SlideShare a Scribd company logo
1 of 54
Download to read offline
1
 

Annual DoD Security Refresher for OSC
Consultants
Facilities Security Officer
Lee Hendrickson, 877-672-1025 ext. 702
lee.hendrickson@oscedge.com
 
 
 
2
3
  
 
 
4
  
 
 
5
  
 
 
6
  
 
 
7
  
 
 
8
  
 
 
9
  
 
 
10
  
 
 
11
  
 
 
12
  
 
 

What is Elicitation?

Elicitation is a technique used to discreetly gather information. It is a
conversation with a specific purpose: collect information that is not readily
available and do so without raising suspicion that specific facts are being
sought. It is usually non-threatening, easy to disguise, deniable, and
effective. The conversation can be in person, over the phone, or in writing.
Conducted by a skilled collector, elicitation will appear to be normal social
or professional conversation. A person may never realize she was the
target of elicitation or that she provided meaningful information.
Many competitive business intelligence collectors and foreign intelligence
officers are trained in elicitation tactics. Their job is to obtain non-public
information. A business competitor may want information in order to outcompete your company, or a foreign intelligence officer may want insider
information or details on US defense technologies.
13

Elicitation Defined
The strategic use of conversation to extract information from people without
giving them the feeling they are being interrogated.
Elicitation attempts can be simple, and sometimes are obvious. If they are
obvious, it is easier to detect and deflect. On the other hand, elicitation may
be imaginative, persistent, involve extensive planning, and may employ a coconspirator.
Elicitors may use a cover story to account for the conversation topic and why
they ask certain questions.
Elicitors may collect information about you or your colleagues that could
facilitate future targeting attempts.
Elicitation can occur anywhere— at social gatherings, at conferences, over the
phone, on the street, on the Internet, or in someone’s home.
14

Elicitation is Not Rare
  
 
 

It is not uncommon for people to discover information about a person without
letting on the purpose. For example, have you ever planned a surprise party
for someone and needed to know their schedule, wish list, food likes and
dislikes or other information without that person finding out you were
collecting the information or for what purpose? The problem comes when a
skilled elicitor is able to obtain valuable information from you, which you did
not intend to share, because you did not recognize and divert the elicitation.
15
  
 
 
16
  
 
 

For example, you meet someone at a public function and the natural
getting-to-know-you questions eventually turn to your work. You
never mention the name of your organization. The new person asks
questions about job satisfaction at your company, perhaps while
complaining about his job. You may think, “He has no idea where I
work or what I really do. He’s just making idle chat. There’s no harm
in answering.”
However, he may know exactly what you do but he relies on his
anonymity, your desire to be honest and appear knowledgeable, and
your disinclination to be suspicious to get the information he wants.
He may be hunting for a disgruntled employee who he can entice to
give him insider information.
17

Techniques
  
 
 

There are many elicitation techniques, and multiple
techniques may be used in an elicitation attempt. The
following are descriptions of some of those techniques.
Assumed Knowledge: Pretend to have knowledge or
associations in common with a person. “According to the
computer network guys I used to work with…”
Bracketing: Provide a high and low estimate in order to
entice a more specific number. “I assume rates will have to go
up soon. I’d guess between five and 15 dollars.” Response:
“Probably around seven dollars.”
Can you top this? Tell an extreme story in hopes the person
will want to top it. “I heard Company M is developing an
amazing new product that is capable of …”
18

Techniques cont’d.
Confidential Bait: Pretend to divulge confidential
information in hopes of receiving confidential information in
return. “Just between you and me…” “Off the record…”
Criticism: Criticize an individual or organization in which
the person has an interest in hopes the person will disclose
information during a defense. “How did your company get
that contract? Everybody knows Company B has better
engineers for that type of work.”
Deliberate False Statements / Denial of the Obvious:
Say something wrong in the hopes that the person will
correct your statement with true information. “Everybody
knows that process won’t work—it’s just a DARPA dream
project that will never get off the ground.”
19

Techniques cont’d.

Feigned Ignorance: Pretend to be ignorant of a topic in order to
exploit the person’s tendency to educate. “I’m new to this field
and could use all the help I can get.” “How does this thing work?”
Flattery: Use praise to coax a person into providing information.
“I bet you were the key person in designing this new product.”
Good Listener: Exploit the instinct to complain or brag, by
listening patiently and validating the person’s feelings (whether
positive or negative). If a person feels they have someone to
confide in, he/she may share more information.
The Leading Question: Ask a question to which the answer is
“yes” or “no,” but which contains at least one presumption. “Did
you work with integrated systems testing before you left that
company?” (As opposed to: “What were your responsibilities at
your prior job?”)
20

Techniques cont’d.

