Title: Information Security Orientation
1Information Security Orientation
2Purpose
- Produce a basic understanding of the nature of
classified information and the importance of its
protection to the national security. - Place employees on notice of their responsibility
to play a role in the Information Security
Program. - Provide enough information to ensure proper
protection of classified/sensitive information in
their possession.
3Information Security Regulations
- AR 380-5 Department of the Army Information
Security Program, 29 SEP 00
4The Nature of U.S. and Foreign Government
Classified Information
- Information is classified, or protected as
sensitive, when it is in the interests of
national security. - Classified or sensitive information requires
protection against unauthorized disclosure to
safeguard national security.
5Categories of Classified Information
- Military plans, weapons systems, or operations.
- Foreign government information.
- Intelligence activities, intelligence sources or
methods, and cryptology. - Foreign relations or foreign activities of the
United States including confidential sources. - Scientific, technological, or economic matters
relating to the national security. - United States programs safeguarding nuclear
materials or facilities.
6Categories of Classified Information
- Vulnerabilities or capabilities of systems,
installations, projects or plans relating to
national security.
7Classification Principles
- Original Classification is the decision to
designate a certain item of information as
classified, at a particular level, and for a
certain duration of time. This decision can only
be made by an Original Classification Authority. - Derivative Classification is the incorporating,
restating, paraphrasing, or generating in new
form, information that has already been
classified and ensuring that it is classified and
handled at the level the Original Classification
Authority has already determined will be done.
8Original Classification Authority
- SECARMY or DCSINT appoints in writing persons
designated as Original Classification
Authorities. - There are relatively few persons in the Army with
Original Classification Authority (OCA). - The OCA will determine the length of time
information will require classification and will
determine an appropriate declassification date or
event. This decision is based on the national
security sensitivity of the information.
9Levels of Classification
- TOP SECRET applied to information in which the
unauthorized disclosure could reasonably be
expected to cause exceptionally grave damage to
national security. - SECRET applied to information in which the
unauthorized disclosure could reasonably be
expected to cause serious damage to national
security. - CONFIDENTIAL applied to information in which the
unauthorized disclosure could reasonably be
expected to cause damage to national security.
10Classification Caveats
- A CAVEAT is a supplemental handling instruction
or limitation. - Common U.S. and KFOR Collateral Caveats
- NOFORN not releasable to foreign nationals
- REL KFOR releasable to properly cleared members
of KFOR with a verifiable need to know. - REL NATO/KFOR releasable to properly cleared
members of NATO and KFOR with a verifiable need
to know. - REL NATO not releasable to non-NATO KFOR members.
11Command Security Manager
- The Command Security Manager (CSM) is the
principle advisor on information security in the
command. - The CSM is responsible to the commander for
management of the program. - Commanders will appoint Command Security Managers
in writing down to battalion level. - The 11BDE CSM is CPT Peters, Brigade S2.
12The Supervisors ResponsibilitiesAR 380-5, Para
1-8
- Ensure subordinate personnel who require access
to classified information are properly cleared
and are given access to only that information for
which they have a need to know. - Ensure subordinate personnel are trained in,
understand, and follow, the requirements in AR
380-5, and local command policy and procedures,
concerning the information security program. - Continually assess the eligibility for access to
classified information of subordinate personnel
and report to the CSM any information that may
have a bearing on that eligibility.
13The Supervisors ResponsibilitiesAR 380-5, Para
1-8
- Supervise personnel in the execution of
procedures necessary to allow the continuous
safeguarding and control of classified and
sensitive information. - Include the management of classified and
sensitive information as a critical
element/item/objective in personnel performance
evaluations (counseling's, NCOERs or OERs). - Lead by example. Follow command and Army policy
and procedures to properly protect classified and
sensitive information.
14The Individuals ResponsibilitiesAR 380-5, Para
1-9
- Safeguard information, related to national
security, that you have access to. - Report, to the proper authority, the violations
of others that could lead to unauthorized
disclosure of classified or sensitive
information. - These responsibilities cannot be waived,
delegated, or in any other respect, excused. - All DA personnel will safeguard all information
and material, related to national security,
especially classified information, which they
access, and will follow AR 380-5 and other
applicable regulations.
