Basic Information and Personnel Security Anti-Terrorism & Force Protection Counter- Awareness Training in 3 Sections

 Basic Information & Personnel Security

 Anti-Terrorism & Force Protection

 Counter-Espionage Awareness Overall Objectives

 Identify the requirements for maintaining a security clearance  Recognize appropriate individual protective measures in a variety of circumstances, including travelling or living overseas  Recognize espionage methods, practices and indicators Understanding Objectives

 Identify the requirements to maintain clearance eligibility for access to Top Secret, Secret or Confidential materials.  Identify 3 major requirements for access to classified material.  Recognize possible security risks.  Recognize the difference between original and derivative classifications.  Identify proper procedures for transporting or discussing classified materials. Classified Information

 As a civilian, military member or contractor you may need access to information that is classified in order to perform your job duties.  Classified Information is any information that would damage if it was released.  All classified material must be handled with care.  3 levels of classification 3 Levels of Classification

 Top Secret- exceptionally grave danger to national security.

 Secret- serious damage to national security.

 Confidential- damage to national security. Obtaining Security Clearance

 If you require access to classified information to perform your job duties you must obtain and maintain security clearance at the appropriate level.  You must submit a questionnaire- request for personnel security investigation.  DoN determines eligibility based on background check, including credit. Maintaining Security Clearance

 Financials are the most common reason for delay, denial or revocation of security clearance.  Do not allow your clearance to lapse.  Once granted you must maintain your clearance by following rules and submitting to periodic reinvestigation:  Top Secret -5 years  Secret- 10 years  Confidential- 15 years. Clearance Eligibility

 Individuals with a security clearance eligibility may see information at that level or below.

Top Secret Top Secret Secret Classified

Secret Secret Classified

Classified Classified Eligibility vs. Entitlement

 Security Clearance grants eligibility to classified information, not automatic access.  Must meet 3 key criteria:  Valid Clearance eligibility  Demonstrated Need to Know  SF-312 non-disclosure agreement  Transferred employees keep eligibility, but must obtain new access based on their need to know. Continuous Evaluation Program

 Every individual is expected to report any information that could affect continued eligibility for a security clearance.

Activities to Overthrow Dual Non- Citizenship compliance Association with rules with Foreign and Illegal drugs Nationals regulations Loyalty Issues Criminal Misuse of conduct Excessive Information Inappropriate indebtedness

Tech. Trust/Reliability sexual Systems Unexplained conduct affluence Conflicts of Mental Interest disorders Financial Issues Judgment/ Personal Issues Review Break

 How often does clearance need to be re-obtained?  What are the 3 requirements to access classified information?  What should you do if you hold a security clearance and find yourself in debt? Should these be reported?

 A coworker downloading pornography at work?  A low ranking government employee driving a new Mercedes and buying a yacht?  An employee diagnosed with maniac depression?  An employee who refuses to cooperate on a security investigation?  An employee who befriends a foreign born neighbor who is overly curious about his work?  An employee who takes up tennis or hiking to relieve his stress? Should these be reported?

 A coworker downloading pornography at work? Yes.  A low ranking government employee driving a new Mercedes and buying a yacht? Yes.  An employee diagnosed with maniac depression? Yes.  An employee who refuses to cooperate on a security investigation? Yes.  An employee who befriends a foreign born neighbor who is overly curious about his work? Yes.  An employee who takes up tennis or hiking to relieve his stress? No. Classifying Information

 Original Classifying Authorities (OCAs) are individuals specifically trained and delegated to classify information.

 Analysts and others may incorporate, paraphrase, restate, or develop new conclusions based on already classified information– This is derivative classification.

 Any derivative information must be classified at (at least) the same level as the originally classified information. Hard Copy Tracking of Printed Classified Materials  Classified information that has been printed or downloaded to portable media is more easily compromised.  To avoid mishandling and errors, all classified information is tracked:  Cover pages are color coded  Any documents at or above Top Secret are inventoried. Color Coded Cover Pages

Confidential Secret Top Secret

 Confidential= Blue  Secret = Red  Top Secret= Orange Transporting Classified Info

 Even if you meet all three criteria and have access to classified information, you may not transport it.  Must have specific authorization in writing (even if you possess a courier card)  All information must be double wrapped. Spillage

 “Spillage” occurs any time classified information is introduced to an unclassified network or workstation.  To prevent this classified documents may only be transmitted over a secure network (SIPRNET) and it is the sender’s responsibility to ensure each recipient has proper authorization to receive the information. Reporting Compromised Info

 The moment you suspect classified information may have been compromised, you must report it immediately.

 It does not matter how, why or by whom it was compromised. Any Questions? Staying Safe at Home & Abroad Why Are We Discussing This?

 As a DoD employee, you could be a target.  DoD personnel is generally easy to identify.  Largest grouping of Government workers  Symbols of the US government and strength.

 As an employee at a military installation, the Depot could be a target.

 September 11, 2001 proved no one is 100% safe. DoD Definition of Terrorism “The calculated use of violence or threat of violence to inculcate fear, intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious or ideological.” On the Depot

 Understand Force Protection Cons  Normal  Alpha  Bravo  Charlie  Delta

 Obey instructions.  If you are instructed to go to your car and leave, do it.  If you are instructed to get out, leave immediately– do not try to collect your belongings.  If you are not allowed on base, leave quickly and call in to report to management. Be Aware of Your Surroundings

 Notice and report suspicious activity.

 Notice and report suspicious items.

 Who to notify:  Your supervisor  Provost Marshal’s Office (PMO) 830-6800 Vehicle Safety

 Maintain your vehicle– you want it to go when it should go.

 Gas tank half-full– no time to stop for gas.