Macro to Micro: Start a conversation on the macro level, and
then gradually guide the person toward the topic of actual
interest. Start talking about the economy, then government
spending, then potential defense budget cuts, then “what will
happen to your X program if there are budget cuts?” A good
elicitor will then reverse the process taking the conversation back
to macro topics.
Mutual Interest: Suggest you are similar to a person based on
shared interests, hobbies, or experiences, as a way to obtain
information or build a rapport before soliciting information. “Your
brother served in the Iraq war? So did mine. Which unit was your
brother with?”
Oblique Reference: Discuss one topic that may provide insight
into a different topic. A question about the catering of a work
party may actually be an attempt to understand the type of
access outside vendors have to the facility.
21

Techniques cont’d.

Opposition/Feigned Incredulity: Indicate disbelief or
opposition in order to prompt a person to offer information
in defense of their position. “There’s no way you could
design and produce this that fast!” “That’s good in theory,
but…”
Provocative Statement: Entice the person to direct a
question toward you, in order to set up the rest of the
conversation. “I could kick myself for not taking that job
offer.” Response: “Why didn’t you?” Since the other person
is asking the question, it makes your part in the subsequent
conversation more innocuous.
Questionnaires and Surveys: State a benign purpose for
the survey. Surround a few questions you want answered
with other logical questions. Or use a survey merely to get
people to agree to talk with you.
22

Techniques cont’d.

Quote Reported Facts: Reference real or false
information so the person believes that bit of information is
in the public domain. “Will you comment on reports that
your company is laying off employees?” “Did you read how
analysts predict…”
Ruse Interviews: Someone pretending to be a
headhunter calls and asks about your experience,
qualifications, and recent projects.
Target the Outsider: Ask about an organization that the
person does not belong to. Often friends, family, vendors,
subsidiaries, or competitors know information but may not
be sensitized about what not to share.
23

Techniques cont’d.
Volunteering Information / Quid Pro Quo: Give
information in hopes that the person will reciprocate. “Our
company’s infrared sensors are only accurate 80% of the
time at that distance. Are yours any better?”
Word Repetition: Repeat core words or concepts to
encourage a person to expand on what he/she already said.
“3,000 meter range, huh? Interesting.”
24

Deflecting Elicitation Attempts
Know what information should not be shared, and be suspicious of people who seek
such information. Do not tell people any information they are not authorized to know,
to include personal information about you, your family, or your colleagues.
You can politely discourage conversation topics and deflect possible elicitations by:
• Referring them to public sources (websites, press releases)
• Ignoring any question or statement you think is improper and changing the topic
• Deflecting a question with one of your own
• Responding with “Why do you ask?”
• Giving a nondescript answer
• Stating that you do not know
• Stating that you would have to clear such discussions with your security office
• Stating that you cannot discuss the matter
 
If you believe someone has tried to elicit information from you, especially about your
work, report it to your security officer.
25
  
 
 
26
  
 
 
27
  
 
 
28
  
 
 
29
  
 
 
30
  
 
 
31
  
 
 
32
  
 
 
33
  
 
 
34
  
 
 
35
  
 
 
36
37
  
 
 
38
  
 
 
39
 

Classification Markings 

 

 

 
 
 

•  Classification markings are used on everything
from casual meeting notes to formal proposals
and media 
•  These markings identify the information which requires
protection and to 
what level it’s protected 
•  Confidential 
•  Secret 
•  Top Secret 
40
  
 
 
41
  
 
 
42
  
 
 
43
  
 
 
44
  
 
 
45
  
 
 
46
  
 
 
47
  
 
 
48
  
 
 
49
  
 
 
50
  
 
 
51
  
 
 
52
  
 
 
53
  
 
 

877-672-1025
54

More Related Content

What's hot

The Overanxious Often Make Job Search Errors.3.8.16.doc
The Overanxious Often Make Job Search Errors.3.8.16.docThe Overanxious Often Make Job Search Errors.3.8.16.doc
The Overanxious Often Make Job Search Errors.3.8.16.docRuss Jones
 
Everyday Hypnosis for Everyone
Everyday Hypnosis for EveryoneEveryday Hypnosis for Everyone
Everyday Hypnosis for EveryoneHaroon Abbu
 