15Who is Authorized Access to Classified
Information?
- Persons with appropriate security clearance and a
need-to-know. - The CSM, SSO or their staffs are the only persons
authorized to verify an individuals security
clearance and access level. - Verification methods
- Activity Security Clearance Access Roster
- Check full name
- Verify SSN
- Verify Clearance Level
- Official clearance verification credential with
photo (SSO V Corps badge, etc.)
16Reproduction of Classified Materials
- Use machines for which classified reproduction
has been specifically authorized and so
designated. - If reproduction is authorized on an unclassified
machine, 6 blank pages must be copied and
shredded. - Limitations and control procedures that apply to
the originals must also be applied to the copies. - Waste copies will be controlled and destroyed as
classified material. - Do not copy NATO materials.
17Storage of Classified Information or Material
- Classified information must be stored in a
locked, GSA approved, security container when not
under the control of someone properly cleared and
authorized access to it. - SF 702 (security container check sheet) must be
used for each security container with the time
and initials noted each time you - Open
- Close, or
- Check
- the container.
18Storage of Classified Information or Material
- Combinations to security containers used to store
classified information will be recorded on SF
Form 700 and stored in the master safe for your
command. - Combinations will be safe guarded at the same
level as the highest classification of
information stored within the security container. - Only properly cleared personnel, with a need to
know, will be given security container
combinations. - DO NOT mark security containers with a
classification level.
19Classification Marking Policy
- Marking is the principle means of informing
holders of classified and sensitive information
of the classification/sensitivity level and
protection requirements. - Within DA, classified and sensitive material will
be identified clearly by marking, designation or
electronic labeling.
20Purpose of Classification Marking
- Alerts holders to the presence of classified and
sensitive information. - Identifies, as specifically as possible, the
exact information needing protection. - Indicates the level of classification/sensitivity
assigned to the information. - Provides guidance on downgrading (if any) and
declassification. - Gives information on the source and reason for
classification of the information. - Warns holders of special access, control,
dissemination, or safeguarding requirements.
21Overall Classification Marking Concept
- Classified and sensitive documents will be marked
to show the highest classification/sensitivity of
information contained in the document. - Document containing classifications at more then
one level will have an overall marking of the
highest level. - Overall classifications marking will be placed at
the top and bottom of documents, slides or
overlays. - Computers, external drives, floppy diskettes, ZIP
disks, and CD-Rs will be marked with the highest
classification level authorized for processing on
that system. - Note a disk used in a SECRET computer becomes
SECRET despite the level of information stored on
it.
22Marking of Computer Disks
- Disks containing classified information will be
marked with an SF 707 SECRET label - Disks which are Unclassified but used in an
environment where classified information is
created or used must be labeled with a SF 710
UNCLASSIFIED label. - CD-Rs will have their classification written on
them, labels should be affixed to their cases. - If SF security labels are not available, the
classification level will be clearly written on
the disk label.
23Handling of Classified Computer Disks
- Place the proper classification label on the
diskette - Store the diskette in a proper security container
when - You leave the area and no authorized persons are
there (if there is an authorized person around,
tell them that the classified diskette is there) - You are not using the diskette
- Keep materials in your possession.
24Marking of Documents
- Pages will be marked on the top and bottom with
the highest classification of information on that
page. - Paragraphs will contain a portion marking of the
highest classification of information in that
paragraph. - Pictures or diagrams must be marked with the
level of classification. - Titles of classified documents will be marked
with a portion marking. Example of an
unclassified title - (U) 2BDE Information Security Program
25Classified Markings for Drafts/Notes/etc
- Drafts or notes based on classified information
must be marked. - Failure to mark notes may result in a compromise
of classified information and cause damage to
national security. - All notes taken in a work environment where
classified information is processed, which are
not properly marked, should be considered to be
classified and destroyed as such.
