SCI Overview Seminar SCI Today - PowerPoint PPT Presentation

1 / 57
About This Presentation
Title:

SCI Overview Seminar SCI Today

Description:

Policy ... Foreign government information ... George W. Bush. DNI. J. M. McConnell. UNCLASSIFIED - 33 - UNCLASSIFIED. How We Collect Intelligence ... – PowerPoint PPT presentation

Number of Views:190
Avg rating:3.0/5.0
Slides: 58
Provided by: carlfo
Category:
Tags: sci | overview | seminar | today

less

Transcript and Presenter's Notes

Title: SCI Overview Seminar SCI Today


1
SCI Overview SeminarSCI Today
UNCLASSIFIED
DNI Special Security Center
v. July 2007
UNCLASSIFIED
2
Welcome and Objectives
  • Classification level
  • Seminar room/SCIF
  • No cell phones or other personal electronic
    devices
  • Only authorized classified discussion area
  • Seminar Objectives
  • Reinforce the fundamental security basic
    practices
  • Describe your responsibilities in security and in
    the protection SCI
  • Correlate our changing world to your
    responsibilities
  • Inform of changes in SCI and the security world

3
Your Seminar HostDNI Special Security Center
  • Established To strengthen security in the
    Intelligence Community and wherever SCI and
    intelligence information is processed or held.
  • Government and contractor personnel dedicated to
  • Security policy creation and implementation
  • Security coordination and liaison
  • Security services

4
About You
  • Your Organization
  • Your job responsibilities
  • Greatest security challenge
  • What do you hope to get from this session

5
UNCLASSIFIED
Security FundamentalsA Refresher
6
Personnel Security You Must Report
  • Changes in personal status
  • Marriage, separation, divorce, cohabitation
  • Personal problems
  • Drugs alcohol misuse, abuse
  • Finances
  • Legal involvements
  • Litigation, arrest, court summons, etc.
  • Improper solicitations for information
  • Foreign-based outside employment
  • Adverse information about others
  • Contact with media

Personnel Security
7
Report Foreign Travel
  • Report foreign travel in advance
  • Day trips to Mexico or Canada can be reported
    upon return
  • Pre-travel briefing may be required
  • Report unusual trip incidents

Personnel Security
8
Report Foreign Contacts
  • Reportable
  • Close continuing relationship, business or
    personal, with a citizen, resident or
    representative of foreign country (this includes
    contact via internet email, chatrooms)
  • Not reportable
  • Casual contacts at social gatherings unless
  • Foreign contact displays strong interest in
    employment
  • Is not satisfied with answers
  • Follow up contact is sought

Personnel Security
9
Report Security Incidents
  • Violations
  • Involve loss, compromise, or suspected compromise
    of classified information
  • and/or
  • Involve gross security carelessness
  • Infractions
  • When the rules have not been followed
  • Systemic weaknesses and anomalies
  • Internal, Disgruntled Employees
    external-Activist Groups

Personnel Security
10
Pre-publication Review
  • Any written material that contains or purports to
    contain SCI
  • Material may contain description of activities
    that produce or relate to SCI
  • Anything entering public domain must be approved
  • Speeches, articles, white papers, advertisements
  • Web pages, web sites
  • Internet is an unclassified communication system
  • Do not write around classified subjects

Personnel Security
11
Unauthorized Disclosure
  • DCID 6/8
  • Currently being re-written to reflect the Office
    of the Director of National Intelligence
  • Will be titled Intelligence Community Directive
    (ICD) 708 and 708.1
  • Purpose
  • Emphasizes the responsibilities of the IC to
    protect intelligence information
  • Defines a process and establishes roles and
    responsibilities to deter, investigate and
    promptly report unauthorized disclosures,
    security violations, compromises of intelligence
    information
  • Ensures appropriate protective and corrective
    actions are taken

Personnel Security
12
Unauthorized Disclosure (cont)
  • Policy
  • To guard against, investigate report and redress
    unauthorized disclosures and other security
    violations
  • Continuously emphasize security and
    counterintelligence awareness
  • Promptly notify ODNI of any security violation,
    unauthorized disclosure of other compromise
  • Notification requirement includes persons
    deliberately disclosing classified information to
    the media leaks
  • Includes classified information accidentally or
    intentionally disclosed across computer systems
    spills

