Gsa Security Officer Training - PowerPoint

Document Sample
Gsa Security Officer Training - PowerPoint Powered By Docstoc
					Security Discipline Training
           Security Points of Contact
Security Managers:
       Primary: (Name, Bldg, Phone #)
       Alternate: (Name, Bldg, Phone #)

Facility Security Officers:
        Primary: (Name, Bldg, Phone #)
        Alternate: (Name, Bldg, Phone #)

Contractor Special Security Officers:
       Primary: (Name, Bldg, Phone #)
       Alternate: (Name, Bldg, Phone #)
                      Objectives
• Provide introduction to the organization’s security program
• Make personnel aware of their role and responsibilities
• Provide some basic security requirements and reminders
                Information Security
Individual Responsibilities…
• Ensure incoming and outgoing classified is marked IAW Executive
Order 12958
• Protect classified material in your possession and return it to secure
storage as soon finished working on it
• Do not release classified material without validating clearance level and
need-to-know of perspective recipient—do not take their word for it!
• Obtain appropriate approval before reproducing classified, use copier
approved for classified, follow reproduction and clearing procedures
• Immediately report security procedure infractions or discovery of
unprotected classified to immediate supervisor or Security POC
• Do not discuss classified material over regular office telephone
• Complete recurring security training presented by Security POC
                  Information Security
        SECURITY CLASSIFICATION DEFINITIONS
• Top Secret – Information whose unauthorized disclosure could be expected to
cause exceptionally grave damage to national security.
• Secret – Information whose unauthorized disclosure could be expected to
cause grave damage to national security.
• Confidential – Information whose unauthorized disclosure could be expected
to cause damage to national security.

                              CLASSIFICATION METHODS
                  • Original Classification Authority (OCA) – Official position
                  designated by the Secretary of AF to apply a classification level
                  on newly developed information.

                  • Derivative Classification – Classified information extracted,
                  paraphrased, restated or generated in a new form.
                 Information Security
• Classified stored in GSA-approved security containers
only (safes & vault doors built to GSA specifications)
• Must have a security clearance, need to know, signed
Non-disclosure Agreement before given access
    • Contact your Security POC to validate
• Person in charge of the container is the Custodian
• Each opening and closing of container documented on
Standard Form 702, Security Container Check Sheet
• Mark all derivatively classified information and
working papers accordingly
• Destroy when no longer needed to reduce holdings and
risk of loss
                     Information Security
                         Classified Reproduction
                         •   Check material for copying restrictions
                         •   Obtain appropriate approvals
                         •   Only use copier authorized for classified reproduction
                         •   Follow instructions on clearing machine after use




Destroying Classified
•   Destroy as soon as information served its purpose
•   Cross-cut shredding is approved method (for paper)
•   Obtain appropriate approvals (if required)
•   Ensure shredder is approved for classified destruction
•   Contact Security POC for other methods
                  Information Security
End of Day Security Checks
 • Performed in areas where classified is stored or worked on
 • Duties normally rotated among cleared personnel within the area

 • Ensures classified storage containers locked

 • May include a check to see computers, coffee pot, lights,
   turned off; windows closed; doors locked

 • AF users document checks on Standard Form 701
                                   Mail
• Controlled Mail
 -- Registered and Certified Mail
 -- Transmits Secret and some Confidential
    (Contact Security POC for training)

• First Class Mail
 -- May contain Confidential material
 -- Must open immediately to determine contents
 -- Secure unopened in safe

• GSA Vendors and US Postal Service Overnight
 -- GSA vendors include: Federal Express, UPS, DHL, AirNet, Cavalier,
MENLO, CorTrans Logistics, Associated Global System
 -- May contain Secret or Confidential
 -- Requires special authorization for sending classified
 -- Open immediately otherwise secure in safe
NOTE: Top Secret material NEVER sent by mail
                         Visit Requests
• Sent to contractor or other government activity when personnel require access
to classified material during visit

• Prepared using the Joint Personnel Adjudication System (JPAS)
  – Security POC’s have access
                     Personnel Security
Security Clearance Requirements

 -- Determined by job requirements

  -- Individual responsible for timely submission of paperwork for initial and
periodic investigations

