SlideShare a Scribd company logo
1 of 29
CLEARED
REFRESHER
SECURITY
TRAINING
Updated: Oc tober 2012
FACILITY SECURITY CLEARANCE
REFRESHERTRAINING FOR CLEARED
GW MFA EMPLOYEES
J U N E 2 0 1 6
CLEARED
REFRESHER
SECURITY
TRAINING
Briefing Contents
Updated: June 2016
The Innovative Practice Section in the Department of Emergency Medicine works as a sub-contractor with the
Department of Defense (DoD) to provide medical staffing support services on government contracts where
security clearances may be required.
The objective of this refresher training is to provide all cleared personnel with a review of the basic knowledge of
The George Washington University Medical Faculty Associates’ security practices and procedures as a secured
facility and to identify their security responsibilities and obligations as employees.
> Overview
> Introduction
> Cleared Facility PointsOf Contact (POCs)
> OPSEC
> Information Security
> Counterintelligence Threats and Awareness
> Cleared Employee Reporting Requirements
> Acknowledgement
CLEARED
REFRESHER
SECURITY
TRAINING
Overview
The George Washington University
Medical Faculty Associates (GW MFA) is a
non-possessing cleared facility (referred
to as Facility Security Clearance, or FCL)
with a secret-level clearance.
GW MFA has entered into a security agreement with the
Department of Defense in order to have access to
information that has been classified because of its
importance to the national defense. This agreement details
the security responsibilities of both the cleared organization
and the United States Government. The GW MFA and many
of its ac tivities and programs are vital parts of the defense
and sec urity systemsof the United Statesof Americ a.
The National Industrial Security Program Operating Manual
(NISPOM) prescribes the requirements, restric tions, and other
safeguards to prevent unauthorized disclosure of classified
information. A copy of the NISPOM is available to all GW
MFA employees by contac ting the Facility Security Officer
(FSO).
Per the requirements outlined in the NISPOM, all c leared
employees must received refresher training at least annually
to review the information provided in the Initial Security
Briefing for Cleared GW MFA Employees and notify
personnel of c hangesin sec urity regulations.
KEY TERMS
Classified National Security Information (“Classified
Information”): offic ial information or material that
requires protec tion in the interests of National
Security and that is classified for suc h purpose by
appropriate c lassifying authority in acc ordanc e with
the provisionsof Exec utive Order 13526
Facility Security Clearance (FCL): an administrative
determination that, from a security viewpoint, a
c ompany is eligible for ac cess to c lassified
information of a c ertain c ategory (and all lower
c ategories)
Non-possessing facility: facility with no approved
storage for c lassified material
Facility Security Officer (FSO): a U.S. c itizen
c ontrac tor employee, who is c leared as part of the
fac ility clearance, responsible for supervising and
direc ting security measures necessary for
implementing applicable NISPOM and related
Federal requirements for the protec tion of classified
information
SECRET Classification Level: as applied to
information, the unauthorized disc losure of which
reasonably c ould be expected to cause serious
damage to the national security that the original
c lassification authority is able to identify or desc ribe
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
Introduction
In order to have a successful security program, we need active participation not
only from the FSO and management, but also YOU asa cleared employee.
By being a cleared c ontrac tor/sub-contractor to the U.S. Government, we all have an
obligation to the sec urity and reputa tion of our organization and country. The most important
thing we can do each day is to be AWARE.
Each one of us can make a difference by familiarizing ourselves with GW MFA’s facility security
clearance polic ies and procedures, being c ognizant of our reporting requirements, and
understanding the threat and dangers of intelligence collec tion and the steps we can take to
countermeasure the risks.
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
Kyle Majchrzak
Operations Manager/ Facility Security Officer (FSO)
International Spec ial Projec ts& Medic al Educ ation Training Programs
Department of Emergency Medic ine
2120 L Street, NW
Suite 530, Offic e 5-119
Washington, DC 20037
Telephone: (202) 741-2944
Email: kmajc hrzak@mfa.gwu.edu
Jason McKay
Training Center Manager/ Assistant Facility Security
Officer (FSO)
International Spec ial Projec ts& Medical Educ ation Training Programs
Department of Emergenc y Medic ine
2120 L Street, NW
Suite 530, Offic e 5-107
Washington, DC 20037
Telephone: (202) 741-3421
Email: jmc kay@mfa.gwu.edu
Updated: June 2016
Cleared Facility Points of Contact (POCs)
You must report any known or suspected
security violation, suspicious contacts, or
vulnerability of which you become
aware to the FSO, independent of who
isresponsible or at fault for the situation,
so sec urity issuesc an be addressed
immediately.
CLEARED
REFRESHER
SECURITY
TRAINING
OperationsSecurity (OPSEC)
Violators of OPSEC:
#1 US Military
#2 U.S. CONTRACTORS!!!
…Don’t be a statistic
OPSEC:
> Isa proc essthat identifiesc ritic al information and protec tsit from our adversaries
> Isan important part of every organization and we all have the responsibility to manage critical information
> Helpsto c ontrol information that could be used against us(the organization). Increased safety and sec urity in
any setting and for any purpose isthe benefit
Updated: June 2016
The most important security tool in operations security is YOU!
CLEARED
REFRESHER
SECURITY
TRAINING
OPSEC & the 5-Step Cycle
OPSEC 5-Step Cycle
1. Identify Critical Information – What needsto be protec ted and how do we protec t it?
2. Analyze the Threat – Who isa potential adversary? (i.e. c riminals, hac kers, c ompetitors,
foreign intelligenc e servic es, insider threats)
3. Analyze Vulnerabilities– (i.e. public c onversations, poor doc ument c ontrol, with whic h
information isnot handled, stored or destroyed properly)
4. AssessRisk – What c ould happen? RISK = THREATx VULNERABILITY x IMPACT
5. Apply Countermeasures
Identify Critical
Information
Analyze the Threat
Analyze
Vulnerabilities
Assess Risk
Apply
Countermeasures
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
Information Security
Classified information (official information or material that requires protection in the interests
of National Security and that is classified for such purpose by appropriate classifying
authority) can be in the form of:
Updated: June 2016
The three levels applied to classified information are:
X TOP SECRET – the unauthorized disc losure of Top Secret information reasonably could be expected to cause