Personnel Security
13
What Should You Do?
  • Gather your facts
  • Report it immediately
  • Notify your immediate supervisor
  • Notify your security office

Personnel Security
14
Physical Security
  • Sensitive Compartmented Information Facility
    (SCIF)
  • Sole place for producing, processing, storing or
    discussing SCI
  • Only SCI approved persons are unescorted
  • Locked and alarmed when unattended
  • Classified talk stops at SCIF door

Physical Security
15
Information Systems Security
  • Information systems security is a significant IC
    concern
  • Information sharing is a significant government
    initiative

Information Systems Security
16
Critical to ISS
  • Configuration integrity critical for approved
    SCI systems
  • Media declared and approved
  • Once in the SCIF, always in the SCIF
  • Security review prior to removal of any media or
    printed output

Information Systems Security
17
Password Protection
  • Passwords build security integrity
  • Protection Techniques
  • Memorize passwords
  • Do not share them
  • Use a smart password - see your ISSO
  • Combination of a minimum of 8 numbers, letters,
    special characters and capitalization
  • Change every six months

Information Systems Security
18
Viruses
  • Information Systems
  • Protection Techniques
  • Have ISSO scan incoming media
  • React to any virus suspicion
  • Notify ISSO or system administrator immediately

Information Systems Security
19
Telephone Communications
  • Non-Secure (Open) Telephones
  • No talking around classified information
  • Ensure classified conversations cannot be picked
    up by open line
  • Secure
  • Lots of colors Red, Grey, Green
  • STUIII/STE
  • Key to common level
  • Telephone protocol - confirm to whom you are
    talking

Information Systems Security
20
Personal Electronic Devices
  • Electronic devices that can store, record and/or
    transmit digital text, digital image/video, or
    audio data.
  • May interact electrically or optically with other
    information systems in an accredited SCIF
  • Learn PED ground rules for the SCIFs you work in
  • See ISSO before introducing and PEDs into a SCIF

Information Systems Security
21
Internet Discipline
  • The Internet is an unclassified communication
    system
  • Do not write around classified subjects
  • The U.S. Government has invested significantly in
    classified information systems for the purpose of
    performing classified work
  • Use them!

Information Systems Security
22
Classification Management
  • Process for determining nature of information and
    assigning proper classification, markings,
    dissemination and declassification instructions
  • Required by EO 12958, as amended Director of
    Central Intelligence Directives (DCIDs)
  • E.O. 12958 establishes 3 levels of classification
  • TOP SECRET may cause exceptionally grave damage
    to national security
  • SECRET may cause serious damage
  • CONFIDENTIAL may cause damage

Classification Management
23
National Security Information
  • Military plans, weapons systems or operations
  • Foreign government information
  • Intelligence activities (including special
    activities), intelligence sources and methods or
    cryptology
  • Foreign relations or diplomatic activities of the
    US, including confidential sources
  • Scientific, technological or economic matters
    relating to national security, which includes
    defense against transnational terrorism
  • Program for safeguarding nuclear materials or
    facilities
  • Vulnerabilities or capabilities of systems,
    installations, infrastructures, projects/plans
    relating to national security
  • Foreign Government Information and weapons of
    mass destruction

Classification Management
24
Spies, Lies and Myths
UNCLASSIFIED
Espionage
UNCLASSIFIED
25
Espionage Since World War II
  • 151 persons convicted of espionage
  • 140 male/11 female
  • 100 government/51 non-government
  • Most held Secret clearances or above
  • Six million non-spies held clearances during the
    period
  • The latest case Brian Regan

26
Brian Regan
  • If I commit esponage (sic) I will be putting my
    self and family at great risk. If I am caught I
    will be enprisioned (sic) for the rest of my
    life, if not executed for this deed.
  • In a letter to Saddam Hussein, Brian Regan
    demanded 13 million in exchange for providing
    data such as detailed information about US
    reconnaissance satellites