26Handling Classified Materials When They are Not
in a Security Container
- Ensure classified information or material is
under your direct control or that of someone who
has appropriate clearance and is authorized
access. - Use of the appropriate cover sheets are mandatory
- SF 703 for Top Secret (orange)
- SF 704 for Secret (red)
- SF 705 for Confidential (blue)
27Classified Conversations and Unsecure Phones Do
Not Mix
- Do not discuss classified information near
someone who is talking on an unsecure phone. - Place phones on mute when notifying personnel of
incoming calls. - Briefings are a particular Info-Sec hazard.
28Using Distribution Systems
- Ensure classified materials are not left alone in
distribution boxes. - Ensure only authorized personnel (with
appropriate clearance and need-to-know) pick up
classified materials.
29Faxing Classified Information
- Use secure FAX unit.
- Follow the encryption procedures for that piece
of equipment. - Before transmitting, call the receiving office to
ensure an authorized person is available to
receive the transmission. - Remain with the unit until the transmission or
reception is complete.
30End of the Day Security Check
- Activity chiefs are responsible for establishing
a system of security checks at the close of each
working day to ensure that all classified
material is properly secured. - Check the entire work area for classified
materials. - Check each security container to ensure it is
locked - Record this check on SF 701 (activity security
checklist).
31Preparation of Material for Transmission
(Mailing or Hand Carrying)
- When classified information is transmitted,
it will be enclosed in two opaque, sealed
envelopes, wrappings, or containers, durable
enough to properly protect the material from
accidental exposure and to ease in detecting
tampering. (AR 380-5, Para 8-9)
32Preparation of Classified Materials for Movement
Outside of Your TOC
- Double wrap (use opaque materials like brown
paper or cardboard). - The outer envelope or container must be addressed
to an official government activity or to a DOD
contractor with a facility clearance and an
appropriate storage capability. E.g. Top Secret
information cannot be sent to the Commander, 2
BDE, 1 AD because the Brigade does not have a
facility authorized to store that level of
information. - The inner envelope or container will show the
address of the receiving activity, the address of
the sender, and the highest classification of
its contents.
33Preparation of Classified Materials for Movement
Outside of Your TOC
- Place a layer of plain paper or cardboard between
the classified document and the inner layer. - Do not indicate classification on outside layer.
- Seal package in such a way that tampering can be
detected (use paper tape along seams). - A locked briefcase can be used as the outer wrap.
34Example of the Inner Wrap in a Double Wrap System
for Secret Information
Both To and From addressees Must be placed on
both wrappers.
Note classification markings on top and bottom of
package.
Unclassified Example
35Example of the Outer Wrap in a Double Wrap System
for Secret Information
Do not place classification markings on the outer
wrapper.
36Handcarrying
- Use handcarrying as your last means for
transmitting classified materials. Use it only
after all other transmission methods have been
found inadequate. - Double wrap the materials.
- Keep materials under constant surveillance and
personal possession. - Do not place in detachable storage compartment,
e.g. auto trailer, luggage rack, etc. - Store overnight only at a U.S. government
facility or cleared contractor facility with
classified information storage capability.
37Handcarrying (continued)
- Leave a record (DA 3964) of materials being
handcarried with your activity. - Get briefing prior to departure.
- If using a commercial airline
- Coordinate with the airline before leaving
- Have ID and letter of authorization
- Allow x-raying but do not allow direct access to
the information - Use U.S. flag carrier or allied flag carrier if
U.S. is not available - Check with your security office for more
information on hand-carrying.
38Courier Orders
- Courier orders are required when you travel
outside your assigned military area or base camp.
The courier will be in possession of the
appropriate courier authorization form as
indicated below - - Travel within the country of assignment
- (use the DD form 2501, Courier
Authorization Card) - - Travel across international boundaries
- (use the AR 380-5E-R in English plus the
appropriate German, Italian, Turkish or Greek,
translation.) - - Couriers of SCI
- (use USAREUR Form 32)
- Travel within your city of assignment does not
require courier orders, except for SCI however,
you must have permission from your supervisor to
transport classified material within your area.
