Saturday, March 21, 2009

PRIMER-OPSEC (Operational Security) For Stake Holder Communities

The NRC is failing miserably in doing their job of protecting host communities from the potential risks of a successful terrorist attack on a nuclear reactor. Setting aside the WATERED DOWN DBT they are relying upon, their hiding of it from the public is putting us at risk. Their refusal to educate us about OPSEC, their refusal to speak to Host Communities about SECURITY RELATED issues puts us at risk...in short, they are perpetuating stupidity, ruining opportunity to have the public in stake holder communities as their allies. To help compensate for their ignorance through arrogance, GNU has scoured the web and came across some great things at a NASA OPSEC site on security, and what you as a person living in the circle of death around Indian Point should know...who knows, studying our primer, visiting the links might help you one day report suspicious activity that saves us all.

The NRC is failing miserably in doing their job of protecting host communities from the potential risks of a successful terrorist attack on a nuclear reactor. Setting aside the WATERED DOWN DBT they are relying upon, their hiding of it from the public is putting us at risk. Their refusal to educate us about OPSEC, their refusal to speak to Host Communities about SECURITY RELATED issues puts us at risk...in short, they are perpetuating stupidity, ruining opportunity to have the public in stake holder communities as their allies. To help compensate for their ignorance through arrogance, GNU has scoured the web and came across some great things at a NASA OPSEC site on security, and what you as a person living in the circle of death around Indian Point should know...who knows, staking our primer, visiting the links might help you one day report suspicious activity that saves us all.
imageProtecting
Sensitive

Protecting Sensitive Unclassified Information


Overview

The term sensitive unclassified information as used here is an informal designation applicable to all those types and forms of information that, by law or regulation, require some form of protection but are outside the formal system for classifying national security information.1 As a general rule, all such information may be exempt from release to the public under the Freedom of Information Act. This module reviews the most common types of sensitive unclassified information.2 Again, this is a designation being used far to frequently just because certain people want the general public kept in the dark...Transparancy is a good thing.

Department of Defense also uses the term Controlled Unclassified Information (CUI) to refer to certain types of sensitive information within DoD that require controls and protective measures. CUI includes For Official Use Only and information with comparable designations that is received from other agencies, DoD Unclassified Controlled Nuclear Information, "Sensitive Information" as defined in the Computer Security Act of 1987, and DoD technical data.3

Some information that is not formally designated as sensitive is nonetheless inappropriate for putting on a public Internet site. This is discussed in Pre-Publication Review of Public Web Site Content.

Most categories of sensitive unclassified information are defined by federal law, while others such as For Official Use Only are defined by organization policy and some government organizations use different names for this category of information. Most legislative authorities are very specific in identifying the protected category of information, while others are general and leave much discretion to the agency or company.

Procedures for safeguarding sensitive unclassified information depend upon the category of information and, in some cases, vary from one agency or company to another.

Personal Conduct and
Reporting Requirements

Standards of Personal Conduct
What is expected of me? Examples of behavior of potential security concern. Guidelines for adjudicating security clearances.

Self-Reporting on Your Personal Activities
Reporting foreign contacts, foreign travel, intent to marry or cohabitate, financial and substance abuse issues, certain outside activities, etc. Pre-publication review. Reporting foreign intelligence activities.

Reporting Improper, Unreliable, or Suspicious Behavior
Reporting responsibilities. Counterintelligence indicators. Security and suitability issues. Preventing violence. No good excuses for not reporting. Examples of how people like you made a difference. Hot line phone numbers.

U.S. Government Ethics Standards
Gifts. Frequent Flyer Benefits. Impartiality. Misuse of Position. Financial Interests. Outside Activities. Post-Employment Limitations.

Foreign Threats
To Protected Information

Who's Doing What to Whom?
Economic collection and industrial espionage. Illegal technology transfer. Computer crime. National Security Threat List. Militarily Critical Technologies List. Economic Espionage Act of 1996.

How Do I Know When I'm Being Targeted and Assessed?
Recognizing the spotting - assessment - recruitment process used by all intelligence services. Who is most likely to be targeted.

Getting Information Out of Honest People Like Me
Elicitation. Unsolicited requests. False pretenses. Short-term foreign visitors. Long-term foreign visitors. Joint ventures/foreign acquisitions. Open source collection. Theft and dumpster diving.

