Procedures For Protecting Information
Protecting Classified Information Overview Need-to-Know Handling Classified Information Classification Procedures Marking Classified Information Mailing & Carrying Classified Materials Foreign Government Classified Information Security Violations Using the SIPRNET Using the STU-III Appropriate Use of Computer Systems Emergency Authority Glossary of Definitions Protecting Sensitive Unclassified Information Overview Need-to-Know Appropriate Use of Computer Systems Freedom of Information Act Operations Security (OPSEC) Pre-Publication Review of Web Site Content For Official Use Only & Similar Designations DoD Technical Data Privacy Act Information Export-Controlled Information Source Selection Data Sensitive Security Information Protected Critical Infrastructure Information Unclassified Controlled Nuclear Information Proprietary Information & Trade Secrets
Personal Conduct and Reporting Requirements
What Is Expected of Me? Introduction Behaviors of Security Concern Reporting Personal Activities Reporting Foreign Contacts Reporting Outside Activities Reporting Foreign Intelligence Activity Reporting "Anomalies" Pre-Publication Review Reporting Improper, Unreliable, or Suspicious Behavior Reporting Responsibilities Counterintelligence Indicators Counterterrorism Indicators Security and Suitability Issues Preventing Violence No Good Excuses for Not Reporting People Who Made a Difference Hotline Numbers U.S. Government Ethics Standards Introduction Gifts from Outside Sources Gifts Between Employees Conflicting Financial Interests Frequent Flyer Benefits and Bumping Impartiality in Performing Duties Misuse of Position Representation to Government Agencies Outside Activities Financial Disclosure Honoraria Supplementation of Salary Seeking Other Employment Post-Employment Advisory Letters, Memoranda and Formal Opinions
Foreign Threats to Protected Information
Who's Doing What to Whom? Overview Economic & Industrial Espionage Illegal Technology Transfer Computer Attacks National Security Threat List Militarily Critical Technologies List Economic Espionage Act of 1996 One Country's Program to Obtain U.S. S&T Secrets How Do I Know When I'm Being Targeted and Assessed? Introduction Road to Recruitment Who Is Most Likely to Be Targeted? Getting Information Out of Honest People Like Me Methods of Operation Unsolicited Direct Requests Short-Term Foreign Visitors Long-Term Foreign Visitors American Travelers Abroad Collection from Open Sources Elicitation False Pretenses Theft and "Dumpster Diving" Risks During Foreign Travel You Are the Target Country-Specific Threat Updates Security & Safety Recommendations Avoiding/Recognizing Intelligence Interest Contact with Foreign Relatives Theft While Traveling Overseas Communications Bugging Hotel Rooms Reporting Security Incidents What to Do If Arrested Antiterrorism and Force Protection Introduction Traveling Outside the U.S. Living Outside the U.S. Defensive Driving Overseas Package and Letter Bombs Kidnapping & Hostage Survival Guidelines Hijacking Survival Guidelines DOD Code of Conduct
Computer and Other Technical Vulnerabilities
Computer Vulnerabilities Overview Threats to Computer Systems Secure Use of Computer Systems How Hackers Work Case 1 Case 2 How We Make It Easy for the Hackers Weak Passwords "Social Engineering" Network Security Using the Internet Securely "Cookies" E-Mail Pitfalls Viruses and Other "Infections" Security of Hard Drives Security of Laptops Intercepting Your Communications Overview & Countermeasures Telephones Fax Machines Cellular Phones Cordless Phones Answering Machines Voice Mail Intercoms & Baby Monitors Bugs and Other Eavesdropping Devices Overview of the Threat Eavesdropping Methods Detecting and Preventing Eavesdropping
Understanding and Helping With Personal Problems
Employee Assistance Alcohol Abuse and Dependence Compulsive Gambling Depression Domestic Abuse Drug Use Eating Disorders Financial Problems Sexual Addiction Stress Suicide Crisis Intervention True Spy Stories
Learning from Experience You Can Make a Difference American Travelers Abroad Ames: Too Many Weaknesses Cavanagh Wanted to Be Wealthy Charlton: Disgruntled Engineer Consulting Led to Espionage Espionage Killed the Company Hamilton Tried to Prevent a War Hacking Computers from Overseas Hanssen: Deep Inner Conflicts Illegal Export of Poison Gas Lalas: Something Wasn't Right Lipka: No Statute of Limitations Notable Industrial Security Cases Pollard: Grandiose Imagination Ramsay Recruited Drug Users Walker Was "Intrinsically Evil" Voice Mail Is Vulnerable
Treason 101
Overview How Spies Are Caught The Insider Espionage Threat One Country's Program to Obtain U.S. S&T Secrets The Insider Threat to Information Systems Exploring the Mind of the Spy Espionage by the Numbers
INFORMATION | CONDUCT | THREATS | TECH VULNERABILITY | ASSISTANCE SPY STORIES | TREASON 101