Title: SCI Overview Seminar SCI Today
1SCI Overview SeminarSCI Today
UNCLASSIFIED
DNI Special Security Center
v. July 2007
UNCLASSIFIED
2Welcome and Objectives
- Classification level
- Seminar room/SCIF
- No cell phones or other personal electronic
devices - Only authorized classified discussion area
- Seminar Objectives
- Reinforce the fundamental security basic
practices - Describe your responsibilities in security and in
the protection SCI - Correlate our changing world to your
responsibilities - Inform of changes in SCI and the security world
3Your Seminar HostDNI Special Security Center
- Established To strengthen security in the
Intelligence Community and wherever SCI and
intelligence information is processed or held. - Government and contractor personnel dedicated to
- Security policy creation and implementation
- Security coordination and liaison
- Security services
4About You
- Your Organization
- Your job responsibilities
- Greatest security challenge
- What do you hope to get from this session
5UNCLASSIFIED
Security FundamentalsA Refresher
6Personnel Security You Must Report
- Changes in personal status
- Marriage, separation, divorce, cohabitation
- Personal problems
- Drugs alcohol misuse, abuse
- Finances
- Legal involvements
- Litigation, arrest, court summons, etc.
- Improper solicitations for information
- Foreign-based outside employment
- Adverse information about others
- Contact with media
Personnel Security
7Report Foreign Travel
- Report foreign travel in advance
- Day trips to Mexico or Canada can be reported
upon return - Pre-travel briefing may be required
- Report unusual trip incidents
Personnel Security
8Report Foreign Contacts
- Reportable
- Close continuing relationship, business or
personal, with a citizen, resident or
representative of foreign country (this includes
contact via internet email, chatrooms) - Not reportable
- Casual contacts at social gatherings unless
- Foreign contact displays strong interest in
employment - Is not satisfied with answers
- Follow up contact is sought
Personnel Security
9Report Security Incidents
- Violations
- Involve loss, compromise, or suspected compromise
of classified information - and/or
- Involve gross security carelessness
- Infractions
- When the rules have not been followed
- Systemic weaknesses and anomalies
- Internal, Disgruntled Employees
external-Activist Groups
Personnel Security
10Pre-publication Review
- Any written material that contains or purports to
contain SCI - Material may contain description of activities
that produce or relate to SCI - Anything entering public domain must be approved
- Speeches, articles, white papers, advertisements
- Web pages, web sites
- Internet is an unclassified communication system
- Do not write around classified subjects
Personnel Security
11Unauthorized Disclosure
- DCID 6/8
- Currently being re-written to reflect the Office
of the Director of National Intelligence - Will be titled Intelligence Community Directive
(ICD) 708 and 708.1 - Purpose
- Emphasizes the responsibilities of the IC to
protect intelligence information - Defines a process and establishes roles and
responsibilities to deter, investigate and
promptly report unauthorized disclosures,
security violations, compromises of intelligence
information - Ensures appropriate protective and corrective
actions are taken
Personnel Security
12Unauthorized Disclosure (cont)
- Policy
- To guard against, investigate report and redress
unauthorized disclosures and other security
violations - Continuously emphasize security and
counterintelligence awareness - Promptly notify ODNI of any security violation,
unauthorized disclosure of other compromise - Notification requirement includes persons
deliberately disclosing classified information to
the media leaks - Includes classified information accidentally or
intentionally disclosed across computer systems
spills
Personnel Security
13What Should You Do?
- Gather your facts
- Report it immediately
- Notify your immediate supervisor
- Notify your security office
Personnel Security
14Physical Security
- Sensitive Compartmented Information Facility
(SCIF) - Sole place for producing, processing, storing or
discussing SCI - Only SCI approved persons are unescorted
- Locked and alarmed when unattended
- Classified talk stops at SCIF door
Physical Security
15Information Systems Security
- Information systems security is a significant IC
concern - Information sharing is a significant government
initiative
Information Systems Security
16Critical to ISS
- Configuration integrity critical for approved
SCI systems - Media declared and approved
- Once in the SCIF, always in the SCIF
- Security review prior to removal of any media or
printed output
Information Systems Security
17Password Protection
- Passwords build security integrity
- Protection Techniques
- Memorize passwords
- Do not share them
- Use a smart password - see your ISSO
- Combination of a minimum of 8 numbers, letters,
special characters and capitalization - Change every six months
Information Systems Security
18Viruses
- Information Systems
- Protection Techniques
- Have ISSO scan incoming media
- React to any virus suspicion
- Notify ISSO or system administrator immediately
Information Systems Security
19Telephone Communications
- Non-Secure (Open) Telephones
- No talking around classified information
- Ensure classified conversations cannot be picked
up by open line - Secure
- Lots of colors Red, Grey, Green
- STUIII/STE
- Key to common level
- Telephone protocol - confirm to whom you are
talking
Information Systems Security
20Personal Electronic Devices
- Electronic devices that can store, record and/or
transmit digital text, digital image/video, or
audio data. - May interact electrically or optically with other
information systems in an accredited SCIF - Learn PED ground rules for the SCIFs you work in
- See ISSO before introducing and PEDs into a SCIF
Information Systems Security
21Internet Discipline
- The Internet is an unclassified communication
system - Do not write around classified subjects
- The U.S. Government has invested significantly in
classified information systems for the purpose of
performing classified work - Use them!
