Employees' Guide to Security Responsibilities

List of Contents

Security Cleaarnces and Investigations

Security Clearances & Investigations
  Overview
 Understanding E-Qip


AT LEVEL 1

AT Level 1 Where is it?
  Overview
 
Where is it?

SERE-B Training

SERE-B Training
  Overview
 
Where to Go?
  Steb-By-Step Instructiones

ISOPREP Training

A Little on ISOPREP Training
  Overview
  AKO-ISOPREP-instructions.PDF

  Steb-By-Step Instructiones

Procedures For Protecting Information

Protecting Classified Information
  Overview
 
Need-to-Know
  Handling Classified Information
  Classification Procedures
  Marking Classified Information
  Mailing & Carrying Classified Materials
  Foreign Government Classified Information
  Security Violations

  Using the SIPRNET
  Using the STU-III

 
Appropriate Use of Computer Systems
  Emergency Authority
  Glossary of Definitions

Protecting Sensitive Unclassified Information
  Overview
  Need-to-Know
  Appropriate Use of Computer Systems
  Freedom of Information Act
  Operations Security (OPSEC)
  Pre-Publication Review of Web Site Content
  For Official Use Only & Similar Designations
  DoD Technical Data
  Privacy Act Information
  Export-Controlled Information
  Source Selection Data
  Sensitive Security Information
  Protected Critical Infrastructure Information

  Unclassified Controlled Nuclear Information
  Proprietary Information & Trade Secrets

Personal Conduct and Reporting Requirements

What Is Expected of Me?
  Introduction
  Behaviors of Security Concern
  Reporting Personal Activities

  Reporting Foreign Contacts
  Reporting Outside Activities
  Reporting Foreign Intelligence Activity 
 
Reporting "Anomalies"
  Pre-Publication Review

Reporting Improper, Unreliable, or Suspicious Behavior
  Reporting Responsibilities
  Counterintelligence Indicators
  Counterterrorism Indicators
  Security and Suitability Issues
  Preventing Violence
  No Good Excuses for Not Reporting

  People Who Made a Difference
  Hotline Numbers

U.S. Government Ethics Standards
  Introduction
  Gifts from Outside Sources
  Gifts Between Employees
  Conflicting Financial Interests
  Frequent Flyer Benefits and Bumping
  Impartiality in Performing Duties
  Misuse of Position
  Representation to Government Agencies
  Outside Activities
  Financial Disclosure
  Honoraria
  Supplementation of Salary
  Seeking Other Employment
  Post-Employment
  Advisory Letters, Memoranda and Formal Opinions

Foreign Threats to Protected Information

Who's Doing What to Whom?
  Overview
  Economic & Industrial Espionage
  Illegal Technology Transfer
  Computer Attacks

  National Security Threat List
  Militarily Critical Technologies List
  Economic Espionage Act of 1996
  One Country's Program to Obtain U.S. S&T Secrets

How Do I Know When I'm Being Targeted and Assessed?
  Introduction
  Road to Recruitment
  Who Is Most Likely to Be Targeted?

Getting Information Out of Honest People Like Me
  Methods of Operation
  Unsolicited Direct Requests
  Short-Term Foreign Visitors
  Long-Term Foreign Visitors
  American Travelers Abroad
  Collection from Open Sources
  Elicitation
  False Pretenses
  Theft and "Dumpster Diving"

Risks During Foreign Travel
  You Are the Target
  Country-Specific Threat Updates
  Security & Safety Recommendations
  Avoiding/Recognizing Intelligence Interest
  Contact with Foreign Relatives
  Theft While Traveling
  Overseas Communications
  Bugging Hotel Rooms
  Reporting Security Incidents
  What to Do If Arrested

Antiterrorism and Force Protection
  Introduction
  Traveling Outside the U.S.
  Living Outside the U.S.
  Defensive Driving Overseas
  Package and Letter Bombs
  Kidnapping & Hostage Survival Guidelines
  Hijacking Survival Guidelines
  DOD Code of Conduct

Computer and Other Technical Vulnerabilities

Computer Vulnerabilities
  Overview
  Threats to Computer Systems
  Secure Use of Computer Systems
  How Hackers Work

  Case 1
  Case 2
  How We Make It Easy for the Hackers
  Weak Passwords
  "Social Engineering"
  Network Security
  Using the Internet Securely
  "Cookies"
  E-Mail Pitfalls
  Viruses and Other "Infections"
  Security of Hard Drives
  Security of Laptops

Intercepting Your Communications
  Overview & Countermeasures
  Telephones
  Fax Machines
  Cellular Phones
  Cordless Phones
  Answering Machines
  Voice Mail
  Intercoms & Baby Monitors

Bugs and Other Eavesdropping Devices
  Overview of the Threat 
  Eavesdropping Methods
  Detecting and Preventing Eavesdropping

Understanding and Helping
With Personal Problems

Employee Assistance
  Alcohol Abuse and Dependence
  Compulsive Gambling
  Depression

  Domestic Abuse
  Drug Use
  Eating Disorders
  Financial Problems
  Sexual Addiction
  Stress
  Suicide Crisis Intervention


True Spy Stories

Learning from Experience
You Can Make a Difference
American Travelers Abroad

Ames: Too Many Weaknesses

Cavanagh Wanted to Be Wealthy
Charlton: Disgruntled Engineer
Consulting Led to Espionage
Espionage Killed the Company
Hamilton Tried to Prevent a War
Hacking Computers from Overseas
Hanssen: Deep Inner Conflicts
Illegal Export of Poison Gas
Lalas: Something Wasn't Right
Lipka: No Statute of Limitations
Notable Industrial Security Cases
Pollard: Grandiose Imagination
Ramsay Recruited Drug Users
Walker Was "Intrinsically Evil"
Voice Mail Is Vulnerable

Treason 101

Overview
How Spies Are Caught
The Insider Espionage Threat
One Country's Program to Obtain U.S. S&T Secrets
The Insider Threat to Information Systems
Exploring the Mind of the Spy
Espionage by the Numbers

 

HOME

INFORMATIONCONDUCT | THREATS | TECH VULNERABILITYASSISTANCE
SPY STORIES | TREASON 101