27
Brian Regan Facts
  • USAF assignee to NRO (7/95 8/00)
  • Considered espionage in late 1998 to solve
    financial problems (100,000)
  • Began downloading from Intelink in 1999
  • Removed 15,000 pages, CD-Roms and video tapes
    from NRO
  • Hired by TRW October 2000
  • Brought back to NRO but monitored
  • Surfs Libya, Iraq and China on Intelink
  • Arrested/indicted/convicted (8/01 2/03)
  • (Attempted espionage and gathering national
    security information)

28
Brian Regans Behavior
  • The Telltale Indicators
  • Deeply in debt
  • Worked odd hours
  • Foreign national spouse
  • Late nights in copy room
  • Non-reporter of foreign travel
  • Top Fifty user of Intelink

29
Myths About Spies
  • Get rich
  • Are insane
  • Realize they are bad people
  • Consumed by guilt
  • Driven by excitement
  • Plan their final escape
  • Display deteriorating job performance
  • Show outwardly suspicious behavior
  • Caught by co-workers
  • Control their own destiny

Source www.fbi.gov and www.ncix.gov
30
Sensitive Compartmented Information (SCI)A
special category of national intelligence
information concerning or derived from
intelligence sources, methods, or analytical
processes, which is required to be handled within
formal access control systems
UNCLASSIFIED
UNCLASSIFIED
31
National Security Information
32
National Security and SCI Protection Policies
  • National security policies
  • Come from National Security Council
  • In the name of President
  • As Executive Orders, Presidential or National
    Security Decision Directive
  • SCI protection policies
  • In name of DNI
  • as IC Directives (ICDs) formerly DCIDs
  • DNI SSC
  • Facilitated and coordinated rewrite of security
    series of ICDs

Executive Orders Presidential Decision Directives
EO 12958 EO 12968 EO 12333
President George W. Bush
DCID 6/3 DCID 6/4 DCID 6/9
DNI J. M. McConnell
33
How We Collect Intelligence
  • Open Source Intelligence (OSINT)
  • Geospatial Intelligence (GEOINT)
  • Human Intelligence (HUMINT)
  • Signals Intelligence (SIGINT)

34
Signals Intelligence (SIGINT)
  • Collecting verbal and nonverbal signals from
    land, sea and satellite
  • Protected within COMINT Control System managed by
    D/NSA
  • Categories
  • Communications Intelligence (COMINT)
  • Electronic Intelligence (ELINT)
  • Foreign Instrumentation Signals Intelligence
    (FISINT)

35
COMINT (SI) Control System
  • Special access program designed to protect
    signals intelligence
  • Named for first product it afforded protection
  • COMINT (Communications intelligence)
  • Also called
  • Special Intelligence Control System
  • SI Control System
  • Its information is only available to holders of
    SI access approval
  • Managed by D/NSA

36
COMINT (SI) Control System
  • The original SIGINT
  • Intercepted communications
  • Telephone, email, fax, etc.
  • Still referred to as Special Intelligence or SI
  • Must protect
  • What was collected
  • How collection was accomplished tactics,
    equipment
  • Intelligence implications
  • Degree of success
  • Plans and targets
  • Sharing with foreign partners

37
TALENT-KEYHOLE (TK) Control System
  • SAP established by DCI for products from
    satellite reconnaissance (1960)
  • To protect most sensitive details of satellite
    collection capabilities and derived information
  • Consistent with EO 12333 and EO 12958 directing
    DCI to develop programs to protect intelligence
    sources and methods and analytical procedures

38
TALENT-KEYHOLE (TK) Control System
  • Must protect
  • Whats being collected
  • Collection techniques
  • Intelligence implications
  • System effectiveness
  • Plans and targets
  • Operational information formerly known as B
    material
  • Operational, engineering and technical information

39
IC Program Managers
40
A Changing World
41
The Day That Changed The World
September 11, 2001
The Pentagon
World Trade Center
Shanksville, PA
42
The Post 9/11 World
  • We will never be the same
  • New threat matrix
  • Terrorism in forefront
  • Espionage still here
  • New Security perspectives
  • From nation states to threatening groups
  • Global view with moving targets
  • Focus on foreign involvements and influences
  • Hardening of facilities
  • Greater emphasis on information sharing
  • Analysis and risk management