exc eptionally grave damage to the national security that the original classification authority is able to identify or
desc ribe
SECRET – the unauthorized disc losure of Secret information reasonably c ould be expec ted to c ause serious
damage to the national sec urity that the original c lassific ation authority is able to identify or desc ribe
CONFIDENTIAL – the unauthorized disclosure of Confidential information reasonably c ould be expec ted to c ause
damage to the national sec urity that the original c lassific ation authority is able to identify or desc ribe
A c leared c ontrac tor with a “ need-to-know” (determination made by an authorized holder of c lassified information
that a prospec tive recipient has a requirement for access to, knowledge, or possession of the c lassified information to
perform tasks or servic es essential to the fulfillment of a c lassified c ontrac t or program), possessing the necessary
c learance level, and having been briefed ac cordingly may view c lassified material at or below their c learanc e level
Remember, GW MFA is cleared to the levelsof Secret and Confidential
> Documents > Faxes > Personnel files > Equipment and mac hinery
> Working papers > Photographs > Maps& sketches > Meeting notes
> Emails > Medical rec ords > Storage media > Employee travel plans/ records
CLEARED
REFRESHER
SECURITY
TRAINING
Information Security
Need-to-Know
Thingsto remember about Need-to-Know:
> No one is entitled to c lassified information solely by virtue of offic e, position, rank or c learanc e
> You, asan authorized holder of c lassified information, have three c hoicesin dec iding whether or not to share
c lassified material entrusted to you:
i. Allow accesswhen all items in the above formula are present
ii. Deny accesswhen any item in the above formula is missing
iii. Delay accesswhen any of the itemsin the above formula are unknown
Questionsabout Need-to-Know? Contact the Facility Security Officer
CLEARANCE
SF 312
(ClassifiedInformation
Non-DisclosureAgreement)
NEED-TO-KNOW+ + =
Updated: June 2016
ACCESS
CLEARED
REFRESHER
SECURITY
TRAINING
The mission of counterintelligence (CI) as defined by DSS is to “identify unlawful
penetrators of cleared U.S. defense industry and articulate the threat for industry and
U.S. government leaders.”
Timely and ac curate reporting from c leared industry is the primary tool to identify and mitigate c ollec tion efforts
targeting tec hnologiesand information resident in c leared industry.
On the following slides we will review:
> Overview of Counterintelligenc e Threats
> InsiderThreats
> Reporting the Threat
> Cyber Sec urity
> Elic itation: Can You Rec ognize It?
> Foreign Travel Vulnerability
Updated: June 2016
Counterintelligence Threatsand Awareness
CLEARED
REFRESHER
SECURITY
TRAINING
The technology base of the U.S. isunder constant attack. DSShasidentified foreign entities(most
aggressively East Asia and the Pac ific , aswell asAfric a) seeking intelligenc e value in our:
> Information systemstec hnology
> Aeronautic s
> Lasers, optic sand sensor technology
> In the c ommerc ial spac e, government-tendered requirementsaswell asinformation to c ompete against
c ompetitors
Foreign Entitiesseek classified information for many reasons. Below are some examples:
> To obtain an advantage against regional adversaries
> Replic ate U.S. capabilities
> Develop c ountermeasuresto U.S. systems
> Profit c ommerc ially
Ascollection methodsevolve, DSShasrecognized the following trends:
> Collec torsview request for information (RFI) (i.e. seemingly innoc ent requestsmade by c ollec torsregarding
shipping logistic sand export regulations)
> Cyber c ollec tion (i.e. foreign entitiesgaining ac c essto unc lassified c leared c ontrac tor networks, potentially
c ompromising sensitive, but unc lassified, information present on those networks)
> Ac ademic solic itation (foreign entitiesuse students, professors, sc ientistsand researchersascollec tors; i.e.
foreign studentsapplying to c leared c ontrac torsassoc iated with U.S. universities)
Updated: June 2016
Counterintelligence Threatsand Awareness
Overview of Threats
CLEARED
REFRESHER
SECURITY
TRAINING
The number one threat to national security comesfrom the “Insider Threat”. An insider
can have a negative impact on national security and industry security in:
> Lossor c ompromise of c lassified, export-c ontrolled, or proprietary information
> Lossof tec hnologic al superiority
> Ec onomic loss and/ or lossof life
Updated: June 2016
Some indicators of an insider threat are:
> Engaging in c lassified c onversationswithout a need-to-know
> Working hoursinc onsistent with job assignment or insistenc e on working in private
> Repeated sec urity violations
If noticed, it is best to report these examples of suspicious activity to your FSO.
Again, be aware of your surroundings and those around you.
Counterintelligence Threatsand Awareness
Insider Threats
CLEARED
REFRESHER
SECURITY
TRAINING
It is your OBLIGATION TO REPORTactual, probable or possible espionage, sabotage,
terrorism or subversion promptly to the FSO.
DSShas warned that the majority of suspic iousc ontactsoriginate from
c ommerc ial entities. Examplesinc lude:
> Feb 2012: Pangang Group (steel manufac turer in Sic huan provinc e of
China) indicted in Northern California for c onspirac y to c ommit ec onomic
espionage inc luding c onspirac y to steal valuable trade sec retsfrom
DuPont.
> Feb 2012: Hanjuan Jin wasfound guilty in Illinoisfor theft of trade sec rets;
she illegally possessed thousandsof Motorola trade sec retson her
c omputer and in other forms of digital storage; her intent wasto passthe
information to the Chinese military.
Hanjuan Jin- November 7, 2011 (AP)
Attempted intrusionsare the most common suspiciousactivity in:
> Soc ially engineered emailswith malic iousattac hmentsto exploit c ommerc ial software
> Spoofing emailsthat imitate valid domains
> Attempted intrusion from removable media
Counterintelligence Threatsand Awareness
Reporting the Threat
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
Cyber criminals, hackers, insider threats, terrorists and foreign intelligence entities are
targeting our technology by using the following methods:
> Phishing emailswith malic iouslinksor attac hments
> Unpatched or outdated sec urity software
> Removable media
> Weak or default passwords
> Website vulnerabilities
> Seeking information on soc ial networks
Stepsthat can be taken to mitigate the risk include:
> Changing your passwordsregularly
> Using c omplex alphanumeric passwordswith c ombinations of numbers, symbols, letters, and multiple
c harac ters
> Do not open emails/ attac hmentsfrom unfamiliar sourc es
> Do not install or c onnec t personal software or hardware to your organization’snetwork without permission
from the ITdepartment
> Do not share work information on soc ial networks
Updated: June 2016