Media Training Session for Saskatchewan's Public Service Commission.
Media Training Session for Saskatchewan's Public Service Commission.Media Training Session for Saskatchewan's Public Service Commission.
Media Training Session for Saskatchewan's Public Service Commission.Ian Hanna
 
Get 10 Leads via Social Media webinar
Get 10 Leads via Social Media webinarGet 10 Leads via Social Media webinar
Get 10 Leads via Social Media webinarBluewire Media
 
Masterclass: Confronting indifference to truth
Masterclass: Confronting indifference to truthMasterclass: Confronting indifference to truth
Masterclass: Confronting indifference to truthIan McCarthy
 
The New Media Landscape
The New Media LandscapeThe New Media Landscape
The New Media LandscapeAPCO
 
Communication skills
Communication skillsCommunication skills
Communication skillsZaini Ithnin
 
Strengths Finder Gallup
Strengths Finder GallupStrengths Finder Gallup
Strengths Finder GallupJoseph Hagerty
 
Four key elements of persuasion
Four key elements of persuasionFour key elements of persuasion
Four key elements of persuasionHollie Nicole
 
Talent is Social: Helping Your Dream Job Find YOU via Social Media
Talent is Social: Helping Your Dream Job Find YOU via Social MediaTalent is Social: Helping Your Dream Job Find YOU via Social Media
Talent is Social: Helping Your Dream Job Find YOU via Social MediaEric Weaver
 
Addicted to Community - Jeff Atwood
Addicted to Community - Jeff AtwoodAddicted to Community - Jeff Atwood
Addicted to Community - Jeff AtwoodFeverBee Limited
 
Confronting indifference toward truth: Dealing with workplace bullshit
Confronting indifference toward truth: Dealing with workplace bullshitConfronting indifference toward truth: Dealing with workplace bullshit
Confronting indifference toward truth: Dealing with workplace bullshitIan McCarthy
 
The stealth approach to job search networking
The stealth approach to job search networkingThe stealth approach to job search networking
The stealth approach to job search networkingsuccinctresearchbill
 
How To Get Awareness And Credibility For Your Nonprof
How To Get Awareness And Credibility For Your NonprofHow To Get Awareness And Credibility For Your Nonprof
How To Get Awareness And Credibility For Your NonprofAmanda Blum
 
Becoming the GO – TO Expert
Becoming the GO – TO ExpertBecoming the GO – TO Expert
Becoming the GO – TO ExpertAndrew Horton
 

What's hot (19)

The Overanxious Often Make Job Search Errors.3.8.16.doc
The Overanxious Often Make Job Search Errors.3.8.16.docThe Overanxious Often Make Job Search Errors.3.8.16.doc
The Overanxious Often Make Job Search Errors.3.8.16.doc
 
Investigative Business Journalism Webinar
Investigative Business Journalism WebinarInvestigative Business Journalism Webinar
Investigative Business Journalism Webinar
 
Everyday Hypnosis for Everyone
Everyday Hypnosis for EveryoneEveryday Hypnosis for Everyone
Everyday Hypnosis for Everyone
 
Media Training Session for Saskatchewan's Public Service Commission.
Media Training Session for Saskatchewan's Public Service Commission.Media Training Session for Saskatchewan's Public Service Commission.
Media Training Session for Saskatchewan's Public Service Commission.
 
Get 10 Leads via Social Media webinar
Get 10 Leads via Social Media webinarGet 10 Leads via Social Media webinar
Get 10 Leads via Social Media webinar
 
Oh the humanity
Oh the humanityOh the humanity
Oh the humanity
 
Masterclass: Confronting indifference to truth
Masterclass: Confronting indifference to truthMasterclass: Confronting indifference to truth
Masterclass: Confronting indifference to truth
 
The New Media Landscape
The New Media LandscapeThe New Media Landscape
The New Media Landscape
 
Communication skills
Communication skillsCommunication skills
Communication skills
 
Strengths Finder Gallup
Strengths Finder GallupStrengths Finder Gallup
Strengths Finder Gallup
 
Four key elements of persuasion
Four key elements of persuasionFour key elements of persuasion
Four key elements of persuasion
 
Talent is Social: Helping Your Dream Job Find YOU via Social Media
Talent is Social: Helping Your Dream Job Find YOU via Social MediaTalent is Social: Helping Your Dream Job Find YOU via Social Media
Talent is Social: Helping Your Dream Job Find YOU via Social Media
 