Risks During Foreign Travel
Country threat updates. Security and safety recommendations. Avoiding/recognizing intelligence interest. Contact with foreign relatives. Vulnerability to theft, bugging, communications intercept. Reporting security incidents. What to do if arrested.

Antiterrorism and Force Protection
Living and traveling outside the U.S. Defensive driving overseas. Package and letter bombs. Kidnapping and hostage survival guidelines. Hijacking survival guidelines. DOD Code of Conduct.

Computer and Other
Technical Vulnerabilities

Computer Vulnerabilities
Threats to computer security, how hackers work, and how we unintentionally make it easy for them. Passwords, "social engineering," case studies, using the Internet securely, e-mail, viruses, security of hard drives, theft of laptop computers.

Intercepting Your Communications
Telephones, fax machines, cell phones, cordless phones, answering machines, voice mail, intercoms and baby monitors, countermeasures.

Bugs and Other Eavesdropping Devices
Eavesdropping threat. Methods of eavesdropping. Detecting and Preventing Eavesdropping.

image
Reporting Improper, Unreliable, & Suspicious Behavior

bar

Reporting Responsibilities

If you are entrusted with safeguarding classified material, you are expected to report potentially significant, factual information that comes to your attention and that raises potential security concerns about a co-worker. You are also strongly encouraged to help co-workers who are having personal problems that may become a security issue if the problems are not addressed.

Presidential Executive Order 12968 on "Access to Classified Information" states: "Employees are encouraged and expected to report any information that raises doubts as to whether another employee's continued eligibility for access to classified information is clearly consistent with the national security." It states further that the head of each agency that grants access to classified information shall establish a program to educate employees with access to classified information about their individual responsibilities under this order.1 This security guide meets that requirement.

The information presented under Counterintelligence Indicators, Security and Suitability Issues, Preventing Violence, and Suicide Crisis Intervention is background information to help you judge whether a co-worker’s behavior raises concerns that merit reporting to an appropriate authority.

Related Topics: Exploring the Mind of the Spy, Treason 101, Spy Stories

Reference
1. Director of Central Intelligence Directive 6/4 also imposes an "obligation to report to proper authorities any information which could reflect on the trustworthiness of an individual who has access to SCI."

imageTreason 101

Treason 101

bar
Overview

Your short course in Treason is a series of articles on how spies are caught, the prevalence of espionage, and why people spy.

It starts with a short piece on How Spies Are Caught. That comes first, as it is so important for anyone who may be considering espionage to understand that they WILL be caught. Perhaps not right away, but eventually. The statute of limitations does not apply to the crime of espionage. Anyone who commits this crime will have to be looking over their shoulder for the rest of their life.

The Insider Espionage Threat identifies four conditions that must exist before espionage occurs – opportunity to commit the crime; motive; ability to overcome inhibitions such as moral values, fear of being caught, and loyalty to employer or co-workers; and a trigger that sets the betrayal in motion. The article then analyzes how these pre-conditions for betrayal are increasing as a result of changes in social and economic conditions in the United States, and in our relations with the rest of the world.

Explosive growth in information technology is increasing exponentially the amount of information that can be collected and compromised by a single, well-placed spy. Insider Threat to Information Systems examines some of the unique security issues associated with computer professionals.

Exploring the Mind of the Spy discusses what psychologists have learned by interviewing and testing arrested and convicted American spies. Motivations for espionage are far more complex than commonly believed. Selling secrets is usually the last act of a long-simmering emotional crisis. In many cases, the symptoms of this crisis have been observable, identifiable, and even treatable before the damage was done. Typically, however, the potential significance of the "at-risk" behavior has not been recognized or reported at the time by coworkers or supervisors.

Espionage by the Numbers describes an unclassified database on all Americans arrested for espionage since the start of the Cold War. Based on media reports, trial records and unclassified official documents, the data base records information characteristics of the spies, characteristics of the espionage activity, and prevalence among the spies of several behaviors that are commonly associated with security risk.

Counterintelligenceimage - fish
If a story smells fishy, it probably is fishy!

Counterintelligence Indicators

Counterintelligence indicators are signs that an individual may already be involved in espionage or other improper use of classified information. The record of past espionage cases shows that co-workers and supervisors often overlooked or failed to report counterintelligence indicators which, had they been reported, would have permitted earlier detection of the spy.