39Transporting from Office to Office
- Do not attract attention to yourself when
carrying classified materials from one office to
another. Place the materials in a nondescript
envelope or container. - Place cover sheet (SF 701, 704, or 705) on
materials prior to placing into envelope to
remind yourself and recipient that materials are
classified.
40Methods for Transmitting Classified Materials
- Confidential
- Authorized electronic system, e.g, a Stu-III or
STE in secure mode - Handcarry (with proper authorization)
- Defense Courier service (not routinely but under
certain circumstances) - Registered mail (for APO/FPO outside U.S. and
Puerto Rico for NATO outside U.S. when
uncertain if destination within U.S. to DOD
contractor or other executive branch agency, when
appropriate) -
41Methods for Transmitting Classified Materials
- Confidential, continued
- U.S. postal service registered mail to/from
APO/FPO - U.S. postal service first class mail inside the
continental United States with restrictions - Use of postal collection boxes are prohibited!
-
42Methods for Transmitting Classified Materials
- Secret
- - Authorized electronic system, e.g., a
STU-III or STE in secure mode. - - Handcarrying (with proper authorization)
- - Defense courier service (not routinely but
under certain circumstances) - - Registered mail (within U.S. and Puerto
Rico) - - Registered mail to APO/FPO but only if
mail will not pass out of U.S. control during
entire mail process.
43Methods for Transmitting Classified Materials
- Secret, continued
- - Protective security service within U.S.
boundaries if item is large and bulky (check with
MTMC for information on the companies that
provide this service). - - U.S. Postal service express mail (within
U.S. and Puerto Rico). Do not use to send to an
APO/FPO address and do not use street-side
collection box. - - GSA contract holder for overnight delivery
(currently FedEx) (within US and territories).
See your security office for limitations and
procedures. Do not send to an APO/FPO address.
44Methods for Transmitting Classified Materials
- Top Secret
- - Defense courier service
- - Department of State courier service, only
under rare conditions - - Authorized electronic system, e.g. a
STU-III or STE cleared for TOP SECRET
communication - - Handcarrying (with proper authorization)
45Handling of Mail
- Protect mail until it has been determined whether
or not classified materials are contained within. - For DOD contractors ensure only cleared
personnel receive and sign for all certified and
registered mail.
46Who Can Destroy Classified Materials
- User (or custodian) of the materials
- Designated destruction official(s) for your
activity, if used - Witness required for the destruction of Top
Secret and NATO Secret information - Use DA Form 3964 as Destruction Certificate
- Keep Destruction Certificate on file
47Authorized Methods for Destruction of Classified
Materials
- Shredding, crosscut shredders are the only
authorized shredders for destruction of
classified information (shredding machine must
reduce the material to shreds no greater than
1/32nd of an inch by ½ inch crosscut) - It is recommended that the S2 establish a shred
bin that is shredded daily. - Burning, (when allowed by your local
environmental agency) - Pulverizing
- Pulping
- Check with your security office for location of
equipment and information on other
methods
48Processing Classified Information on Computer
- Computers must be accredited for processing of
classified information. - Secret Internet Protocol Router Network (SIPRNET)
is authorized for processing of levels up to
SECRET. - Do Not process classified information on
Unclassified Computer systems. - The Non-Secure Internet Protocol Router Network
(NIPRNET) is authorized to process up to
sensitive but unclassified information.
49Automated Information System Threat
- 126 countries have computer espionage programs
- Reported computer break-ins are expanding at over
52 - DoD considered easy pickings by computer
underground - Computer crime recognized as fastest growing
component of global organized crime - Insiders pose a major threat to systems
- Malicious codes cause loss of information and time
50Types of Threats
51Information System Threat is Global
Threats to information systems do not recognize
either physical or political boundaries.
52Where is the Threat?
- Foreign Intelligence Services
- Industrial Espionage
- Media
- Drug Smugglers
- Criminals
- Hobbyists
53What Type of Information Do We Disclose Through
our Negligence?
- Real world contingency operations
- Exercise information
- VIP itineraries
- Logistical information
- Communication architecture
- New systems
- Special operations
54Thanks for Your Attention
BRIEFING COMPLETED