Counterintelligence Threatsand Awareness
Cyber Security
CLEARED
REFRESHER
SECURITY
TRAINING
Elicitation isused by intelligence officersin order to subtly extract information about
you, your work and/ or your colleagues. Most often, illegal or unauthorized accessto
classified or sensitive information is sought.
Updated: June 2016
What are some recruitment toolsthat intelligence officersuse to lure a target that you should be aware of?
> Money is offered by an intelligenc e officer (IO) to a target in exc hange for information
> Appealing to ideology (IO expressessame worldview or political leaningswith a target in order to gain trust)
> Ego (target bec omesthe subjec t of immense flattery and praise)
> Revenge (IO learnstarget isdisgruntled and enc ouragesretribution by passing on c lassified information)
> Blac kmail (IO learnsof damaging information and forc estarget to c ooperate by threatening to expose
personal sec rets)
> Industrial spiesattend trade showsand c onferenc es, whic h allowsthem to ask questionsthat might
otherwise seem suspic iousin a different environment
Counterintelligence Threatsand Awareness
Elicitation: Can You Recognize It?
CLEARED
REFRESHER
SECURITY
TRAINING
What can be done to counter recruitment attempts?
> Safeguard your wordsand ac tionsto avoid bec oming an easy target.
> Examine your own vulnerabilitiesand adjust your lifestyle to c lose gapsthat hostile entitiescould exploit.
Updated: June 2016
Report any suspiciousconversations to your FSO.
Thisinformation will be passed on to DSS, who will then review and determine if a
potential counterintelligence threat concern exists.
Counterintelligence Threatsand Awareness
Elicitation and Recruitment
CLEARED
REFRESHER
SECURITY
TRAINING
As cleared contractors travel for business and/ or personal use, the knowledge they
have issought-after by foreign entities.
Collection techniques include the following:
> Bugged hotel rooms or airline c abinsfor audio and/ or visual surveillance
> Intercepting faxesor email transmissions
> Rec ording of telephone c alls/ conversations
> Theft of elec tronic devic es
> Unauthorized ac cessto elec tronic devices
> Installation of malic ioussoftware
> Unnec essary and often unknown search of briefc ases/ luggage
Updated: June 2016
Counterintelligence Threatsand Awareness
Foreign Travel Vulnerability: Collection Techniques
CLEARED
REFRESHER
SECURITY
TRAINING
To combat potential vulnerabilities, please apply the following countermeasures when
traveling abroad:
> Do not public ize travel plansand limit sharing of thisinformation to people who need to know
> Inform the FSO prior to departure and rec eive an offic ial foreign travel briefing
> Maintain c ontrol of media and equipment; do not leave them unattended in hotel rooms
> Keep hotel room doorslocked and make a mental note of how the room looks when you leave/ return
> Do not use c omputer or fax equipment at foreign hotels or businessc entersfor sensitive matters
> Ignore or deflec t intrusive or suspect inquiriesor c onversationsabout professional or personal matters
> Refrain from bringing portable elec tronic devic es, espec ially if c ompany-issued
> If using portable elec tronic devic es, set passwordsto restric t ac c essand c lear the devic e in the event of
theft
> Enc rypt data, hard drivesand storage devic eswhenever possible
> Use c omplex passwords
> Please refer to the State Department website for travel warningsprior to departure
Updated: June 2016
Counterintelligence Threatsand Awareness
Foreign Travel Vulnerability: Countermeasures
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
In accordance with requirements outlined in the NISPOM, all cleared employees are required to report
the following issues to the FSO for investigation, resolution and reporting to the appropriate
government agency :
> Adverse Information
> Change in Personal Status
> Sec urity Violations/ Vulnerabilities
> Espionage, Sabotage, Subversive Activities
> Suspic iousContac ts
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
Adverse Information
Adverse information is any information that unfavorably reflec ts on the integrity or character of a cleared
employee, that suggests his or her ability to safeguard c lassified information may be impaired, or that his or her
ac c essto c lassified information c learly may not be in the best interest of national sec urity.
All c leared employeesare required to notify the FSO if any of the following exist:
> Seriousfinanc ial diffic ulties(exc essive indebtedness, bankruptc y or wage garnishments)
> Excessive use of intoxic ants(alc ohol, prescription medications)
> Use of illegal drugs
> Required c ounseling for emotional or psyc hologic al problems
> Arrestsor c onvic tionsfor c riminal offensesinc luding drunk driving
> Tic kets(over $300)
> Excessive/ unexplained wealth
> Unusual/ bizarre behavior
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
Change in Personal Status
The following should be reported to the FSO for proper doc umentation:
> A c hange in name
> A rec ent c hange in marital statusor a spouse-like relationship
> A c hange in c itizenship
> When ac c essto c lassified information is no longer required due to a c hange in job assignments
You must report if you begin to ac t asa representative of or c onsultant to any foreign entity. Thisinc ludesa
foreign government (or government agenc y), c ommerc ial businessor an individual.
Example: Obtaining a foreign passport or entering into a business/partnership with a foreign national.
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Updated: June 2016
Security Violations/ Vulnerabilities
In addition to personnel sec urity reporting requirements, you must report any known or suspected security violation or
vulnerability of which you become aware, independent of who is responsible or at fault for the situation. Sec urity
violations/ vulnerabilitiesinc lude:
> The c areless, intentional, or unintentional failure to c omply with or disregard of fac ility sec urity c learanc e polic ies
and procedures, regardlessof intent, that hasresulted in the loss, c ompromise or suspected c ompromise of
c lassified information
> The unauthorized rec eipt of c lassified material
> Report suspic iousc ontac ts, whic h are effortsby any individual, regardlessof nationality, i) to obtain illegal or
unauthorized ac c essto c lassified information, ii) to c ompromise a c leared employee, iii) all c ontactsby employees
with known or suspected intelligenc e offic ersfrom any c ountry, or iv) any c ontact whic h suggeststhe employee
c onc erned may be the target of an attempted exploitation by the intelligence servicesof another c ountry
> You must immediately report any situation related to ac tual, probable, or possible espionage, sabotage or
subversive ac tivitiesdirec ted at the United States
INITIAL
SECURITY
BRIEFING
