of how it was obtained or what form it takes. Our vigilance is imperative in the protection of this information. Anyone with access to these resources has an obligation to protect them.

  5. Objective • This briefing will: • Identify your personal security responsibilities • Provide a basic understanding of DoD security policies • Explain the importance of protecting United States Government assets

  6. Why Security? • DoD Security Regulations, Directives, and Programs are established to counter threats • Threats to classified and unclassified government assets can include: • Insiders (employees, contractor employees, and authorized visitors) • Criminal and Terrorist Activities • Foreign Intelligence Services • Foreign Governments

  7. Physical Security Physical security includes, but is not limited to: • Employee and Visitor Access Controls (Badges) • Common Access Cards (CAC) • Intrusion Detection Systems • Prohibited item controls • Entry/Exit inspections • Escorting • Closed circuit video monitoring

  8. Individual Responsibility • You are responsible for: • Becoming familiar with local security regulations pertaining to your assigned duties • Notifying your FSO of changes in your status which could affect your security clearance

  9. Your Security Clearance • Your position and/or duties will determine your level of clearance or access • There are three levels of security clearance and access: • Top Secret • Secret • Confidential

  10. Classification of Data There are also three levels of Classification TOP SECRET Exceptionallygravedamage to the National Security SECRET Serious damage to the National Security CONFIDENTIAL Damage to the National Security

  11. Your Investigation and Clearance • All DoD Government and contractor personnel are subject to a background investigation • Investigations are conducted to determine suitability for a position of trust and/or granting of a security clearance • Your suitability for a security clearance is continually assessed

  12. CLEARANCE Administrative action, involving a form of background investigation and adjudication determination ACCESS SF 312 The ability and opportunity to obtain knowledge of classified information. This can involve seeing, hearing, or touching classified information, material, or equipment. Classified Information Nondisclosure Agreement: All persons authorized access to classified information are required to sign a SF 312, a legal contractual agreement between you and the United States Government. NEED TO KNOW Determination made by an authorized holder of classified information that a prospective recipient requires access to perform a lawful and authorized government function. Access to Classified Information + = +

  13. Information Security • Pertains to the protection of classified and sensitive information, to include but not limited to: • Marking • Handling • Transmission • Storage • Destruction

  14. Classified Material Examples of classified materials, all of which must be properly marked Machinery, Documents Emails, Models, Faxes Photographs, Reproductions Storage Media, Working Papers, Meeting Notes Sketches, Maps, Products, Substances, or Materials

  15. How Do I Identify Classified Documents? CONFIDENTIAL (C) SECRET (S) TOP SECRET (TS) ? All classified data must be appropriately marked to alert potential recipients to the information’s classification.

  16. All Classified Data • Must be under the control of or guarded by an authorized person or stored in a locked security container, vault, secure room, or secure area • Must be discussed only on secure telephones or sent via secure communications • Must be processed on approved equipment • Must be destroyed by approved methods • Must only be discussed in an area authorized for classified discussions.

  17. Information Assurance (IA) • In the performance of your duties, you may be required to have access to Government computer systems • Information Assurance protects and defends information and information systems by ensuring their availability, integrity, authenticity and confidentiality

  18. DoD IA Responsibilities • Complete annual IA training to include threat identification, physical security, acceptable use policies, malicious content and logic, and non-standard threats • Ensure compliance with password or pass-phrase policy directives for classified data

  19. Public Release of Information • Public release of Government information must first be approved by the FSO

  20. All Employees Must Report • Change of name, martial status or citizenship

  21. All Employees Must Report (cont) • Adverse events concerning themselves or a co-worker • Adverse events include, but are not limited to, recent arrests, alcohol or drug related problems, serious financial difficulties, etc.

  22. Report to Your FSO • In addition to personal contact or email, another option for reporting potential security issues is to use the link provided on our Intranet Page called “”

  23. Cleared Employees Must Report • Adverse information • Suspicious contacts • Change in name or citizenship • Any reluctance to support a classified program • Unauthorized receipt of classified data • Loss, compromise or suspected compromise of classified data, including evidence of tampering with a security container used for storage of classified data.

  24. Cleared Employees Must Report (cont) • All continuing contacts with foreign nationals, to include shared living quarters and marriage • Suspicious contacts with/by foreign nationals

  25. Cleared Employees Must Report (cont) • If a member of your immediate family (or your spouse’s immediate family) is a citizen or resident of a foreign country

  26. Cleared Employees Must Report (cont) • All foreign travel

  27. Cleared Employees Must Report (cont) • Any potential employment or service, whether compensated or volunteer, with a foreign government, foreign national, foreign organization, or other entity, or a representative of any foreign interest

  28. Cleared Employees Must Report (cont) • A lost or stolen badge or Common Access Card (CAC) immediately to the FSO

  29. Cleared Employees Must Report (cont) • Any information that might have a bearing on your continued eligibility for access to classified information

  30. Cleared Employees Must Report (cont) • Potential Espionage Indicators Exhibited by Others • Unexplained affluence • Keeping unusual work hours or excessive absences • Divided loyalty or allegiance to the United States • Disregarding security procedures • Unreported foreign contact and travel • Pattern of lying • Attempts to enlist others in illegal or questionable activity • Verbal or physical threats • Inquiry about operations/projects where no legitimate need to know exists • Unauthorized removal of classified information • Fraud/Waste/Abuse of credit cards and/or travel or training advances

  31. Impact of Not Reporting • Not reporting a known security violation may constitute a major security violation itself, regardless of the severity of the unreported incident. • Examples:

  32. YOU CAN MAKE A DIFFERENCE! • Security is a team effort . . . Your diligence in promptly reporting concerns and adhering to the security policies and procedures will help protect our war fighters, colleagues, and families from potential harm.

  33. CERTIFICATE Certificate of Completion This is to certify that I, _____________________,have completed the (Print Your Name) Initial Security Indoctrination Training Program. ____________________ ____________ Individual’s Signature Date ___________________ ____________ FSO’s Signature Date

More Related