 -- Individual must sign a Standard Form 312, Non-disclosure Agreement




                     Check with your Security POC
                        or supervisor for more
                             information
                    For Official Use Only
• Governed by DoD Freedom of Information Act (FOIA) Program
    Ref: DoD 5400.7-R/AF Supplement
• Is not classified information, but may be withheld from public because
disclosure would cause foreseeable harm to an interest protected by one
or more of FOIA exemptions 2 through 9
• Material identified by markings in classified and unclassified material
• Protective requirements
   -- During duty hours, keep out of sight when non-government people
present
   -- After duty hours, file with other unclassified material in unlocked
cabinet, desk or bookcase
• Disposal methods
   -- Record copies – IAW Federal Records Act and AF file management
   -- Non-record copies – shred or tear to prevent reconstruction
                    NATO Information
• Governed by USSAN Instruction 1-69, Safeguarding NATO Classified
Information
   -- Air Force guidance in AFI 31-406, Applying NATO Protection Standards

• Same general classifications and protection requirements as US (COSMIC Top
Secret, NATO Secret, NATO Confidential) plus NATO Restricted
   -- NATO Restricted protected similar to FOUO

• ATOMAL refers to Restricted Data or Formerly Restricted Data supplied to NATO
components by United States or United Kingdom
   -- Applicable to all NATO classifications except Restricted
   -- ―ATOMAL‖ appended to normal classification markings
                   NATO Information
Control and Access
• Designated NATO sub-registries and control points receive, record, handle,
and distribute NATO Secret and above information
   -- NATO control points – within organizations requiring NATO documents

• Access to NATO information authorized by (commander/director)
   -- Individuals briefed on detailed handling procedures prior to working with
NATO classified

• Debrief when access no longer required
Communications & Computers Security
Telephones
 -- DO NOT discussed classified on regular desk phone
 -- Classified discussed on secure phones only

Faxes
 -- Send classified over secure machine only (machine connected to a secure
telephone)

Computers
 -- All must have trustworthiness determined prior to access
   to network.
 -- Must complete training
 -- Classified information processed only on approved machines
 -- See Security POC for more details
                    Security Incidents
Immediately report the following types of incidents to your
Security POC:
- Unattended classified material
- Mismarkings or classification challenges
- Any suspected incident of compromise or inadvertent release/exposure

Secure the information to prevent further compromise
Report at the same level as the material in question
Cooperate with inquiry official or investigator
Foreign Travel
Requirements apply to Official & Pleasure Travel
    (includes Canada, Mexico & Puerto Rico)

Before you travel outside CONUS…
 Contact the Security POC
 Security POC contacts your SSO
 YOU receive country-specific briefing

Upon your return, report all suspicious foreign contacts to
AFOSI in person
                   Operations Security
• Definition – Process of denying information about capabilities and intentions to
our adversaries by identifying, controlling and protecting indicators associated
with planning and conducting military operations and other activities

• Primarily (but not exclusively) focused on unclassified information OR activity
that may compromise critical information

• Applies to any activity or process – not limited to operations

• Goal is to identify and protect information
                           Bomb Threats
Follow these procedures if you receive a call…
1.   DO NOT PANIC!!!!!
2.   Complete local checklist
3.   Complete as much information as possible on checklist
4.   Never hang up -- leave the phone off hook even if the
     caller hangs up
5.   Alert a co-worker to call 911 from another phone to
     report incident
6.   Alert supervisor or other management personnel
7.   Give checklist to the police upon their arrival



 Other actions…
 1. Secure classified if time permits
 2. Evacuate and assemble IAW emergency action plan
           Suspicious Mail & Packages
Follow these procedures if you find a
suspicious mail or package…
 1.   Handle with care. Don’t shake or
      bump.
 2.   Isolate it immediately.
 3.   Don’t open, smell, touch or taste.
 4.   Treat it as suspect. Call local law
      enforcement authorities.
                Contingency Planning
• Be familiar with the Homeland Security Advisory System and the
DoD’s Force Protection Conditions
       HSAS                       FPCONs
       Severe                     Normal
       High                       Alpha
       Elevated                   Bravo
       Guarded                    Charlie
       Low                        Delta

• Review and be familiar with Contingency Plans

• Be familiar with and keep current…
 -- Key Personnel/Mission Essential Personnel Lists
 -- Pyramid Alert/Recall Rosters
  Contact your Security POC if you
       have any questions…
Security Managers:
       Primary: (Name, Bldg, Phone #)
       Alternate: (Name, Bldg, Phone #)

Facility Security Officers:
        Primary: (Name, Bldg, Phone #)
        Alternate: (Name, Bldg, Phone #)

Contractor Special Security Officers:
       Primary: (Name, Bldg, Phone #)
       Alternate: (Name, Bldg, Phone #)

				
DOCUMENT INFO
Description: Gsa Security Officer Training document sample