Per the NISPOM, Sec tion 1-304 a gra duated sc a le of disc ipline has been put into pla c e in the event of a n
emp loyee tha t viola tes or is negligent of his/ her sec urity requirements. The a c tion must b e rep orted d irec tly to
the FSO and will b e reviewed for a sec urity violation if one or more of the following fac tors are present :
a. The violation involved a deliberate disregard of sec urity requirements.
b. The violation involved grossnegligence in the handling of classified materials.
c. The violation involved wasnot deliberate in nature but involved a pattern of negligence or carelessness.
You must immediately report any situation related to ac tual, probable, or possible violation direc tly to the FSO. The
FSO, if nec essary will meet with the Complianc e Officer and/ or General Counsel to disc ussthe known or suspected
violation. It will be determined at that time is ac tion c onsistsof remedial or c orrec tive measuresand/ or if
appropriate, disc iplinary ac tion, up to and inc luding suspension or termination of employment pursuant to the
MFA’s disc iplinary polic iesand procedures.
The FSO will maintain a rec ord of all disc iplinary and c orrective ac tions. All disc iplinary ac tions should be fairly and
firmly enforc ed.
If, after review with the Complianc e Offic er and General Counsel it is determined that an allegation does not warrant
an investigation, a report will be provided based on the initial review of the allegation and why the investigation is
not warranted.
Updated: June 2016
Cleared Employee Reporting Requirements
Security Violations/ Vulnerabilities
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Espionage, Sabotage, Subversive Activities
Espionage isthe act or practice of spying or of using spies to obtain
secret intelligence.
You must report potential espionage indicators exhibited by others:
> Unexplained affluenc e of wealth
> Keeping unusual work hours
> Divided loyalty or allegianc e to the U.S.
> Disregarding sec urity proc edures
> Unauthorized removal of c lassified information
> Unreported foreign c ontac t and travel (appliesto c leared employees)
> Pattern of lying
> Attempts to enlist othersin illegal or questionable ac tivity
> Verbal or physic al threats
> Inquiry about operations/ projec tswhere no legitimate need-to-know exists
Statute of limitationsdoes NOTapply to Espionage
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
Suspiciouscontacts are:
> Any efforts by any individual, regardless or nationality, to obtain illegal
or unauthorized access to c lassified information or to c ompromise any
c leared employee.
> Any contac t by a c leared employee with known or suspected
intelligence offic ersfrom any c ountry.
> Any contac t whic h suggestsyou or another employee may be the
target of an attempted exploitation by foreign intelligenc e.
If you receive suspicious contacts please report them immediately to the FSO,
asthey will then be reported to DSS
Cleared Employee Reporting Requirements
SuspiciousContacts
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
DSSCase Study
In Marc h 2009, a presumed South and Central Asian national c ontacted a c leared c ontrac tor in an attempt to
ac quire export-c ontrolled partsused in c ounter-battery radar systems.
In November 2009, a different U.S. c leared c ontrac tor rec eived an unsolic ited email from the same individual
expressing interest in purc hasing the same radar system that wasrequested in the Marc h inc ident.
The suspic iousindividual wasa representative of a trading c ompany from his home c ountry. Multiple sourc es
indic ate that hishome government established the trading c ompany asa front c ompany to proc ure export-
c ontrolled tec hnology and equipment for the national military, and that the trading c ompany had previously
sought produc tson behalf of several military servic esand defense-affiliated entities.
The trading c ompany wasthe subjec t of several other SCRsreporting attemptsto purc hase export-c ontrolled
elec tronic sproduc tsand c ommunic ationsequipment used in military airc raft.
Updated: June 2016
If you receive suspiciouscontacts please report them immediately to the FSO, asthey
will then be reported to DSS
Cleared Employee Reporting Requirements
SuspiciousContacts– DSSCase Study
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Reporting Hotlines& Contact Information
•In addition to the FSO within our organization, Federal agenciesmaintain hotlines to allow an unconstrained
avenue for government and contractor personnel to report, without fear of reprisal, any known or
suspec ted instances of sec urity irregularities or infractions conc erning defense-affiliated c ontracts,
programs, or projects.
•You are also required to report any fraud, waste or abuse regarding work while working on a
government contract.
•WARNING: Do NOT disclose classified information when reporting via one of the DoD Hotline methods,
as these channelsare not secure!
DEPARTMENTOFDEFENSE(DoD) HOTLINE
The Pentagon
Washington, D.C. 20301-1900
(800) 424-9098
hotline.dodig.jil
http:/ / www.dodig.mil/ hotline
Updated: June 2016
NRC HOTLINE
U.S. Nuclear Regulatory Commission
Office of the Inspector General
Mail Stop O5-E13
11555 Roc kville Pike
Roc kville, MD 20852
(800) 233-3497
CIA HOTLINE
Office of the Inspector General
Central Intelligence Agenc y
Washington, D.C. 20505
(703) 874-2600
DOEHOTLINE
Department of Energy
Office of the Inspector General (IG)
ATTN: IG Hotline
1000 Independence Avenue, S.W.
Mail Stop 5D-031
Washington, D.C. 20585
(202) 586-4073
(800) 541-1625
DEFENSESECURITY SERVICE(DSS)
DSSIG Hotline: (571) 305-6660
Michael Irvine, Industrial Security Specialist
michael.irvine@dss.mil
(703) 617-2300
HectorRodriguez, Field CI Specialist
hec tor.Rodriguez@dss.mil
(571) 289-0657
CLEARED
REFRESHER
SECURITY
TRAINING
Cleared Employee Reporting Requirements
Global Compliance (Non Security-Related Reporting)
If you suspect, or are asked
to cover up, any of the
following, report it to your
supervisor, to the MFA’s
Compliance Office or Legal
Department, or contact
Global Compliance:
> Fraud/ False Claims/ Upc oding
> Kic kbac ksfor referrals
> Conflic tsof interest
> Theft
> Harassment or disc rimination
> Criminal ac tivity
> Violations of lawsor regulations
> Health, safety, environmental
issues
> Violations of c ompany polic y or
procedure
Updated: June 2016
CLEARED
REFRESHER
SECURITY
TRAINING
Acknowledgement
I hereby certify by my signature below that I have reviewed the information
contained herein and understand it is my responsibility to comply with all
necessary security measures outlined in the June 2016 Facility Security
Clearance Refresher Training for Cleared GW MFA Employees.
Name
Signature Date
Position and Department
Please return thispage to the Facility Security Officer once it has been signed
via email to kmajchrzak@mfa.gwu.edu or facsimile at 202-741-2214
Updated: June 2016