Some of the following indicators are clear evidence of improper behavior. Others may well have an innocent explanation but are sufficiently noteworthy that your security office should be informed. If you become aware that any of the following indicators apply to one of your co-workers, you are expected to report this information directly to your security office or a counterintelligence office, or by calling any one of the Hotline Numbers that various organizations have set up for this purpose.

The security office will evaluate the information in the context of all other information known about the individual. Depending upon the circumstances, action may range from simply making a note in the individual's security file to conducting a discrete investigation.

If your reporting helps stop a case of espionage, you may be eligible for a reward of up to $500,000. The reward is authorized by an amendment to Title 18, U.S.C., Section 3071, which authorizes the Attorney General to make payment for information on espionage activity in any country which leads to the arrest and conviction of any person(s):

  • For commission of an act of espionage against the United States.
  • For conspiring or attempting to commit an act of espionage against the United States
  • Or which leads to the prevention or frustration of an act of espionage against the United States.

Reportable Indicators

bullet Indicators of Potential Motivation

  • Disgruntlement with one's employer or the U.S. Government strong enough to make the individual desire revenge.
  • Any statement that, considering who made the statement and under what circumstances, suggests potential conflicting loyalties that may affect handling of classified or other protected information
  • Active attempt to encourage military or civilian personnel to violate laws, disobey lawful orders or regulations, or disrupt military activities.
  • Knowing membership in, or attempt to conceal membership in, any group which: 1) advocates the use of force or violence to cause political change within the U.S., 2) has been identified as a front group for foreign interests, or 3) advocates loyalty to a foreign interest.
  • Repeated statements or actions indicating an abnormal fascination with and strong desire to engage in "spy" work. Fantasies of oneself as a James Bond.

bullet Potential Indicators of Information Collection

  • Asking others to obtain or facilitate access to classified or unclassified but protected information to which one does not have authorized access.
  • Obtaining or attempting to obtain a witness signature on a classified document destruction record when the witness did not observe the destruction.
  • Offering extra income from an outside activity to a person with a sensitive job, in an apparent attempt to entice that person into some unspecified illegal activity.
  • Undue curiosity or requests for information about matters not within the scope of the individual’s job or need-to-know.
  • Unauthorized removal or attempts to remove classified, export-controlled, proprietary or other protected material from the work area.
  • Retention of classified, export-controlled, proprietary, or other sensitive information obtained at a previous employment without the authorization or the knowledge of that employer.
  • Extensive use of copy, facsimile, or computer equipment to reproduce or transmit classified, sensitive, or proprietary material which may exceed job requirements.

cartoon

  • Taking classified materials home or on trips, purportedly for work reasons, without proper authorization.
  • Working odd hours when others are not in the office without a logical reason, or visiting work areas after normal hours for no logical reason.
  • Bringing cameras or recording devices, without approval, into areas storing classified or other protected material.

bullet Potential Indicators of Information Transmittal

  • Storing classified material at home or any other unauthorized place.
  • Short trips to foreign countries, or within the U.S. to cities with foreign diplomatic facilities, for unusual or unexplained reasons, or that are inconsistent with one’s apparent interests and financial means.
  • Excessive and/or unexplained use of e-mail or fax.
  • Failure to comply with regulations for reporting foreign contacts or foreign travel. Any attempt to conceal foreign travel or to conceal close and continuing contact with a foreigner, particularly a foreign official.
  • Foreign travel not reflected in the individual’s passport to countries where entries would normally be stamped.
  • Maintaining ongoing personal contact, without prior approval, with diplomatic or other representatives from countries with which one has ethnic, religious, cultural or other emotional ties or obligations, or with employees of competing companies in those countries.

bullet Potential Indicators of Illegal Income

  • Unexplained affluence, or life-style inconsistent with known income. Includes sudden purchase of high-value items or unusually frequent personal travel which appears to be beyond known income. Sudden repayment of large debts or loans, indicating sudden reversal of financial difficulties.
  • Joking or bragging about working for a foreign intelligence service, or having a mysterious source of income.

bullet Other Potential Indicators

  • Behavior indicating concern that one is being investigated or watched, such as actions to detect physical surveillance, searching for listening devices or cameras, and leaving "traps" to detect search of the individual’s work area or home.
  • Any part-time employment or other outside activity that may create a conflict of interest with one's obligation to protect classified or other sensitive information, and that has not been approved by the security office.
  • Attempt to conceal any activity covered by one of these counterintelligence indicators.

No comments:

Post a Comment