Information Systems Security
22Classification Management
- Process for determining nature of information and
assigning proper classification, markings,
dissemination and declassification instructions - Required by EO 12958, as amended Director of
Central Intelligence Directives (DCIDs) - E.O. 12958 establishes 3 levels of classification
- TOP SECRET may cause exceptionally grave damage
to national security - SECRET may cause serious damage
- CONFIDENTIAL may cause damage
Classification Management
23National Security Information
- Military plans, weapons systems or operations
- Foreign government information
- Intelligence activities (including special
activities), intelligence sources and methods or
cryptology - Foreign relations or diplomatic activities of the
US, including confidential sources - Scientific, technological or economic matters
relating to national security, which includes
defense against transnational terrorism - Program for safeguarding nuclear materials or
facilities - Vulnerabilities or capabilities of systems,
installations, infrastructures, projects/plans
relating to national security - Foreign Government Information and weapons of
mass destruction
Classification Management
24Spies, Lies and Myths
UNCLASSIFIED
Espionage
UNCLASSIFIED
25Espionage Since World War II
- 151 persons convicted of espionage
- 140 male/11 female
- 100 government/51 non-government
- Most held Secret clearances or above
- Six million non-spies held clearances during the
period -
- The latest case Brian Regan
26Brian Regan
- If I commit esponage (sic) I will be putting my
self and family at great risk. If I am caught I
will be enprisioned (sic) for the rest of my
life, if not executed for this deed.
- In a letter to Saddam Hussein, Brian Regan
demanded 13 million in exchange for providing
data such as detailed information about US
reconnaissance satellites
27Brian Regan Facts
- USAF assignee to NRO (7/95 8/00)
- Considered espionage in late 1998 to solve
financial problems (100,000) - Began downloading from Intelink in 1999
- Removed 15,000 pages, CD-Roms and video tapes
from NRO - Hired by TRW October 2000
- Brought back to NRO but monitored
- Surfs Libya, Iraq and China on Intelink
- Arrested/indicted/convicted (8/01 2/03)
- (Attempted espionage and gathering national
security information)
28Brian Regans Behavior
- The Telltale Indicators
- Deeply in debt
- Worked odd hours
- Foreign national spouse
- Late nights in copy room
- Non-reporter of foreign travel
- Top Fifty user of Intelink
29Myths About Spies
- Get rich
- Are insane
- Realize they are bad people
- Consumed by guilt
- Driven by excitement
- Plan their final escape
- Display deteriorating job performance
- Show outwardly suspicious behavior
- Caught by co-workers
- Control their own destiny
Source www.fbi.gov and www.ncix.gov
30Sensitive Compartmented Information (SCI)A
special category of national intelligence
information concerning or derived from
intelligence sources, methods, or analytical
processes, which is required to be handled within
formal access control systems
UNCLASSIFIED
UNCLASSIFIED
31National Security Information
32National Security and SCI Protection Policies
- National security policies
- Come from National Security Council
- In the name of President
- As Executive Orders, Presidential or National
Security Decision Directive - SCI protection policies
- In name of DNI
- as IC Directives (ICDs) formerly DCIDs
- DNI SSC
- Facilitated and coordinated rewrite of security
series of ICDs
Executive Orders Presidential Decision Directives
EO 12958 EO 12968 EO 12333
President George W. Bush
DCID 6/3 DCID 6/4 DCID 6/9
DNI J. M. McConnell
33How We Collect Intelligence
- Open Source Intelligence (OSINT)
- Geospatial Intelligence (GEOINT)
- Human Intelligence (HUMINT)
- Signals Intelligence (SIGINT)
34Signals Intelligence (SIGINT)
- Collecting verbal and nonverbal signals from
land, sea and satellite - Protected within COMINT Control System managed by
D/NSA - Categories
- Communications Intelligence (COMINT)
- Electronic Intelligence (ELINT)
- Foreign Instrumentation Signals Intelligence
(FISINT)
35COMINT (SI) Control System
- Special access program designed to protect
signals intelligence - Named for first product it afforded protection
- COMINT (Communications intelligence)
- Also called
- Special Intelligence Control System
- SI Control System
- Its information is only available to holders of
SI access approval - Managed by D/NSA
36COMINT (SI) Control System
- The original SIGINT
- Intercepted communications
- Telephone, email, fax, etc.