More Related Content

Similar to CLEARED REFRESHER SECURITY TRAINING OVERVIEW

Facility security clearance refresher training video.
Facility security clearance refresher training video.Facility security clearance refresher training video.
Facility security clearance refresher training video.Philip Barquer
 
Module 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfModule 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfPercivalAdao7
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
U.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure AgreementU.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure AgreementRafaelleMD
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docxblondellchancy
 
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxSALU18
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Professionamiable_indian
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptSYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptNickellReddy
 
85Operations Security, Site Security, and Terrorism In.docx
  85Operations Security, Site Security, and Terrorism In.docx  85Operations Security, Site Security, and Terrorism In.docx
85Operations Security, Site Security, and Terrorism In.docxShiraPrater50
 
security_clearance_faq
security_clearance_faqsecurity_clearance_faq
security_clearance_faqwebuploader
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Richard Lawson
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionOperational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionSplunk
 

Similar to CLEARED REFRESHER SECURITY TRAINING OVERVIEW (20)

Facility security clearance refresher training video.
Facility security clearance refresher training video.Facility security clearance refresher training video.
Facility security clearance refresher training video.
 
Oig 15 55-mar15
Oig 15 55-mar15Oig 15 55-mar15
Oig 15 55-mar15
 
Module 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdfModule 3 - Information Assurance Concepts.pdf
Module 3 - Information Assurance Concepts.pdf
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
U.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure AgreementU.S. Department of State; Non Disclosure Agreement
U.S. Department of State; Non Disclosure Agreement
 
Security clearance
Security clearanceSecurity clearance
Security clearance
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).pptSYNERGY INITIAL SECURITY BRF 2023 (1).ppt
SYNERGY INITIAL SECURITY BRF 2023 (1).ppt
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
85Operations Security, Site Security, and Terrorism In.docx
  85Operations Security, Site Security, and Terrorism In.docx  85Operations Security, Site Security, and Terrorism In.docx
85Operations Security, Site Security, and Terrorism In.docx
 
security_clearance_faq
security_clearance_faqsecurity_clearance_faq
security_clearance_faq
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
CISCO Handbook.pdf
CISCO Handbook.pdfCISCO Handbook.pdf
CISCO Handbook.pdf
 
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionOperational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
 

Recently uploaded

如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesFinlaw Associates
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Recently uploaded (20)

如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Old Income Tax Regime Vs New Income Tax Regime
Old  Income Tax Regime Vs  New Income Tax   RegimeOld  Income Tax Regime Vs  New Income Tax   Regime
Old Income Tax Regime Vs New Income Tax Regime
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Understanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and ChallengesUnderstanding Social Media Bullying: Legal Implications and Challenges
Understanding Social Media Bullying: Legal Implications and Challenges
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