43
Todays Delicate Balance
INFORMATION PROTECTION (NEED TO KNOW)
VS.
INFORMATION SHARING (Criteria for Access)
44
Global Warfare
  • Current state of affairs
  • The world's major intelligence agencies employ
    the latest technologies available in collection,
    communication and analysis of information from
    abroad
  • Counterintelligence agencies employ other
    technologies in efforts to identify and eliminate
    foreign spies at home

Extracted from Spies in the Digital Age, H. Keith
Melton
45
Global Warfare
  • Some important changes to come
  • The primary targets of spies for all intelligence
    services have shifted
  • The traditional roles of "friends and foes"
    continue to blur
  • New technologies are changing the traditional
    methods and techniques (called "tradecraft") by
    which spies operate
  • Traditional tradecraft of spies are applied in
    new ways

Extracted from Spies in the Digital Age, H. Keith
Melton
46
National Threats
  • The single greatest threat to world peace in the
    early part of this century will be the
    utilization of weapons of mass destruction?nuclear
    , chemical, biological and digital?by
    fundamentalist terrorist organizations

Extracted from Spies in the Digital Age, H. Keith
Melton
47
National Threats
  • Terrorist organizations are already using
    Internet to
  • Recruit and communicate members with similar
    fundamentalist beliefs
  • Coordinate terrorist activities with other
    aligned groups that share interests in a common
    outcome
  • Raise money through computer based cyber-crime
  • Attack national information infrastructures of
    hostile countries from thousands of miles away

Extracted from Spies in the Digital Age, H. Keith
Melton
48
The 911 Commission (2004)
  • Concluded we should
  • Attack terrorist organizations
  • Curb growth of radical Islam
  • Prepare for and protect against terrorist attacks
  • Recommendations
  • Create a National Counterterrorism Center (NCTC)
  • Unify IC under a DNI
  • Strengthen FBI and homeland defenders
  • Unify and strengthen Congressional oversight

DONE
49
Intelligence Reform Act of 2004
  • Establishes a Senate-confirmed Director of
    National Intelligence (DNI)
  • Re-designates the National Foreign Intelligence
    Program (NFIP) as the National Intelligence
    Program (NIP)

DONE
50
Director of National Intelligence (DNI)
  • Intelligence Reform and Terrorism Prevention Act
    of 2004
  • Title 1, Reform of the Intelligence Community
  • Section 1001, Subtitle A, Establishment of the
    Director of National Intelligence

51
DNI Roles in Security
  • Promote intelligence information sharing
  • Protect intelligence sources and methods
  • Promote uniform procedures for SCI
  • Join government-wide security clearance reform
  • Reciprocity of security clearances
  • Process for investigation and adjudication to be
    performed quickly

52
New Intelligence Community
53
National Intelligence Strategy
  • Protection of National Intelligence
  • Objective 7
  • Create clear, uniform security practices and
    rules that allow us to work together, protect our
    nations secrets, and enable aggressive
    counterintelligence activities.
  • Dramatically change the basis of IC security and
    counterintelligence policies in order to remain
    effective.
  • Rigorously assess threat, vulnerability and
    protection requirements
  • Establish uniform and reciprocal guidance

54
Parting Words
  • Presidential direction . . .take the strongest
    possible precautions against terrorism by
    bringing together the best information and
    intelligence. In the war on terror, knowledge is
    power.

Your part you have an individual responsibility
and role in protection of SCI assets
55
UNCLASSIFIED
Director of National IntelligenceOrganizati
on Charts
UNCLASSIFIED
56
ODNI
Director of National Intelligence Mr. J. M.
McConnell
ADNI Acting Director of Intelligence Staff Mr.
David R. Shedd
57
DNI Special Security Center (SSC)
Deputy Director, Policy and Planning Mr. Rick
Hohman
Write a Comment
User Comments (0)
About PowerShow.com