Addicted to Community - Jeff Atwood
Addicted to Community - Jeff AtwoodAddicted to Community - Jeff Atwood
Addicted to Community - Jeff Atwood
 
Succesful Networking
Succesful NetworkingSuccesful Networking
Succesful Networking
 
Confronting indifference toward truth: Dealing with workplace bullshit
Confronting indifference toward truth: Dealing with workplace bullshitConfronting indifference toward truth: Dealing with workplace bullshit
Confronting indifference toward truth: Dealing with workplace bullshit
 
The stealth approach to job search networking
The stealth approach to job search networkingThe stealth approach to job search networking
The stealth approach to job search networking
 
Social Media intro - 2011
Social Media intro - 2011Social Media intro - 2011
Social Media intro - 2011
 
How To Get Awareness And Credibility For Your Nonprof
How To Get Awareness And Credibility For Your NonprofHow To Get Awareness And Credibility For Your Nonprof
How To Get Awareness And Credibility For Your Nonprof
 
Becoming the GO – TO Expert
Becoming the GO – TO ExpertBecoming the GO – TO Expert
Becoming the GO – TO Expert
 

Similar to Annual Security Refresher

13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking Skills13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking SkillsBernard Marr
 
Presentation tips
Presentation tipsPresentation tips
Presentation tipsnymufti
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageMarin Ivezic
 
Networking Is Key To Successful Job Search (2)
Networking Is Key To Successful Job Search (2)Networking Is Key To Successful Job Search (2)
Networking Is Key To Successful Job Search (2)klchristop
 
Marketing for Small Business, Provincetown
Marketing for Small Business, ProvincetownMarketing for Small Business, Provincetown
Marketing for Small Business, ProvincetownAmanda Blum
 
Educating your target audience: build awareness through digital media
Educating your target audience: build awareness through digital mediaEducating your target audience: build awareness through digital media
Educating your target audience: build awareness through digital mediaCommunicatto Inc.
 
How To Write A Debate Paper
How To Write A Debate PaperHow To Write A Debate Paper
How To Write A Debate PaperAmber Wheeler
 
How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les...
 How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les... How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les...
How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les...Ken Brand
 
50 Shades of Respondent Grey
50 Shades of Respondent Grey50 Shades of Respondent Grey
50 Shades of Respondent GreyAbby Leafe
 
Innovation Differences - Silicon Valley Versus Europe
Innovation Differences - Silicon Valley Versus EuropeInnovation Differences - Silicon Valley Versus Europe
Innovation Differences - Silicon Valley Versus EuropeMario Herger
 
Competitive intelligence how to spot a liar
Competitive intelligence how to spot a liarCompetitive intelligence how to spot a liar
Competitive intelligence how to spot a liarMartin Brunet
 
Networking Blunders that Cost you Sales
Networking Blunders that Cost you SalesNetworking Blunders that Cost you Sales
Networking Blunders that Cost you SalesAbhishek Shah
 
Prepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive AdvantagePrepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive AdvantageErin Liman
 
Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...
Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...
Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...Erin Liman, Innovation is Social, LLC
 
10 Pitch Perfect Science Communication Tips
10 Pitch Perfect Science Communication Tips10 Pitch Perfect Science Communication Tips
10 Pitch Perfect Science Communication TipsMichelle Gallaher
 

Similar to Annual Security Refresher (20)

BA2
BA2BA2
BA2
 
13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking Skills13 Easy Steps To Improve Your Critical Thinking Skills
13 Easy Steps To Improve Your Critical Thinking Skills
 
Presentation tips
Presentation tipsPresentation tips
Presentation tips
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Influencing skills infographic
Influencing skills infographicInfluencing skills infographic
Influencing skills infographic
 
Networking Is Key To Successful Job Search (2)
Networking Is Key To Successful Job Search (2)Networking Is Key To Successful Job Search (2)
Networking Is Key To Successful Job Search (2)
 
Marketing for Small Business, Provincetown
Marketing for Small Business, ProvincetownMarketing for Small Business, Provincetown
Marketing for Small Business, Provincetown
 
Ask primer
Ask primerAsk primer
Ask primer
 
Educating your target audience: build awareness through digital media
Educating your target audience: build awareness through digital mediaEducating your target audience: build awareness through digital media
Educating your target audience: build awareness through digital media
 
How To Write A Debate Paper
How To Write A Debate PaperHow To Write A Debate Paper
How To Write A Debate Paper
 
How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les...
 How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les... How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les...
How To Make Top Of Mind Awareness Work For You / Chapter 4 from the book Les...
 
Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20Dean r berry scam susceptibility 12 20
Dean r berry scam susceptibility 12 20
 
Dean r berry scam susceptibility
Dean r berry scam susceptibilityDean r berry scam susceptibility
Dean r berry scam susceptibility
 
50 Shades of Respondent Grey
50 Shades of Respondent Grey50 Shades of Respondent Grey
50 Shades of Respondent Grey
 
Innovation Differences - Silicon Valley Versus Europe
Innovation Differences - Silicon Valley Versus EuropeInnovation Differences - Silicon Valley Versus Europe
Innovation Differences - Silicon Valley Versus Europe
 
Competitive intelligence how to spot a liar
Competitive intelligence how to spot a liarCompetitive intelligence how to spot a liar
Competitive intelligence how to spot a liar
 
Networking Blunders that Cost you Sales
Networking Blunders that Cost you SalesNetworking Blunders that Cost you Sales
Networking Blunders that Cost you Sales
 
Prepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive AdvantagePrepare for the Future: Achieving Growth and Competitive Advantage
Prepare for the Future: Achieving Growth and Competitive Advantage
 
Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...
Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...
Prepare for the Future: Disruption Strategies for Growth and Competitive Adva...
 
10 Pitch Perfect Science Communication Tips
10 Pitch Perfect Science Communication Tips10 Pitch Perfect Science Communication Tips
10 Pitch Perfect Science Communication Tips
 