CLEARED REFRESHER SECURITY TRAINING OVERVIEW

  • 1. CLEARED REFRESHER SECURITY TRAINING Updated: Oc tober 2012 FACILITY SECURITY CLEARANCE REFRESHERTRAINING FOR CLEARED GW MFA EMPLOYEES J U N E 2 0 1 6
  • 2. CLEARED REFRESHER SECURITY TRAINING Briefing Contents Updated: June 2016 The Innovative Practice Section in the Department of Emergency Medicine works as a sub-contractor with the Department of Defense (DoD) to provide medical staffing support services on government contracts where security clearances may be required. The objective of this refresher training is to provide all cleared personnel with a review of the basic knowledge of The George Washington University Medical Faculty Associates’ security practices and procedures as a secured facility and to identify their security responsibilities and obligations as employees. > Overview > Introduction > Cleared Facility PointsOf Contact (POCs) > OPSEC > Information Security > Counterintelligence Threats and Awareness > Cleared Employee Reporting Requirements > Acknowledgement
  • 3. CLEARED REFRESHER SECURITY TRAINING Overview The George Washington University Medical Faculty Associates (GW MFA) is a non-possessing cleared facility (referred to as Facility Security Clearance, or FCL) with a secret-level clearance. GW MFA has entered into a security agreement with the Department of Defense in order to have access to information that has been classified because of its importance to the national defense. This agreement details the security responsibilities of both the cleared organization and the United States Government. The GW MFA and many of its ac tivities and programs are vital parts of the defense and sec urity systemsof the United Statesof Americ a. The National Industrial Security Program Operating Manual (NISPOM) prescribes the requirements, restric tions, and other safeguards to prevent unauthorized disclosure of classified information. A copy of the NISPOM is available to all GW MFA employees by contac ting the Facility Security Officer (FSO). Per the requirements outlined in the NISPOM, all c leared employees must received refresher training at least annually to review the information provided in the Initial Security Briefing for Cleared GW MFA Employees and notify personnel of c hangesin sec urity regulations. KEY TERMS Classified National Security Information (“Classified Information”): offic ial information or material that requires protec tion in the interests of National Security and that is classified for suc h purpose by appropriate c lassifying authority in acc ordanc e with the provisionsof Exec utive Order 13526 Facility Security Clearance (FCL): an administrative determination that, from a security viewpoint, a c ompany is eligible for ac cess to c lassified information of a c ertain c ategory (and all lower c ategories) Non-possessing facility: facility with no approved storage for c lassified material Facility Security Officer (FSO): a U.S. c itizen c ontrac tor employee, who is c leared as part of the fac ility clearance, responsible for supervising and direc ting security measures necessary for implementing applicable NISPOM and related Federal requirements for the protec tion of classified information SECRET Classification Level: as applied to information, the unauthorized disc losure of which reasonably c ould be expected to cause serious damage to the national security that the original c lassification authority is able to identify or desc ribe Updated: June 2016
  • 4. CLEARED REFRESHER SECURITY TRAINING Introduction In order to have a successful security program, we need active participation not only from the FSO and management, but also YOU asa cleared employee. By being a cleared c ontrac tor/sub-contractor to the U.S. Government, we all have an obligation to the sec urity and reputa tion of our organization and country. The most important thing we can do each day is to be AWARE. Each one of us can make a difference by familiarizing ourselves with GW MFA’s facility security clearance polic ies and procedures, being c ognizant of our reporting requirements, and understanding the threat and dangers of intelligence collec tion and the steps we can take to countermeasure the risks. Updated: June 2016
  • 5. CLEARED REFRESHER SECURITY TRAINING Kyle Majchrzak Operations Manager/ Facility Security Officer (FSO) International Spec ial Projec ts& Medic al Educ ation Training Programs Department of Emergency Medic ine 2120 L Street, NW Suite 530, Offic e 5-119 Washington, DC 20037 Telephone: (202) 741-2944 Email: kmajc hrzak@mfa.gwu.edu Jason McKay Training Center Manager/ Assistant Facility Security Officer (FSO) International Spec ial Projec ts& Medical Educ ation Training Programs Department of Emergenc y Medic ine 2120 L Street, NW Suite 530, Offic e 5-107 Washington, DC 20037 Telephone: (202) 741-3421 Email: jmc kay@mfa.gwu.edu Updated: June 2016 Cleared Facility Points of Contact (POCs) You must report any known or suspected security violation, suspicious contacts, or vulnerability of which you become aware to the FSO, independent of who isresponsible or at fault for the situation, so sec urity issuesc an be addressed immediately.
  • 6. CLEARED REFRESHER SECURITY TRAINING OperationsSecurity (OPSEC) Violators of OPSEC: #1 US Military #2 U.S. CONTRACTORS!!! …Don’t be a statistic OPSEC: > Isa proc essthat identifiesc ritic al information and protec tsit from our adversaries > Isan important part of every organization and we all have the responsibility to manage critical information > Helpsto c ontrol information that could be used against us(the organization). Increased safety and sec urity in any setting and for any purpose isthe benefit Updated: June 2016 The most important security tool in operations security is YOU!
  • 7. CLEARED REFRESHER SECURITY TRAINING OPSEC & the 5-Step Cycle OPSEC 5-Step Cycle 1. Identify Critical Information – What needsto be protec ted and how do we protec t it? 2. Analyze the Threat – Who isa potential adversary? (i.e. c riminals, hac kers, c ompetitors, foreign intelligenc e servic es, insider threats) 3. Analyze Vulnerabilities– (i.e. public c onversations, poor doc ument c ontrol, with whic h information isnot handled, stored or destroyed properly) 4. AssessRisk – What c ould happen? RISK = THREATx VULNERABILITY x IMPACT 5. Apply Countermeasures Identify Critical Information Analyze the Threat Analyze Vulnerabilities Assess Risk Apply Countermeasures Updated: June 2016
  • 8. CLEARED REFRESHER SECURITY TRAINING Information Security Classified information (official information or material that requires protection in the interests of National Security and that is classified for such purpose by appropriate classifying authority) can be in the form of: Updated: June 2016 The three levels applied to classified information are: X TOP SECRET – the unauthorized disc losure of Top Secret information reasonably could be expected to cause exc eptionally grave damage to the national security that the original classification authority is able to identify or desc ribe SECRET – the unauthorized disc losure of Secret information reasonably c ould be expec ted to c ause serious damage to the national sec urity that the original c lassific ation authority is able to identify or desc ribe CONFIDENTIAL – the unauthorized disclosure of Confidential information reasonably c ould be expec ted to c ause damage to the national sec urity that the original c lassific ation authority is able to identify or desc ribe A c leared c ontrac tor with a “ need-to-know” (determination made by an authorized holder of c lassified information that a prospec tive recipient has a requirement for access to, knowledge, or possession of the c lassified information to perform tasks or servic es essential to the fulfillment of a c lassified c ontrac t or program), possessing the necessary c learance level, and having been briefed ac cordingly may view c lassified material at or below their c learanc e level Remember, GW MFA is cleared to the levelsof Secret and Confidential > Documents > Faxes > Personnel files > Equipment and mac hinery > Working papers > Photographs > Maps& sketches > Meeting notes > Emails > Medical rec ords > Storage media > Employee travel plans/ records
  • 9. CLEARED REFRESHER SECURITY TRAINING Information Security Need-to-Know Thingsto remember about Need-to-Know: > No one is entitled to c lassified information solely by virtue of offic e, position, rank or c learanc e > You, asan authorized holder of c lassified information, have three c hoicesin dec iding whether or not to share c lassified material entrusted to you: i. Allow accesswhen all items in the above formula are present ii. Deny accesswhen any item in the above formula is missing iii. Delay accesswhen any of the itemsin the above formula are unknown Questionsabout Need-to-Know? Contact the Facility Security Officer CLEARANCE SF 312 (ClassifiedInformation Non-DisclosureAgreement) NEED-TO-KNOW+ + = Updated: June 2016 ACCESS