 Locking gas cap

 Bolt through the tailpipe

 Walk around inspection Don’t Make Yourself A Target!

 Discretion is the better part of valor.

 No matter where you are, try to blend in.

 Be vague when discussing your job.

 Don’t wear your ID off duty.

 Be aware of anyone who may overhear. Best Practices at Home

 No name on mailbox or house.  Answering the phone.  Unlisted phone number.  Screen and shred trash.  Advise children not to discuss your job.  Advise school officials.  Alter your routines to everywhere.  Routes to and from  Times you arrive, depart Travelling Abroad

 Learn about where you are travelling.  CIA Factbook- http://www.odci.gov/cia/publications/factbook  Dept of State- http://www.travel.state.gov  Seek to blend in  Clothing  Behavior  Don’t identify yourself ○ Be vague about your job, ○ no work in public, ○ keep passport out of sight. Best Practices for Air Travel

 Don’t go where it isn’t safe.  Remove DoD identification from luggage.  Get quickly to secured areas in airports or hotels.  Ask for a window seat, near the middle of the plane.  Find a hiding place for government IDs, but don’t lie if asked directly.  Stay back and wait at the baggage claim. Best Practices at Destination

 Be on the lookout for surveillance.  No one around = Not good situation.  Stay above the second floor but below the eighth.  Leave lights and TV on when out.  Park in a secure area.  Plan your escape routes.  Have contact information and maps to the embassy. Any Questions? Recognizing and Reporting Spies in your Midst Objectives

 Identify types of people and organizations likely to conduct espionage against the US.  Recognize circumstances & situations that allow sources to be targeted and recruited.  Recognize indicators that espionage may be occurring.  Identify behaviors & activities that must be reported. In Layman’s Terms

 Espionage is spying.

 Counter-Espionage is spying on the spies. For the DoN and Marine Corps, this is done by NCIS. Supervisory Special Agent Robert Hanssen, FBI

 Spied for USSR/Russia  Compromised top secret programs and named 3 KGB counteragents- 2 were executed.  Received $1.4M in cash and diamonds  Sentenced to Life in Prison w/o Parole Col. George Trofimoff, Army Reserve

 Spied for USSR/Russia  Sold classified documents.  Recruited by a childhood friend.  Received $250K over 25 years.  Sentenced to Life in Prison Sgt. Clayton J. Lonetree, USMC

 Spied for USSR/Russia  Named covert agents and sold floor plans to US embassies  Spied for Russian girlfriend and $3,600  Sentenced to 30 years Mst Sgt Brian P. Regan, USAF

 In debt $116K  Offered to sell US satellite images to Iraq and China for $13M  Sentenced to Life in Prison w/o Parole Ana Belen Montes, Sr. Analyst, Defense Intelligence Agency

 Spied for Cuba  Relayed Top Secret information via shortwave radio  Named 4 US agents in Cuba  Loved Cuba and hated US policy.  Sentenced to 25 years. Four Primary Intelligence Sources

 Open- news, computer, trash, etc.

 Human- willing, pressured, accidental.

 Signals- Telephone,  Satellite Imagery Radio, Other Who Might Want to Spy on Us?

 Foreign Governments

Adversaries Allies Econ. Competitors  Terrorists

 Foreign Companies

 International Organized Crime What Might They Want to Know?

 Intelligence  Military Strength and Readiness  System Capabilities  Security Procedures  Economic Information  Research & Development  Technology Who Might They Target?

 Anyone who has access to information they want  People with vulnerabilities ○ Involved in illegal activities ○ Indiscrete sexual activities ○ Substance abuse  People with financial problems  People with attitude or ego issues ○ Disgruntled employees ○ Unwarranted high self esteem ○ Low self esteem Who Else Might They Target?

 People living or working abroad

 People with commonalities  Ideology  Social views  Religion  Ethnicity  Sympathetic Steps to Securing the Target

 Identify the target  Assess the target  Collect information on the target  Re-assess the target  Use info, commonalities and sympathies to make the pitch.  64% of convicted spies volunteered to spy!!! Other Techniques to Secure Info

 Requesting Information  Unclassified information can be aggregated.  Sending Visitors  Flying a False Flag  Foreign Companies are actually intelligence gathering fronts.  Buying Companies  Hiring Consultants  Attending Conventions Avoid Becoming A Target

 Keep your private information private.  Don’t post PII online.  Shred documents with PII.  Don’t have your name on the mailbox.  Don’t answer home phone with name and rank.  Protect your PII– Avoid Identity Theft.  Avoid the possibility of blackmail  Avoid compromising situations.  Report unavoidable circumstances. If You Are Approached

 Be non-committal  Don’t say “No”, this buys time for investigators  Be observant  Note the who, what, where, when, why and how.  Don’t discuss it w/ anyone other than NCIS.  You don’t know who may be involved. NCIS Contact 760-830-6275 Indicators of Possible Espionage

 Unexplained Affluence  Unexplained Work Hours  Attempts to obtain information without a “need to know”  Unauthorized removal of classified info  Unreported foreign contacts  Unreported foreign travel Any Questions? Quick Review

 What are the 4 main types of intelligence gathering?

 Which is most important/ dangerous?

 If you are approached by an espionage recruiter, what 3 steps should you take? Quick Review

 What are the 4 main types of intelligence gathering?  Open, Human, Signals, Satellite  Which is most important/ dangerous?  Trick Question- They can all be dangerous when aggregated.  If you are approached by an espionage recruiter, what 3 steps should you take?  Be non-committal, be observant, report directly to NCIS. Congratulations!!!!

 You have successfully completed Annual Security Training for MCAGCC MCCS!

 Please be sure you have signed in to get credit for attending this class.

 If you would like additional information on any of these topics you can visit: http://www.ncis.navy.mil/