- Still referred to as Special Intelligence or SI
- Must protect
- What was collected
- How collection was accomplished tactics,
equipment - Intelligence implications
- Degree of success
- Plans and targets
- Sharing with foreign partners
37TALENT-KEYHOLE (TK) Control System
- SAP established by DCI for products from
satellite reconnaissance (1960) - To protect most sensitive details of satellite
collection capabilities and derived information - Consistent with EO 12333 and EO 12958 directing
DCI to develop programs to protect intelligence
sources and methods and analytical procedures
38TALENT-KEYHOLE (TK) Control System
- Must protect
- Whats being collected
- Collection techniques
- Intelligence implications
- System effectiveness
- Plans and targets
- Operational information formerly known as B
material - Operational, engineering and technical information
39IC Program Managers
40A Changing World
41The Day That Changed The World
September 11, 2001
The Pentagon
World Trade Center
Shanksville, PA
42The Post 9/11 World
- We will never be the same
- New threat matrix
- Terrorism in forefront
- Espionage still here
- New Security perspectives
- From nation states to threatening groups
- Global view with moving targets
- Focus on foreign involvements and influences
- Hardening of facilities
- Greater emphasis on information sharing
- Analysis and risk management
43Todays Delicate Balance
INFORMATION PROTECTION (NEED TO KNOW)
VS.
INFORMATION SHARING (Criteria for Access)
44Global Warfare
- Current state of affairs
- The world's major intelligence agencies employ
the latest technologies available in collection,
communication and analysis of information from
abroad - Counterintelligence agencies employ other
technologies in efforts to identify and eliminate
foreign spies at home
Extracted from Spies in the Digital Age, H. Keith
Melton
45Global Warfare
- Some important changes to come
- The primary targets of spies for all intelligence
services have shifted - The traditional roles of "friends and foes"
continue to blur - New technologies are changing the traditional
methods and techniques (called "tradecraft") by
which spies operate - Traditional tradecraft of spies are applied in
new ways
Extracted from Spies in the Digital Age, H. Keith
Melton
46National Threats
- The single greatest threat to world peace in the
early part of this century will be the
utilization of weapons of mass destruction?nuclear
, chemical, biological and digital?by
fundamentalist terrorist organizations
Extracted from Spies in the Digital Age, H. Keith
Melton
47National Threats
- Terrorist organizations are already using
Internet to - Recruit and communicate members with similar
fundamentalist beliefs - Coordinate terrorist activities with other
aligned groups that share interests in a common
outcome - Raise money through computer based cyber-crime
- Attack national information infrastructures of
hostile countries from thousands of miles away
Extracted from Spies in the Digital Age, H. Keith
Melton
48The 911 Commission (2004)
- Concluded we should
- Attack terrorist organizations
- Curb growth of radical Islam
- Prepare for and protect against terrorist attacks
- Recommendations
- Create a National Counterterrorism Center (NCTC)
- Unify IC under a DNI
- Strengthen FBI and homeland defenders
- Unify and strengthen Congressional oversight
DONE
49Intelligence Reform Act of 2004
- Establishes a Senate-confirmed Director of
National Intelligence (DNI) - Re-designates the National Foreign Intelligence
Program (NFIP) as the National Intelligence
Program (NIP)
DONE
50Director of National Intelligence (DNI)
- Intelligence Reform and Terrorism Prevention Act
of 2004 - Title 1, Reform of the Intelligence Community
- Section 1001, Subtitle A, Establishment of the
Director of National Intelligence
51DNI Roles in Security
- Promote intelligence information sharing
- Protect intelligence sources and methods
- Promote uniform procedures for SCI
- Join government-wide security clearance reform
- Reciprocity of security clearances
- Process for investigation and adjudication to be
performed quickly
52New Intelligence Community
53National Intelligence Strategy
- Protection of National Intelligence
- Objective 7
- Create clear, uniform security practices and
rules that allow us to work together, protect our
nations secrets, and enable aggressive
counterintelligence activities. - Dramatically change the basis of IC security and
counterintelligence policies in order to remain
effective. - Rigorously assess threat, vulnerability and
protection requirements - Establish uniform and reciprocal guidance
54Parting Words
- Presidential direction . . .take the strongest
possible precautions against terrorism by
bringing together the best information and
intelligence. In the war on terror, knowledge is
power.
Your part you have an individual responsibility
and role in protection of SCI assets
55UNCLASSIFIED
Director of National IntelligenceOrganizati
on Charts
UNCLASSIFIED
56ODNI
Director of National Intelligence Mr. J. M.
McConnell
ADNI Acting Director of Intelligence Staff Mr.
David R. Shedd
57DNI Special Security Center (SSC)
Deputy Director, Policy and Planning Mr. Rick
Hohman