  • 10. CLEARED REFRESHER SECURITY TRAINING The mission of counterintelligence (CI) as defined by DSS is to “identify unlawful penetrators of cleared U.S. defense industry and articulate the threat for industry and U.S. government leaders.” Timely and ac curate reporting from c leared industry is the primary tool to identify and mitigate c ollec tion efforts targeting tec hnologiesand information resident in c leared industry. On the following slides we will review: > Overview of Counterintelligenc e Threats > InsiderThreats > Reporting the Threat > Cyber Sec urity > Elic itation: Can You Rec ognize It? > Foreign Travel Vulnerability Updated: June 2016 Counterintelligence Threatsand Awareness
  • 11. CLEARED REFRESHER SECURITY TRAINING The technology base of the U.S. isunder constant attack. DSShasidentified foreign entities(most aggressively East Asia and the Pac ific , aswell asAfric a) seeking intelligenc e value in our: > Information systemstec hnology > Aeronautic s > Lasers, optic sand sensor technology > In the c ommerc ial spac e, government-tendered requirementsaswell asinformation to c ompete against c ompetitors Foreign Entitiesseek classified information for many reasons. Below are some examples: > To obtain an advantage against regional adversaries > Replic ate U.S. capabilities > Develop c ountermeasuresto U.S. systems > Profit c ommerc ially Ascollection methodsevolve, DSShasrecognized the following trends: > Collec torsview request for information (RFI) (i.e. seemingly innoc ent requestsmade by c ollec torsregarding shipping logistic sand export regulations) > Cyber c ollec tion (i.e. foreign entitiesgaining ac c essto unc lassified c leared c ontrac tor networks, potentially c ompromising sensitive, but unc lassified, information present on those networks) > Ac ademic solic itation (foreign entitiesuse students, professors, sc ientistsand researchersascollec tors; i.e. foreign studentsapplying to c leared c ontrac torsassoc iated with U.S. universities) Updated: June 2016 Counterintelligence Threatsand Awareness Overview of Threats
  • 12. CLEARED REFRESHER SECURITY TRAINING The number one threat to national security comesfrom the “Insider Threat”. An insider can have a negative impact on national security and industry security in: > Lossor c ompromise of c lassified, export-c ontrolled, or proprietary information > Lossof tec hnologic al superiority > Ec onomic loss and/ or lossof life Updated: June 2016 Some indicators of an insider threat are: > Engaging in c lassified c onversationswithout a need-to-know > Working hoursinc onsistent with job assignment or insistenc e on working in private > Repeated sec urity violations If noticed, it is best to report these examples of suspicious activity to your FSO. Again, be aware of your surroundings and those around you. Counterintelligence Threatsand Awareness Insider Threats
  • 13. CLEARED REFRESHER SECURITY TRAINING It is your OBLIGATION TO REPORTactual, probable or possible espionage, sabotage, terrorism or subversion promptly to the FSO. DSShas warned that the majority of suspic iousc ontactsoriginate from c ommerc ial entities. Examplesinc lude: > Feb 2012: Pangang Group (steel manufac turer in Sic huan provinc e of China) indicted in Northern California for c onspirac y to c ommit ec onomic espionage inc luding c onspirac y to steal valuable trade sec retsfrom DuPont. > Feb 2012: Hanjuan Jin wasfound guilty in Illinoisfor theft of trade sec rets; she illegally possessed thousandsof Motorola trade sec retson her c omputer and in other forms of digital storage; her intent wasto passthe information to the Chinese military. Hanjuan Jin- November 7, 2011 (AP) Attempted intrusionsare the most common suspiciousactivity in: > Soc ially engineered emailswith malic iousattac hmentsto exploit c ommerc ial software > Spoofing emailsthat imitate valid domains > Attempted intrusion from removable media Counterintelligence Threatsand Awareness Reporting the Threat Updated: June 2016
  • 14. CLEARED REFRESHER SECURITY TRAINING Cyber criminals, hackers, insider threats, terrorists and foreign intelligence entities are targeting our technology by using the following methods: > Phishing emailswith malic iouslinksor attac hments > Unpatched or outdated sec urity software > Removable media > Weak or default passwords > Website vulnerabilities > Seeking information on soc ial networks Stepsthat can be taken to mitigate the risk include: > Changing your passwordsregularly > Using c omplex alphanumeric passwordswith c ombinations of numbers, symbols, letters, and multiple c harac ters > Do not open emails/ attac hmentsfrom unfamiliar sourc es > Do not install or c onnec t personal software or hardware to your organization’snetwork without permission from the ITdepartment > Do not share work information on soc ial networks Updated: June 2016 Counterintelligence Threatsand Awareness Cyber Security
  • 15. CLEARED REFRESHER SECURITY TRAINING Elicitation isused by intelligence officersin order to subtly extract information about you, your work and/ or your colleagues. Most often, illegal or unauthorized accessto classified or sensitive information is sought. Updated: June 2016 What are some recruitment toolsthat intelligence officersuse to lure a target that you should be aware of? > Money is offered by an intelligenc e officer (IO) to a target in exc hange for information > Appealing to ideology (IO expressessame worldview or political leaningswith a target in order to gain trust) > Ego (target bec omesthe subjec t of immense flattery and praise) > Revenge (IO learnstarget isdisgruntled and enc ouragesretribution by passing on c lassified information) > Blac kmail (IO learnsof damaging information and forc estarget to c ooperate by threatening to expose personal sec rets) > Industrial spiesattend trade showsand c onferenc es, whic h allowsthem to ask questionsthat might otherwise seem suspic iousin a different environment Counterintelligence Threatsand Awareness Elicitation: Can You Recognize It?
  • 16. CLEARED REFRESHER SECURITY TRAINING What can be done to counter recruitment attempts? > Safeguard your wordsand ac tionsto avoid bec oming an easy target. > Examine your own vulnerabilitiesand adjust your lifestyle to c lose gapsthat hostile entitiescould exploit. Updated: June 2016 Report any suspiciousconversations to your FSO. Thisinformation will be passed on to DSS, who will then review and determine if a potential counterintelligence threat concern exists. Counterintelligence Threatsand Awareness Elicitation and Recruitment
  • 17. CLEARED REFRESHER SECURITY TRAINING As cleared contractors travel for business and/ or personal use, the knowledge they have issought-after by foreign entities. Collection techniques include the following: > Bugged hotel rooms or airline c abinsfor audio and/ or visual surveillance > Intercepting faxesor email transmissions > Rec ording of telephone c alls/ conversations > Theft of elec tronic devic es > Unauthorized ac cessto elec tronic devices > Installation of malic ioussoftware > Unnec essary and often unknown search of briefc ases/ luggage Updated: June 2016 Counterintelligence Threatsand Awareness Foreign Travel Vulnerability: Collection Techniques
  • 18. CLEARED REFRESHER SECURITY TRAINING To combat potential vulnerabilities, please apply the following countermeasures when traveling abroad: > Do not public ize travel plansand limit sharing of thisinformation to people who need to know > Inform the FSO prior to departure and rec eive an offic ial foreign travel briefing > Maintain c ontrol of media and equipment; do not leave them unattended in hotel rooms > Keep hotel room doorslocked and make a mental note of how the room looks when you leave/ return > Do not use c omputer or fax equipment at foreign hotels or businessc entersfor sensitive matters > Ignore or deflec t intrusive or suspect inquiriesor c onversationsabout professional or personal matters > Refrain from bringing portable elec tronic devic es, espec ially if c ompany-issued > If using portable elec tronic devic es, set passwordsto restric t ac c essand c lear the devic e in the event of theft > Enc rypt data, hard drivesand storage devic eswhenever possible > Use c omplex passwords > Please refer to the State Department website for travel warningsprior to departure Updated: June 2016 Counterintelligence Threatsand Awareness Foreign Travel Vulnerability: Countermeasures
  • 19. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Updated: June 2016 In accordance with requirements outlined in the NISPOM, all cleared employees are required to report the following issues to the FSO for investigation, resolution and reporting to the appropriate government agency : > Adverse Information > Change in Personal Status > Sec urity Violations/ Vulnerabilities > Espionage, Sabotage, Subversive Activities > Suspic iousContac ts
  • 20. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Updated: June 2016 Adverse Information Adverse information is any information that unfavorably reflec ts on the integrity or character of a cleared employee, that suggests his or her ability to safeguard c lassified information may be impaired, or that his or her ac c essto c lassified information c learly may not be in the best interest of national sec urity. All c leared employeesare required to notify the FSO if any of the following exist: > Seriousfinanc ial diffic ulties(exc essive indebtedness, bankruptc y or wage garnishments) > Excessive use of intoxic ants(alc ohol, prescription medications) > Use of illegal drugs > Required c ounseling for emotional or psyc hologic al problems > Arrestsor c onvic tionsfor c riminal offensesinc luding drunk driving > Tic kets(over $300) > Excessive/ unexplained wealth > Unusual/ bizarre behavior