Recently uploaded

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Annual Security Refresher

  • 1. 1   Annual DoD Security Refresher for OSC Consultants Facilities Security Officer Lee Hendrickson, 877-672-1025 ext. 702 lee.hendrickson@oscedge.com      
  • 2. 2
  • 12. 12        What is Elicitation? Elicitation is a technique used to discreetly gather information. It is a conversation with a specific purpose: collect information that is not readily available and do so without raising suspicion that specific facts are being sought. It is usually non-threatening, easy to disguise, deniable, and effective. The conversation can be in person, over the phone, or in writing. Conducted by a skilled collector, elicitation will appear to be normal social or professional conversation. A person may never realize she was the target of elicitation or that she provided meaningful information. Many competitive business intelligence collectors and foreign intelligence officers are trained in elicitation tactics. Their job is to obtain non-public information. A business competitor may want information in order to outcompete your company, or a foreign intelligence officer may want insider information or details on US defense technologies.
  • 13. 13 Elicitation Defined The strategic use of conversation to extract information from people without giving them the feeling they are being interrogated. Elicitation attempts can be simple, and sometimes are obvious. If they are obvious, it is easier to detect and deflect. On the other hand, elicitation may be imaginative, persistent, involve extensive planning, and may employ a coconspirator. Elicitors may use a cover story to account for the conversation topic and why they ask certain questions. Elicitors may collect information about you or your colleagues that could facilitate future targeting attempts. Elicitation can occur anywhere— at social gatherings, at conferences, over the phone, on the street, on the Internet, or in someone’s home.
  • 14. 14 Elicitation is Not Rare        It is not uncommon for people to discover information about a person without letting on the purpose. For example, have you ever planned a surprise party for someone and needed to know their schedule, wish list, food likes and dislikes or other information without that person finding out you were collecting the information or for what purpose? The problem comes when a skilled elicitor is able to obtain valuable information from you, which you did not intend to share, because you did not recognize and divert the elicitation.
  • 16. 16        For example, you meet someone at a public function and the natural getting-to-know-you questions eventually turn to your work. You never mention the name of your organization. The new person asks questions about job satisfaction at your company, perhaps while complaining about his job. You may think, “He has no idea where I work or what I really do. He’s just making idle chat. There’s no harm in answering.” However, he may know exactly what you do but he relies on his anonymity, your desire to be honest and appear knowledgeable, and your disinclination to be suspicious to get the information he wants. He may be hunting for a disgruntled employee who he can entice to give him insider information.
  • 17. 17 Techniques        There are many elicitation techniques, and multiple techniques may be used in an elicitation attempt. The following are descriptions of some of those techniques. Assumed Knowledge: Pretend to have knowledge or associations in common with a person. “According to the computer network guys I used to work with…” Bracketing: Provide a high and low estimate in order to entice a more specific number. “I assume rates will have to go up soon. I’d guess between five and 15 dollars.” Response: “Probably around seven dollars.” Can you top this? Tell an extreme story in hopes the person will want to top it. “I heard Company M is developing an amazing new product that is capable of …”
  • 18. 18 Techniques cont’d. Confidential Bait: Pretend to divulge confidential information in hopes of receiving confidential information in return. “Just between you and me…” “Off the record…” Criticism: Criticize an individual or organization in which the person has an interest in hopes the person will disclose information during a defense. “How did your company get that contract? Everybody knows Company B has better engineers for that type of work.” Deliberate False Statements / Denial of the Obvious: Say something wrong in the hopes that the person will correct your statement with true information. “Everybody knows that process won’t work—it’s just a DARPA dream project that will never get off the ground.”
  • 19. 19 Techniques cont’d. Feigned Ignorance: Pretend to be ignorant of a topic in order to exploit the person’s tendency to educate. “I’m new to this field and could use all the help I can get.” “How does this thing work?” Flattery: Use praise to coax a person into providing information. “I bet you were the key person in designing this new product.” Good Listener: Exploit the instinct to complain or brag, by listening patiently and validating the person’s feelings (whether positive or negative). If a person feels they have someone to confide in, he/she may share more information. The Leading Question: Ask a question to which the answer is “yes” or “no,” but which contains at least one presumption. “Did you work with integrated systems testing before you left that company?” (As opposed to: “What were your responsibilities at your prior job?”)
  • 20. 20 Techniques cont’d. Macro to Micro: Start a conversation on the macro level, and then gradually guide the person toward the topic of actual interest. Start talking about the economy, then government spending, then potential defense budget cuts, then “what will happen to your X program if there are budget cuts?” A good elicitor will then reverse the process taking the conversation back to macro topics. Mutual Interest: Suggest you are similar to a person based on shared interests, hobbies, or experiences, as a way to obtain information or build a rapport before soliciting information. “Your brother served in the Iraq war? So did mine. Which unit was your brother with?” Oblique Reference: Discuss one topic that may provide insight into a different topic. A question about the catering of a work party may actually be an attempt to understand the type of access outside vendors have to the facility.
  • 21. 21 Techniques cont’d. Opposition/Feigned Incredulity: Indicate disbelief or opposition in order to prompt a person to offer information in defense of their position. “There’s no way you could design and produce this that fast!” “That’s good in theory, but…” Provocative Statement: Entice the person to direct a question toward you, in order to set up the rest of the conversation. “I could kick myself for not taking that job offer.” Response: “Why didn’t you?” Since the other person is asking the question, it makes your part in the subsequent conversation more innocuous. Questionnaires and Surveys: State a benign purpose for the survey. Surround a few questions you want answered with other logical questions. Or use a survey merely to get people to agree to talk with you.
  • 22. 22 Techniques cont’d. Quote Reported Facts: Reference real or false information so the person believes that bit of information is in the public domain. “Will you comment on reports that your company is laying off employees?” “Did you read how analysts predict…” Ruse Interviews: Someone pretending to be a headhunter calls and asks about your experience, qualifications, and recent projects. Target the Outsider: Ask about an organization that the person does not belong to. Often friends, family, vendors, subsidiaries, or competitors know information but may not be sensitized about what not to share.
  • 23. 23 Techniques cont’d. Volunteering Information / Quid Pro Quo: Give information in hopes that the person will reciprocate. “Our company’s infrared sensors are only accurate 80% of the time at that distance. Are yours any better?” Word Repetition: Repeat core words or concepts to encourage a person to expand on what he/she already said. “3,000 meter range, huh? Interesting.”
  • 24. 24 Deflecting Elicitation Attempts Know what information should not be shared, and be suspicious of people who seek such information. Do not tell people any information they are not authorized to know, to include personal information about you, your family, or your colleagues. You can politely discourage conversation topics and deflect possible elicitations by: • Referring them to public sources (websites, press releases) • Ignoring any question or statement you think is improper and changing the topic • Deflecting a question with one of your own • Responding with “Why do you ask?” • Giving a nondescript answer • Stating that you do not know • Stating that you would have to clear such discussions with your security office • Stating that you cannot discuss the matter   If you believe someone has tried to elicit information from you, especially about your work, report it to your security officer.
  • 36. 36
  • 39. 39   Classification Markings            •  Classification markings are used on everything from casual meeting notes to formal proposals and media  •  These markings identify the information which requires protection and to  what level it’s protected  •  Confidential  •  Secret  •  Top Secret 
  • 54. 54