  • 21. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Updated: June 2016 Change in Personal Status The following should be reported to the FSO for proper doc umentation: > A c hange in name > A rec ent c hange in marital statusor a spouse-like relationship > A c hange in c itizenship > When ac c essto c lassified information is no longer required due to a c hange in job assignments You must report if you begin to ac t asa representative of or c onsultant to any foreign entity. Thisinc ludesa foreign government (or government agenc y), c ommerc ial businessor an individual. Example: Obtaining a foreign passport or entering into a business/partnership with a foreign national.
  • 22. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Updated: June 2016 Security Violations/ Vulnerabilities In addition to personnel sec urity reporting requirements, you must report any known or suspected security violation or vulnerability of which you become aware, independent of who is responsible or at fault for the situation. Sec urity violations/ vulnerabilitiesinc lude: > The c areless, intentional, or unintentional failure to c omply with or disregard of fac ility sec urity c learanc e polic ies and procedures, regardlessof intent, that hasresulted in the loss, c ompromise or suspected c ompromise of c lassified information > The unauthorized rec eipt of c lassified material > Report suspic iousc ontac ts, whic h are effortsby any individual, regardlessof nationality, i) to obtain illegal or unauthorized ac c essto c lassified information, ii) to c ompromise a c leared employee, iii) all c ontactsby employees with known or suspected intelligenc e offic ersfrom any c ountry, or iv) any c ontact whic h suggeststhe employee c onc erned may be the target of an attempted exploitation by the intelligence servicesof another c ountry > You must immediately report any situation related to ac tual, probable, or possible espionage, sabotage or subversive ac tivitiesdirec ted at the United States
  • 23. INITIAL SECURITY BRIEFING Per the NISPOM, Sec tion 1-304 a gra duated sc a le of disc ipline has been put into pla c e in the event of a n emp loyee tha t viola tes or is negligent of his/ her sec urity requirements. The a c tion must b e rep orted d irec tly to the FSO and will b e reviewed for a sec urity violation if one or more of the following fac tors are present : a. The violation involved a deliberate disregard of sec urity requirements. b. The violation involved grossnegligence in the handling of classified materials. c. The violation involved wasnot deliberate in nature but involved a pattern of negligence or carelessness. You must immediately report any situation related to ac tual, probable, or possible violation direc tly to the FSO. The FSO, if nec essary will meet with the Complianc e Officer and/ or General Counsel to disc ussthe known or suspected violation. It will be determined at that time is ac tion c onsistsof remedial or c orrec tive measuresand/ or if appropriate, disc iplinary ac tion, up to and inc luding suspension or termination of employment pursuant to the MFA’s disc iplinary polic iesand procedures. The FSO will maintain a rec ord of all disc iplinary and c orrective ac tions. All disc iplinary ac tions should be fairly and firmly enforc ed. If, after review with the Complianc e Offic er and General Counsel it is determined that an allegation does not warrant an investigation, a report will be provided based on the initial review of the allegation and why the investigation is not warranted. Updated: June 2016 Cleared Employee Reporting Requirements Security Violations/ Vulnerabilities
  • 24. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Espionage, Sabotage, Subversive Activities Espionage isthe act or practice of spying or of using spies to obtain secret intelligence. You must report potential espionage indicators exhibited by others: > Unexplained affluenc e of wealth > Keeping unusual work hours > Divided loyalty or allegianc e to the U.S. > Disregarding sec urity proc edures > Unauthorized removal of c lassified information > Unreported foreign c ontac t and travel (appliesto c leared employees) > Pattern of lying > Attempts to enlist othersin illegal or questionable ac tivity > Verbal or physic al threats > Inquiry about operations/ projec tswhere no legitimate need-to-know exists Statute of limitationsdoes NOTapply to Espionage Updated: June 2016
  • 25. CLEARED REFRESHER SECURITY TRAINING Suspiciouscontacts are: > Any efforts by any individual, regardless or nationality, to obtain illegal or unauthorized access to c lassified information or to c ompromise any c leared employee. > Any contac t by a c leared employee with known or suspected intelligence offic ersfrom any c ountry. > Any contac t whic h suggestsyou or another employee may be the target of an attempted exploitation by foreign intelligenc e. If you receive suspicious contacts please report them immediately to the FSO, asthey will then be reported to DSS Cleared Employee Reporting Requirements SuspiciousContacts Updated: June 2016
  • 26. CLEARED REFRESHER SECURITY TRAINING DSSCase Study In Marc h 2009, a presumed South and Central Asian national c ontacted a c leared c ontrac tor in an attempt to ac quire export-c ontrolled partsused in c ounter-battery radar systems. In November 2009, a different U.S. c leared c ontrac tor rec eived an unsolic ited email from the same individual expressing interest in purc hasing the same radar system that wasrequested in the Marc h inc ident. The suspic iousindividual wasa representative of a trading c ompany from his home c ountry. Multiple sourc es indic ate that hishome government established the trading c ompany asa front c ompany to proc ure export- c ontrolled tec hnology and equipment for the national military, and that the trading c ompany had previously sought produc tson behalf of several military servic esand defense-affiliated entities. The trading c ompany wasthe subjec t of several other SCRsreporting attemptsto purc hase export-c ontrolled elec tronic sproduc tsand c ommunic ationsequipment used in military airc raft. Updated: June 2016 If you receive suspiciouscontacts please report them immediately to the FSO, asthey will then be reported to DSS Cleared Employee Reporting Requirements SuspiciousContacts– DSSCase Study
  • 27. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Reporting Hotlines& Contact Information •In addition to the FSO within our organization, Federal agenciesmaintain hotlines to allow an unconstrained avenue for government and contractor personnel to report, without fear of reprisal, any known or suspec ted instances of sec urity irregularities or infractions conc erning defense-affiliated c ontracts, programs, or projects. •You are also required to report any fraud, waste or abuse regarding work while working on a government contract. •WARNING: Do NOT disclose classified information when reporting via one of the DoD Hotline methods, as these channelsare not secure! DEPARTMENTOFDEFENSE(DoD) HOTLINE The Pentagon Washington, D.C. 20301-1900 (800) 424-9098 hotline.dodig.jil http:/ / www.dodig.mil/ hotline Updated: June 2016 NRC HOTLINE U.S. Nuclear Regulatory Commission Office of the Inspector General Mail Stop O5-E13 11555 Roc kville Pike Roc kville, MD 20852 (800) 233-3497 CIA HOTLINE Office of the Inspector General Central Intelligence Agenc y Washington, D.C. 20505 (703) 874-2600 DOEHOTLINE Department of Energy Office of the Inspector General (IG) ATTN: IG Hotline 1000 Independence Avenue, S.W. Mail Stop 5D-031 Washington, D.C. 20585 (202) 586-4073 (800) 541-1625 DEFENSESECURITY SERVICE(DSS) DSSIG Hotline: (571) 305-6660 Michael Irvine, Industrial Security Specialist michael.irvine@dss.mil (703) 617-2300 HectorRodriguez, Field CI Specialist hec tor.Rodriguez@dss.mil (571) 289-0657
  • 28. CLEARED REFRESHER SECURITY TRAINING Cleared Employee Reporting Requirements Global Compliance (Non Security-Related Reporting) If you suspect, or are asked to cover up, any of the following, report it to your supervisor, to the MFA’s Compliance Office or Legal Department, or contact Global Compliance: > Fraud/ False Claims/ Upc oding > Kic kbac ksfor referrals > Conflic tsof interest > Theft > Harassment or disc rimination > Criminal ac tivity > Violations of lawsor regulations > Health, safety, environmental issues > Violations of c ompany polic y or procedure Updated: June 2016
  • 29. CLEARED REFRESHER SECURITY TRAINING Acknowledgement I hereby certify by my signature below that I have reviewed the information contained herein and understand it is my responsibility to comply with all necessary security measures outlined in the June 2016 Facility Security Clearance Refresher Training for Cleared GW MFA Employees. Name Signature Date Position and Department Please return thispage to the Facility Security Officer once it has been signed via email to kmajchrzak@mfa.gwu.edu or facsimile at 202-741-2214 Updated: June 2016